Presentation | 2007-07-19 Advantage of User Authentication Using Unclear Images : Automatic Generation of Decoy Images Takumi YAMAMOTO, Atsushi HARADA, Takeo ISARIDA, Masakatsu NISHIGAKI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We have recently proposed an user authentication system using "unclear images" as pass-images, in which only the legitimate users can understand their meanings by viewing the original images corresponding to the unclear pass-images. These unclear images are meaningless for illegal users. Hence it is difficult for illegal users to remember the unclear pass-images, even though they observe the legitimate users' authentication trial. This paper reports another advantage of the user authentication system using unclear images; the adaptation of unclear images enables the automatic generation of the decoy images which are displayed along with pass-images in the authentication window. Here, we explore the way of the automatic generation of decoy images. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | image-based authentication / observing attack / unclear image / schema / decoy image |
Paper # | ISEC2007-44,SITE2007-38 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2007/7/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Advantage of User Authentication Using Unclear Images : Automatic Generation of Decoy Images |
Sub Title (in English) | |
Keyword(1) | image-based authentication |
Keyword(2) | observing attack |
Keyword(3) | unclear image |
Keyword(4) | schema |
Keyword(5) | decoy image |
1st Author's Name | Takumi YAMAMOTO |
1st Author's Affiliation | Graduate School of Informatics, Shizuoka University() |
2nd Author's Name | Atsushi HARADA |
2nd Author's Affiliation | Mitsubishi Electric Corporation |
3rd Author's Name | Takeo ISARIDA |
3rd Author's Affiliation | Faculty of Informatics, Shizuoka University |
4th Author's Name | Masakatsu NISHIGAKI |
4th Author's Affiliation | Graduate School of Science and Technology, Shizuoka University |
Date | 2007-07-19 |
Paper # | ISEC2007-44,SITE2007-38 |
Volume (vol) | vol.107 |
Number (no) | 139 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |