Title :
FakePointer: An Authentication Scheme for Improving Security against Peeping Attacks Using Video Cameras
Author_Institution :
Nat. Inst. of Adv. Ind. Sci. & Technol., Tokyo
fDate :
Sept. 29 2008-Oct. 4 2008
Abstract :
Peeping attacks in the real world are a threat to user authentication. What is worse, an emerging attack method such as video capture makes traditional measures against peeping attack insufficient. This paper presents a unique user authentication scheme named "fakePointer\´\´ as a solution to peeping attacks conducted by video capture. It makes it difficult for attackers to obtain a secret even if someone captures an authentication scene using a video camera. The fakePointer has two unique features to ensure security against such a peeping attack. One is that fakePointer provides a double-layered interface for a secret input. This interface makes it difficult for attackers to identify a legitimate user\´s secret even if they have a video record showing a target user\´s authentication action. The other feature is that fakePointer uses two secrets: a fixed secret and a disposable secret. This feature enables change of a secret input operation in each authentication, which is also a necessary feature for ensuring security. This feature makes it difficult to extract a secret by statistical inference even if an attacker has many video records of the same user.
Keywords :
authorisation; user interfaces; video cameras; video signal processing; FakePointer; peeping attacks; statistical inference; user authentication scheme; video cameras; video capture; Authentication; Cameras; Computer industry; Computer security; Data mining; Mobile computing; National security; Ubiquitous computing; User interfaces; Videoconference; authentication; peeping attack; security; shoulder surfing attack; usable security;
Conference_Titel :
Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM '08. The Second International Conference on
Conference_Location :
Valencia
Print_ISBN :
978-0-7695-3367-4
Electronic_ISBN :
978-0-7695-3367-4
DOI :
10.1109/UBICOMM.2008.76