Image-feature based human identification protocols on limited display devices

Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq Ur Rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.

Original languageEnglish
Title of host publicationInformation Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers
Pages211-224
Number of pages14
DOIs
Publication statusPublished - 2009
Event9th International Workshop on Information Security Applications, WISA 2008 - Jeju Island, Korea, Republic of
Duration: 2008 Sep 232008 Sep 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5379 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Workshop on Information Security Applications, WISA 2008
CountryKorea, Republic of
CityJeju Island
Period08/9/2308/9/25

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Image-feature based human identification protocols on limited display devices'. Together they form a unique fingerprint.

  • Cite this

    Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y., & Fernandes, M. (2009). Image-feature based human identification protocols on limited display devices. In Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers (pp. 211-224). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5379 LNCS). https://doi.org/10.1007/978-3-642-00306-6_16