DocumentCode :
1160735
Title :
Photographic authentication through untrusted terminals
Author :
Pering, Trevor ; Sundar, Murali ; Light, John ; Want, Roy
Volume :
2
Issue :
1
fYear :
2003
Firstpage :
30
Lastpage :
36
Abstract :
As a technique for authentication through untrusted public Internet terminals, photographic authentication relies on a person´s ability to recognize personal photographs. The results from the authors´ study demonstrate that this technique can reasonably withstand replay attacks, a common vulnerability of many existing techniques.
Keywords :
Internet; message authentication; personal photograph recognition; photographic authentication; replay attacks; untrusted public Internet terminals; Authentication; Cameras; Data security; Digital photography; Image databases; Internet; Protection; Prototypes; Resists; System testing;
fLanguage :
English
Journal_Title :
Pervasive Computing, IEEE
Publisher :
ieee
ISSN :
1536-1268
Type :
jour
DOI :
10.1109/MPRV.2003.1186723
Filename :
1186723
Link To Document :
بازگشت