Skip to main content

A User Authentication System Using Schema of Visual Memory

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3853))

Abstract

On many image-based user authentication systems, they have to present a user’s pass-image on their display at each authentication trial, so they can be vulnerable against an observing attack. This paper proposes a user authentication system using “unclear images” as pass-images, in which only the legitimate users are allowed to see the original images corresponding to the unclear pass-images in the enrollment phase. The legitimate users can easily remember their unclear pass-images by using the original images as clues, while illegal users without the clues have difficulties to find out and remember the other user’s unclear pass-images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dhamija, R., Perring, A.: Deja Vu: A User Study Using Images for Authentication. In: 9th USENIX Security Symposium, pp. 45–58 (2002)

    Google Scholar 

  2. Bauer, A.: Gallery of random art (July 2005), http://www.cs.cmu.edu/~andrej/art/

  3. Pering, T., Sundar, M., Light, J., Want, R.: Photographic Authentication through Untrusted Terminals. IEEE Pervasive Computing 2(1), 30–36 (2003)

    Article  Google Scholar 

  4. Takada, T., Koike, H.: Awase-E: Image-Based Authentication for Mobile Phones Using User’s Favorite Images. In: Chittaro, L. (ed.) Mobile HCI 2003. LNCS, vol. 2795, pp. 347–351. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Real User Corporation: PassFaces (July 2005), http://www.realuser.com/cgi-bin/ru.exe/_/homepages/index.htm

  6. Brewer, W. F.: Schemata. In: Wilson, R. A., Keil, F.C. (eds.) MIT Encyclopedia of the Cognitive Sciences, pp. 729–730 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Harada, A., Isarida, T., Mizuno, T., Nishigaki, M. (2006). A User Authentication System Using Schema of Visual Memory. In: Ijspeert, A.J., Masuzawa, T., Kusumoto, S. (eds) Biologically Inspired Approaches to Advanced Information Technology. BioADIT 2006. Lecture Notes in Computer Science, vol 3853. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11613022_28

Download citation

  • DOI: https://doi.org/10.1007/11613022_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31253-6

  • Online ISBN: 978-3-540-32438-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics