skip to main content
10.1145/1408664.1408670acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Use Your Illusion: secure authentication usable anywhere

Published:23 July 2008Publication History

ABSTRACT

In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version of a previously seen image. We illustrate how distorted images can be used to maintain the usability of graphical password schemes while making them more resilient to social engineering or observation attacks. Because it is difficult to mentally "revert" a degraded image, without knowledge of the original image, our scheme provides a strong line of defense against impostor access, while preserving the desirable memorability properties of graphical password schemes.

Using low-fidelity tests to aid in the design, we implement prototypes of Use Your Illusion as i) an Ajax-based web service and ii) on Nokia N70 cellular phones. We conduct a between-subjects usability study of the cellular phone prototype with a total of 99 participants in two experiments. We demonstrate that, regardless of their age or gender, users are very skilled at recognizing degraded versions of self-chosen images, even on small displays and after time periods of one month. Our results indicate that graphical passwords with distorted images can achieve equivalent error rates to those using traditional images, but only when the original image is known.

References

  1. Flickr. http://www.flickr.com.Google ScholarGoogle Scholar
  2. Phoney finance. The Economist. October 26, 2006. http://www.economist.com/finance/displaystory.cfm?story_id=8089667.Google ScholarGoogle Scholar
  3. R. Anderson. Why cryptosystems fail. In Proc. ACM CCS, pages 215--227, Nov. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Blonder. United states patent, 1996. United States Patent 5559961.Google ScholarGoogle Scholar
  5. G. H. Bower, M. B. Karlin, and A. Dueck. Comprehension and memory for pictures. Memory and Cognition, 2:216--220, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Brostoff and M. Sasse. Are passfaces more usable than passwords? A field trial investigation. In Proceedings of HCI 2000, pages 405--424, Sept. 2000.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Burton, S. Wilson, M. Cowan, and V. Bruce. Face recognition in poor quality video: Evidence from security surveillance. Psychological Science, 10:243--248, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Dhamija and A. Perrig. Déjà vu: A user study, using images for authentication. In Proc. 9th USENIX Security Symp., Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In Proc. 1st Symp. on Usable Privacy and Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Goldstein and J. E. Chance. Visual recognition memory for complex configurations. Perception and Psychophysics, 9:237--241, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Golle and D. Wagner. Cryptanalysis of a cognitive authentication scheme. In Proc. of the 2007 IEEE Symposium on Security and Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. L. Gregory. The Intelligent Eye. 1970.Google ScholarGoogle Scholar
  13. A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki. A user authentication system using schema of visual memory. In Proc. BioADIT'06, pages 338--345, Jan. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Z. Henderson, V. Bruce, and M. Burton. Matching the faces of robbers captured on video. Applied Cognitive Psychology, 15:445--464, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  15. G. J. Holzmann. Beyond Photography: The Digital Darkroom. Prentice Hall, June 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. Jermyn, A. Mayer, F. M. M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In Proc. 8th USENIX Security Symp., Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Kinjo and J. G. Snodgrass. Does the generation effect occur for pictures? Amer. J. of Psych., 6:156--163, 2000.Google ScholarGoogle Scholar
  18. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. In Proc. SPIE: Optical Security and Counterfeit Deterrence Techniques IV, volume 4677, pages 275--289, Jan. 2002.Google ScholarGoogle ScholarCross RefCross Ref
  19. W. Moncur and G. Leplâtre. Pictures at the ATM: exploring the usability of multiple graphical passwords. In Proc. ACM CHI, pages 887--894, Apr. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. F. Monrose, D. Davis, and M. Reiter. On user choice to graphical password schemes. In Proc. of the 13th USENIX Security Symp., pages 151--164, San Diego, CA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Real User Corporation. The science behind Passfaces, 2001. http://www.realusers.com.Google ScholarGoogle Scholar
  22. H. Sasamoto, N. Christin, and E. Hayashi. Undercover: Authentication usable in front of prying eyes. In Proceedings of 2008 ACM Symposium on Computer-Human Interaction (CHI'08), Florence, Italy, Apr. 2008. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Shepard. Recognition memory for words, sentences and pictures. J. Verbal Learning and Verbal Behavior, 113(1):95--121, 1967.Google ScholarGoogle Scholar
  24. Sony Corporation. Overview of FeliCa. http://www.sony.net/Products/felica/abt/dvs.html.Google ScholarGoogle Scholar
  25. L. Standing, J. Conezio, and R. N. Haber. Perception and memory for pictures: single trial learning of 2,500 visual stimuli. Psychonomic Sci., 19(2):73--74, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  26. A. Stubblefield and D. Simon. Inkblot authentication. Technical Report MSR-TR-2004-85, Aug. 2004.Google ScholarGoogle Scholar
  27. J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symp., Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Thorpe and P. van Oorschot. Towards secure design choices for implementing graphical passwords. In Proc. 20th ACSAC, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Thorpe and P. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proc. 16th USENIX Security Symp., Aug. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. Weinshall. Cognitive authentication schemes safe against spyware. In Proc. IEEE Symp. Sec. and Privacy, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In HCI International, July 2005.Google ScholarGoogle Scholar
  32. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: effects of tolerance and image choice. In Proc. of the 1st Symp. Usable Privacy and Security, pages 1--12, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Use Your Illusion: secure authentication usable anywhere

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security
          July 2008
          145 pages
          ISBN:9781605582764
          DOI:10.1145/1408664

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 July 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader