{"title":"Security analysis of and proposal for image-based authentication","authors":"R. Newman, P. Harsh, P. Jayaraman","doi":"10.1109/CCST.2005.1594881","DOIUrl":null,"url":null,"abstract":"Most human authentication systems have been text-based. Recent psychological studies show users' inability to recall random character sequences. Image-based authentication systems have shown promise in circumventing this problem. In addition, they are more intuitive and user-friendly. This paper presents and analyzes a user authentication technique using images that can be used in local as well as remote authentication. We also consider TEMPEST and other forms of attack.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23
Abstract
Most human authentication systems have been text-based. Recent psychological studies show users' inability to recall random character sequences. Image-based authentication systems have shown promise in circumventing this problem. In addition, they are more intuitive and user-friendly. This paper presents and analyzes a user authentication technique using images that can be used in local as well as remote authentication. We also consider TEMPEST and other forms of attack.