Abstract
Motivated by the need for designing secure and user-friendly authentication method for mobile devices, we present a novel image-based authentication (IBA) scheme in this paper. Its mnemonics efficacy rests on the human cognitive ability of association-based memorization. To tackle the shoulder-surfing attack issue, an interactive authentication process is presented. System performance analysis and comparisons with other schemes are presented to support our proposals.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ginesu, G., Giusto, D., Onali, T.: Image Based Authentication (IBA): A Review. N3461, ISO/IEC JTC 1/SC 29/WG1 (November 2004)
Blonder, G.: Graphical Passwords. United States Patent 5559961 (1996)
The science behind Passfaces. Real User Corporation (September 2001), http://www.realuser.com
Dhamija, R., Perrig, A., Vu, D.: User study using images for authentication. In: 9th USENIX Security Symposium (2000)
Jansen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R.: Picture Password: A Visual Login Technique for Mobile Devices. NISTIR 7030
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Bower, G.H.: Analysis of a Mnemonic Device. American Scientist, 496–510 (September/October 1970)
Sobrado, L., Birget, J.C.: Graphical passwords. The Rutgers Scholar 4 (2002)
Roth, V., Richter, K., Freidinger, R.: A PIN-Entry Method Resilient Against Shoulder Surfing. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington DC, USA (October 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Z., Sun, Q., Lian, Y., Giusto, D.D. (2005). A Secure Image-Based Authentication Scheme for Mobile Devices. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_78
Download citation
DOI: https://doi.org/10.1007/11538356_78
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28227-3
Online ISBN: 978-3-540-31907-8
eBook Packages: Computer ScienceComputer Science (R0)