Presentation 2007-07-19
Advantage of User Authentication Using Unclear Images : Automatic Generation of Decoy Images
Takumi YAMAMOTO, Atsushi HARADA, Takeo ISARIDA, Masakatsu NISHIGAKI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We have recently proposed an user authentication system using "unclear images" as pass-images, in which only the legitimate users can understand their meanings by viewing the original images corresponding to the unclear pass-images. These unclear images are meaningless for illegal users. Hence it is difficult for illegal users to remember the unclear pass-images, even though they observe the legitimate users' authentication trial. This paper reports another advantage of the user authentication system using unclear images; the adaptation of unclear images enables the automatic generation of the decoy images which are displayed along with pass-images in the authentication window. Here, we explore the way of the automatic generation of decoy images.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) image-based authentication / observing attack / unclear image / schema / decoy image
Paper # ISEC2007-44,SITE2007-38
Date of Issue

Conference Information
Committee SITE
Conference Date 2007/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Advantage of User Authentication Using Unclear Images : Automatic Generation of Decoy Images
Sub Title (in English)
Keyword(1) image-based authentication
Keyword(2) observing attack
Keyword(3) unclear image
Keyword(4) schema
Keyword(5) decoy image
1st Author's Name Takumi YAMAMOTO
1st Author's Affiliation Graduate School of Informatics, Shizuoka University()
2nd Author's Name Atsushi HARADA
2nd Author's Affiliation Mitsubishi Electric Corporation
3rd Author's Name Takeo ISARIDA
3rd Author's Affiliation Faculty of Informatics, Shizuoka University
4th Author's Name Masakatsu NISHIGAKI
4th Author's Affiliation Graduate School of Science and Technology, Shizuoka University
Date 2007-07-19
Paper # ISEC2007-44,SITE2007-38
Volume (vol) vol.107
Number (no) 139
Page pp.pp.-
#Pages 8
Date of Issue