CyberCode: designing augmented reality environments with visual tags
DARE '00 Proceedings of DARE 2000 on Designing augmented reality environments
The Untrusted Computer Problem and Camera-Based Authentication
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Image stablization for 2D barcode in handheld devices
Proceedings of the 15th international conference on Multimedia
Towards Trustworthy Kiosk Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
OSLO: improving the security of trusted computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Trustworthy and personalized computing on public kiosks
Proceedings of the 6th international conference on Mobile systems, applications, and services
Screen codes: visual hyperlinks for displays
Proceedings of the 9th workshop on Mobile computing systems and applications
Outdoors augmented reality on mobile phone using loxel-based visual feature organization
MIR '08 Proceedings of the 1st ACM international conference on Multimedia information retrieval
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Localization and Segmentation of A 2D High Capacity Color Barcode
WACV '08 Proceedings of the 2008 IEEE Workshop on Applications of Computer Vision
Proceedings of the 13th international conference on Security protocols
Secure mobile computing via public terminals
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Hand Motion and Image Stabilization in Hand-held Devices
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Communication channel established from a display to a device's camera is known as visual channel, and is helpful in securing key exchange protocol [16]. In this paper, we study how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive session, and how such information can be jointly presented in a user-friendly manner, taking into account that the mobile device can only capture and display a small region. Motivated by applications in Kiosk computing and multi-factor authentication, we consider three security models: (1) the mobile device is trusted, (2) at most one of the terminal or the mobile device is dishonest, and (3) both the terminal and device are dishonest but they do not collude or communicate. We give a few protocols and investigate them under the abovementioned models. We point out a form of replay attack that renders some other straightforward implementations cumbersome to use. To enhance user-friendliness, we propose a solution using visual cues embedded into the 2D barcodes and incorporate the framework of "augmented reality" for easy verifications through visual inspection. We give a proof-of-concept implementation to show that our scheme is feasible in practice.