Image-Feature Based Human Identification Protocols on Limited Display Devices

  • Authors:
  • Hassan Jameel;Riaz Ahmed Shaikh;Le Xuan Hung;Yuan Wei Wei;Syed Muhammad Raazi;Ngo Trong Canh;Sungyoung Lee;Heejo Lee;Yuseung Son;Miguel Fernandes

  • Affiliations:
  • Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Engineering, Kyung Hee University, Suwon, South Korea 449-701;Department of Computer Science and Engineering, Korea University Anam-dong, Seoul, South Korea 136-701;Institute for Graphic Interfaces, Ehwa Womans University, Seoul, South Korea 120-750;Institute for Graphic Interfaces, Ehwa Womans University, Seoul, South Korea 120-750

  • Venue:
  • Information Security Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.