Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
WLAN Security Threats & Solutions
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
Passwords you'll never forget, but can't recall
CHI '04 Extended Abstracts on Human Factors in Computing Systems
A Novel Image Encryption Scheme Based-on JPEG Encoding
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Introduction to special section on JPEG 2000 digital imaging
IEEE Transactions on Consumer Electronics
Two-dimensional periodically shift variant digital filters
IEEE Transactions on Circuits and Systems for Video Technology
Image scrambling without bandwidth expansion
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Currently, together with the development of wireless connectivity, the need for a reliable and user-friendly authentication system becomes always more important. New applications, as e-commerce or home banking, require a strong level of protection, allowing for verification of legitimate users' identity and enabling the user to distinguish trusted servers from shadow ones. A novel framework for image-based authentication (IBA) is then proposed and evaluated. In order to provide mutual authentication, the proposed method integrates an IBA password technique with a challenge-response scheme based on a shared secret key for image scrambling. The wireless environment is mainly addressed by the proposed system, which tries to overcome the severe constraints on security, data transmission capability, and user friendliness imposed by such environment. In order to achieve such results, the system offers a strong solution for authentication, taking into account usability and avoiding the need for hardware upgrades. Data and application scalability is provided through the JPEG2000 standard and JPIP framework.