Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images
نویسندگان
چکیده
There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image registration and notification interfaces. Image registration enables users to use their favorite image instead of a text password. Notification gives users a trigger to take action against a threat when it happens. Awase-E is implemented so that it has a higher usability even when it is used through a mobile phone.
منابع مشابه
IBA Performance and Usability for Mobile Phones
Mobile phones are becoming increasingly sophisticated, enabling consumers to access more services and generate more data. However, the current PIN and password protection capabilities available on mobile phones are often misused resulting insufficient protection of the information stored within mobile phones. Image-based authentication (IBA) leverages the human ability to recognize graphics bet...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملMental Trapdoors for User Authentication on Small Mobile Devices
As small mobile devices such as mobile phones become increasingly sophisticated, they are beginning to be used for highly securitysensitive applications such as payment systems, stock trading, and access control systems. The increasing importance of mobile phones exposes the tremendous lack of access control systems that restrict access to the legitimate user. In fact, a lost mobile phone “dele...
متن کاملA Contactless Palmprint Recognition Algorithm for Mobile Phones
Mobile phones have become indispensable and powerful digital devices to use many services. To protect mobile devices and stored data, biometric authentication would play an important role. This paper proposes a contactless palmprint recognition algorithm for mobile phones which combines a hand segmentation algorithm using skin-color thresholding and region growing and a palmprint matching algor...
متن کاملMotion and audio analysis in mobile devices for remote monitoring of physical activities and user authentication
In this paper we propose the use of accelerometer, embedded by default in smartphone, as a cost-effective, reliable and efficient way to provide remote physical activity monitoring for the elderly and people requiring healthcare service. Mobile phones are regularly carried by users during their day-today work routine. A user's physical movement information during the user's daily routine can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003