Awase-E: Photo-based User Authentication System

نویسندگان

  • Hideki Koike
  • Tetsuji Takada
  • Takehito Onuki
چکیده

Hideki Koike†, Tetsuji Takada‡, Takehito Onuki† †Graduate School of Information Systems, University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo 182-8585, Japan ‡Information Technology Research Institute, National Institute of Advanced Industrial Science and Technology 2-28-8 Honkomagome, Bunkyo-ku, Tokyo 113-6591, Japan Email: [email protected], [email protected], [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images

There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image ...

متن کامل

IBA Performance and Usability for Mobile Phones

Mobile phones are becoming increasingly sophisticated, enabling consumers to access more services and generate more data. However, the current PIN and password protection capabilities available on mobile phones are often misused resulting insufficient protection of the information stored within mobile phones. Image-based authentication (IBA) leverages the human ability to recognize graphics bet...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans Peter Wickelgren Approach

Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application. This conventional authentication scheme faces some kind of limitations and drawbacks with usability and crypto-graphical security issues that bring troubles to users. For example, user tends to pick passwords that can be easily guessed. On the contrary, if a password is ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005