Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images

نویسندگان

  • Tetsuji Takada
  • Hideki Koike
چکیده

There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image registration and notification interfaces. Image registration enables users to use their favorite image instead of a text password. Notification gives users a trigger to take action against a threat when it happens. Awase-E is implemented so that it has a higher usability even when it is used through a mobile phone.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IBA Performance and Usability for Mobile Phones

Mobile phones are becoming increasingly sophisticated, enabling consumers to access more services and generate more data. However, the current PIN and password protection capabilities available on mobile phones are often misused resulting insufficient protection of the information stored within mobile phones. Image-based authentication (IBA) leverages the human ability to recognize graphics bet...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Mental Trapdoors for User Authentication on Small Mobile Devices

As small mobile devices such as mobile phones become increasingly sophisticated, they are beginning to be used for highly securitysensitive applications such as payment systems, stock trading, and access control systems. The increasing importance of mobile phones exposes the tremendous lack of access control systems that restrict access to the legitimate user. In fact, a lost mobile phone “dele...

متن کامل

A Contactless Palmprint Recognition Algorithm for Mobile Phones

Mobile phones have become indispensable and powerful digital devices to use many services. To protect mobile devices and stored data, biometric authentication would play an important role. This paper proposes a contactless palmprint recognition algorithm for mobile phones which combines a hand segmentation algorithm using skin-color thresholding and region growing and a palmprint matching algor...

متن کامل

Motion and audio analysis in mobile devices for remote monitoring of physical activities and user authentication

In this paper we propose the use of accelerometer, embedded by default in smartphone, as a cost-effective, reliable and efficient way to provide remote physical activity monitoring for the elderly and people requiring healthcare service. Mobile phones are regularly carried by users during their day-today work routine. A user's physical movement information during the user's daily routine can be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003