Image-feature based human identification protocols on limited display devices

Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq Ur Rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages211-224
Number of pages14
Volume5379 LNCS
DOIs
Publication statusPublished - 2009 Nov 9
Event9th International Workshop on Information Security Applications, WISA 2008 - Jeju Island, Korea, Republic of
Duration: 2008 Sep 232008 Sep 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5379 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other9th International Workshop on Information Security Applications, WISA 2008
CountryKorea, Republic of
CityJeju Island
Period08/9/2308/9/25

Fingerprint

Mobile devices
Display
Display devices
Authentication
Mobile Devices
Usability
Data storage equipment
User Authentication
Minor
Strictly
Trade-offs
Human
Binary

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., ... Fernandes, M. (2009). Image-feature based human identification protocols on limited display devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5379 LNCS, pp. 211-224). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5379 LNCS). https://doi.org/10.1007/978-3-642-00306-6_16

Image-feature based human identification protocols on limited display devices. / Jameel, Hassan; Shaikh, Riaz Ahmed; Hung, Le Xuan; Wei, Yuan Wei; Raazi, Syed Muhammad Khaliq Ur Rehman; Canh, Ngo Trong; Lee, Sungyoung; Lee, Heejo; Son, Yuseung; Fernandes, Miguel.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS 2009. p. 211-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jameel, H, Shaikh, RA, Hung, LX, Wei, YW, Raazi, SMKUR, Canh, NT, Lee, S, Lee, H, Son, Y & Fernandes, M 2009, Image-feature based human identification protocols on limited display devices. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 5379 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5379 LNCS, pp. 211-224, 9th International Workshop on Information Security Applications, WISA 2008, Jeju Island, Korea, Republic of, 08/9/23. https://doi.org/10.1007/978-3-642-00306-6_16
Jameel H, Shaikh RA, Hung LX, Wei YW, Raazi SMKUR, Canh NT et al. Image-feature based human identification protocols on limited display devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS. 2009. p. 211-224. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-00306-6_16
Jameel, Hassan ; Shaikh, Riaz Ahmed ; Hung, Le Xuan ; Wei, Yuan Wei ; Raazi, Syed Muhammad Khaliq Ur Rehman ; Canh, Ngo Trong ; Lee, Sungyoung ; Lee, Heejo ; Son, Yuseung ; Fernandes, Miguel. / Image-feature based human identification protocols on limited display devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS 2009. pp. 211-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{e202ca7a6d7041e69684dea83bbdc212,
title = "Image-feature based human identification protocols on limited display devices",
abstract = "We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.",
author = "Hassan Jameel and Shaikh, {Riaz Ahmed} and Hung, {Le Xuan} and Wei, {Yuan Wei} and Raazi, {Syed Muhammad Khaliq Ur Rehman} and Canh, {Ngo Trong} and Sungyoung Lee and Heejo Lee and Yuseung Son and Miguel Fernandes",
year = "2009",
month = "11",
day = "9",
doi = "10.1007/978-3-642-00306-6_16",
language = "English",
isbn = "3642003052",
volume = "5379 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "211--224",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Image-feature based human identification protocols on limited display devices

AU - Jameel, Hassan

AU - Shaikh, Riaz Ahmed

AU - Hung, Le Xuan

AU - Wei, Yuan Wei

AU - Raazi, Syed Muhammad Khaliq Ur Rehman

AU - Canh, Ngo Trong

AU - Lee, Sungyoung

AU - Lee, Heejo

AU - Son, Yuseung

AU - Fernandes, Miguel

PY - 2009/11/9

Y1 - 2009/11/9

N2 - We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

AB - We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

UR - http://www.scopus.com/inward/record.url?scp=70350647479&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350647479&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-00306-6_16

DO - 10.1007/978-3-642-00306-6_16

M3 - Conference contribution

AN - SCOPUS:70350647479

SN - 3642003052

SN - 9783642003059

VL - 5379 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 211

EP - 224

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -