Title :
Photographic authentication through untrusted terminals
Author :
Pering, Trevor ; Sundar, Murali ; Light, John ; Want, Roy
Abstract :
As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person´s ability to recognize personal photographs. The results from the authors´ study demonstrate that this technique can reasonably withstand replay attacks, a common vulnerability of many existing techniques.
Keywords :
Internet; message authentication; personal photograph recognition; photographic authentication; replay attacks; untrusted public Internet terminals; Authentication; Cameras; Data security; Digital photography; Image databases; Internet; Protection; Prototypes; Resists; System testing;
Journal_Title :
Pervasive Computing, IEEE
DOI :
10.1109/MPRV.2003.1186723