An authentication scheme based upon face recognition for the mobile environment

Yong Guk Kim, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is well known that humans are far better in recalling person’s face than his name. One of the promising approaches for devising a secure password scheme would be using a set of images as passwords rather than conventional PIN numbers. We have investigated such potential using an experimental paradigm by which security and usability for three different categories of images (i.e. landscapes scenes, random faces, familiar faces) can be compared. The results suggest that performance of the subjects was reliably higher for the “familiar faces” case than for other cases. Issues such as “Known-face attack” and “Camera Attack” were discussed. We propose a more secure, and yet usable, visual password system by exploiting human’s innate capability of fast face identification against serial images of faces and implement it on a PDA for using within the pervasive and mobile environment.

Original languageEnglish
Title of host publicationComputational and Information Science - 1st International Symposium, CIS 2004, Proceedings
EditorsJun Zhang, Ji-Huan He, Yuxi Fu
PublisherSpringer Verlag
Pages274-279
Number of pages6
ISBN (Print)9783540241270
Publication statusPublished - 2005 Jan 1
Event1st International Symposium on Computational and Information Science, CIS 2004 - Shanghai, China
Duration: 2004 Dec 162004 Dec 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3314 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Symposium on Computational and Information Science, CIS 2004
CountryChina
CityShanghai
Period04/12/1604/12/18

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'An authentication scheme based upon face recognition for the mobile environment'. Together they form a unique fingerprint.

  • Cite this

    Kim, Y. G., & Kwon, T. (2005). An authentication scheme based upon face recognition for the mobile environment. In J. Zhang, J-H. He, & Y. Fu (Eds.), Computational and Information Science - 1st International Symposium, CIS 2004, Proceedings (pp. 274-279). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3314 LNCS). Springer Verlag.