By Topic

Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original images corresponding to the unclear pass-images. These unclear images are meaningless to unauthorized users. Hence, it is difficult for attackers to memorize these unclear pass-images, even though they may have observed legitimate users' authentication trials. However, as long as the same pass-images are always used, it would not be completely impossible for unauthorized users to memorize unclear-images. Therefore, this paper discusses enhancement to the authentication system by permitting users to memorize a number of pass-images and using a different subset of pass-images at all authentication trials. To mitigate the burden imposed by memorizing additional pass-images in the enhanced system, we modified it by extracting a certain number of images from a video sequence. The pass-images were obtained by making the extracted images unclear. As only legitimate users were allowed to view the video sequence in their registration phase, only they could understand what the unclear pass-images meant. Thus, the unclear pass-images become easy for legitimate users to memorize. We verified the effectiveness of the enhanced system through comparative experiments.

Published in:

22nd International Conference on Advanced Information Networking and Applications (aina 2008)

Date of Conference:

25-28 March 2008