The Community for Technology Leaders
Green Image
Issue No. 01 - January-March (2003 vol. 2)
ISSN: 1536-1268
pp: 30-36
Trevor Pering , Intel Research
John Light , Intel Research
Murali Sundar , Intel Research
Roy Want , Intel Research
<p>Photographic authentication is a technique for logging into untrusted public Internet access terminals. It leverages a person?s ability to recognize personal photographs by asking users to identify their own personal photographs from a set of randomized images. By changing the specific images shown on each login attempt, this technique is resilient to replay attacks, which are when an "overheard" login sequence is replayed verbatim to unscrupulously gain access to a system. A prototype implementation and corresponding user-tests show that not only are participants extremely adept at quickly and accurately recognizing their own photographs, but attackers can?t reliably determine which photographs are "correct" even when given samples of a user's photographs.</p>
Insecure authentication, digital photography, graphical passwords, public terminals
Trevor Pering, John Light, Murali Sundar, Roy Want, "Photographic Authentication through Untrusted Terminals", IEEE Pervasive Computing, vol. 2, no. , pp. 30-36, January-March 2003, doi:10.1109/MPRV.2003.1186723
89 ms
(Ver 3.3 (11022016))