An authentication scheme based upon face recognition for the mobile environment

Yong Guk Kim, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is well known that humans are far better in recalling person’s face than his name. One of the promising approaches for devising a secure password scheme would be using a set of images as passwords rather than conventional PIN numbers. We have investigated such potential using an experimental paradigm by which security and usability for three different categories of images (i.e. landscapes scenes, random faces, familiar faces) can be compared. The results suggest that performance of the subjects was reliably higher for the “familiar faces” case than for other cases. Issues such as “Known-face attack” and “Camera Attack” were discussed. We propose a more secure, and yet usable, visual password system by exploiting human’s innate capability of fast face identification against serial images of faces and implement it on a PDA for using within the pervasive and mobile environment.

Original languageEnglish
Title of host publicationComputational and Information Science - 1st International Symposium, CIS 2004, Proceedings
EditorsJun Zhang, Ji-Huan He, Yuxi Fu
PublisherSpringer Verlag
Pages274-279
Number of pages6
ISBN (Print)9783540241270
Publication statusPublished - 2005 Jan 1
Event1st International Symposium on Computational and Information Science, CIS 2004 - Shanghai, China
Duration: 2004 Dec 162004 Dec 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3314 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Symposium on Computational and Information Science, CIS 2004
CountryChina
CityShanghai
Period04/12/1604/12/18

Fingerprint

Personal digital assistants
Face recognition
Face Recognition
Authentication
Cameras
Face
Password
Attack
Usability
Person
Camera
Paradigm

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Kim, Y. G., & Kwon, T. (2005). An authentication scheme based upon face recognition for the mobile environment. In J. Zhang, J-H. He, & Y. Fu (Eds.), Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings (pp. 274-279). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3314 LNCS). Springer Verlag.
Kim, Yong Guk ; Kwon, Taekyoung. / An authentication scheme based upon face recognition for the mobile environment. Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. editor / Jun Zhang ; Ji-Huan He ; Yuxi Fu. Springer Verlag, 2005. pp. 274-279 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5d6224a585e64385bfb5b0d8b5ecfd15,
title = "An authentication scheme based upon face recognition for the mobile environment",
abstract = "It is well known that humans are far better in recalling person’s face than his name. One of the promising approaches for devising a secure password scheme would be using a set of images as passwords rather than conventional PIN numbers. We have investigated such potential using an experimental paradigm by which security and usability for three different categories of images (i.e. landscapes scenes, random faces, familiar faces) can be compared. The results suggest that performance of the subjects was reliably higher for the “familiar faces” case than for other cases. Issues such as “Known-face attack” and “Camera Attack” were discussed. We propose a more secure, and yet usable, visual password system by exploiting human’s innate capability of fast face identification against serial images of faces and implement it on a PDA for using within the pervasive and mobile environment.",
author = "Kim, {Yong Guk} and Taekyoung Kwon",
year = "2005",
month = "1",
day = "1",
language = "English",
isbn = "9783540241270",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "274--279",
editor = "Jun Zhang and Ji-Huan He and Yuxi Fu",
booktitle = "Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings",
address = "Germany",

}

Kim, YG & Kwon, T 2005, An authentication scheme based upon face recognition for the mobile environment. in J Zhang, J-H He & Y Fu (eds), Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3314 LNCS, Springer Verlag, pp. 274-279, 1st International Symposium on Computational and Information Science, CIS 2004, Shanghai, China, 04/12/16.

An authentication scheme based upon face recognition for the mobile environment. / Kim, Yong Guk; Kwon, Taekyoung.

Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. ed. / Jun Zhang; Ji-Huan He; Yuxi Fu. Springer Verlag, 2005. p. 274-279 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3314 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - An authentication scheme based upon face recognition for the mobile environment

AU - Kim, Yong Guk

AU - Kwon, Taekyoung

PY - 2005/1/1

Y1 - 2005/1/1

N2 - It is well known that humans are far better in recalling person’s face than his name. One of the promising approaches for devising a secure password scheme would be using a set of images as passwords rather than conventional PIN numbers. We have investigated such potential using an experimental paradigm by which security and usability for three different categories of images (i.e. landscapes scenes, random faces, familiar faces) can be compared. The results suggest that performance of the subjects was reliably higher for the “familiar faces” case than for other cases. Issues such as “Known-face attack” and “Camera Attack” were discussed. We propose a more secure, and yet usable, visual password system by exploiting human’s innate capability of fast face identification against serial images of faces and implement it on a PDA for using within the pervasive and mobile environment.

AB - It is well known that humans are far better in recalling person’s face than his name. One of the promising approaches for devising a secure password scheme would be using a set of images as passwords rather than conventional PIN numbers. We have investigated such potential using an experimental paradigm by which security and usability for three different categories of images (i.e. landscapes scenes, random faces, familiar faces) can be compared. The results suggest that performance of the subjects was reliably higher for the “familiar faces” case than for other cases. Issues such as “Known-face attack” and “Camera Attack” were discussed. We propose a more secure, and yet usable, visual password system by exploiting human’s innate capability of fast face identification against serial images of faces and implement it on a PDA for using within the pervasive and mobile environment.

UR - http://www.scopus.com/inward/record.url?scp=85029919520&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85029919520&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:85029919520

SN - 9783540241270

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 274

EP - 279

BT - Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings

A2 - Zhang, Jun

A2 - He, Ji-Huan

A2 - Fu, Yuxi

PB - Springer Verlag

ER -

Kim YG, Kwon T. An authentication scheme based upon face recognition for the mobile environment. In Zhang J, He J-H, Fu Y, editors, Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings. Springer Verlag. 2005. p. 274-279. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).