Paper Abstract and Keywords |
Presentation |
2020-12-17 10:30
Key Icon Concealed Graphical Authentication System Using Image Distortion Takayuki Kawamura (Tsukuba Univ.), Toshio Suzuki (TUS), Keiichi Zempo (Tsukuba Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Graphical authentication systems has an advantage over existing letters password systems in that it is easier to remember. However, there is a problem that graphical authentication system is vulnerable to Over-the-shoulder attacks. Nevertheless it is difficult to prevent Screenshot attacks because the pattern of the image on the authentication screen is always the same. In other words, there is a need to generate various patterns on the authentication screen. In this study, we propose a key icon concealed type graphical authentication using distorted images. Legitimate users can register an arbitrary icon as a key icon. The authentication screen is generated by layering randomly placed key icons on a background image and distorting the image with several image processing filters. The distortion process blurs the boundary between the background image and the key icon, and the authentication screen becomes an abstract pattern with the key icon hidden in the image. The user authenticates by selecting the position of the key icon in the skewed authentication screen. The proposed method not only changes the position of the key icon for each authentication, but also creates various patterns on the authentication screen by using different background images, which can prevent Screenshot attacks. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Graphical Authentication System / Over-the-shoulder attacks / Screenshot / key icon / distorted image / / / |
Reference Info. |
IEICE Tech. Rep. |
Paper # |
|
Date of Issue |
|
ISSN |
|
Download PDF |
|
Conference Information |
Committee |
HCGSYMPO |
Conference Date |
2020-12-15 - 2020-12-17 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Online |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
HCGSYMPO |
Conference Code |
2020-12-HCGSYMPO |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Key Icon Concealed Graphical Authentication System Using Image Distortion |
Sub Title (in English) |
|
Keyword(1) |
Graphical Authentication System |
Keyword(2) |
Over-the-shoulder attacks |
Keyword(3) |
Screenshot |
Keyword(4) |
key icon |
Keyword(5) |
distorted image |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takayuki Kawamura |
1st Author's Affiliation |
University of Tsukuba (Tsukuba Univ.) |
2nd Author's Name |
Toshio Suzuki |
2nd Author's Affiliation |
Tokyo University of Science (TUS) |
3rd Author's Name |
Keiichi Zempo |
3rd Author's Affiliation |
University of Tsukuba (Tsukuba Univ.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2020-12-17 10:30:00 |
Presentation Time |
15 minutes |
Registration for |
HCGSYMPO |
Paper # |
|
Volume (vol) |
vol. |
Number (no) |
|
Page |
|
#Pages |
|
Date of Issue |
|