TY - GEN
T1 - Image-feature based human identification protocols on limited display devices
AU - Jameel, Hassan
AU - Shaikh, Riaz Ahmed
AU - Hung, Le Xuan
AU - Wei, Yuan Wei
AU - Raazi, Syed Muhammad Khaliq Ur Rehman
AU - Canh, Ngo Trong
AU - Lee, Sungyoung
AU - Lee, Heejo
AU - Son, Yuseung
AU - Fernandes, Miguel
N1 - Funding Information:
This work was supported by the IT R&D program of MIC (Ministry of Information and Communication)/IITA (Institute of Information Technology Assessment). [2005-S-604-02, Realistic Virtual Engineering Technology Development].
PY - 2009
Y1 - 2009
N2 - We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.
AB - We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.
UR - http://www.scopus.com/inward/record.url?scp=70350647479&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-00306-6_16
DO - 10.1007/978-3-642-00306-6_16
M3 - Conference contribution
AN - SCOPUS:70350647479
SN - 3642003052
SN - 9783642003059
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 211
EP - 224
BT - Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers
T2 - 9th International Workshop on Information Security Applications, WISA 2008
Y2 - 23 September 2008 through 25 September 2008
ER -