Skip to main content

High-Entropy Visual Identification for Touch Screen Devices

  • Conference paper
Information Security Practice and Experience (ISPEC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7232))

  • 834 Accesses

Abstract

We exhibit a system for improving the quality of user-derived keying material on touch-screen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part of) a strong secret key from a user’s act of identifying to the device. Our system uses visual cryptography [21], using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on the touch-screen. Our scheme is similar to the identification scheme of [22] but tailored for constrained, touch-screen displays.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Warinschi, B.: Password-Based Encryption Analyzed. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 664–676. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Abeni, P., Baltatu, M., D’Alessandro, R.: User authentication based on face recognition with support vector machines. In: CRV 2006: Proceedings of the The 3rd Canadian Conference on Computer and Robot Vision, p. 42. IEEE Computer Society (2006)

    Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MATH  Google Scholar 

  4. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2), 143–161 (2001)

    Article  MATH  Google Scholar 

  5. Chang, C.C., Yu, T.X.: Sharing a secret gray image in multiple images. In: Proceedings of the First International Symposium on Cyber Worlds, pp. 230–237 (2002)

    Google Scholar 

  6. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3), 261–276 (2007)

    Article  MATH  Google Scholar 

  7. Dhamija, R., Perrig, A.: Déjà vu: a user study using images for authentication. In: SSYM 2000: Proceedings of the 9th Conference on USENIX Security Symposium, p. 4. USENIX Association (2000)

    Google Scholar 

  8. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  9. Farzin, H., Abrishami-Moghaddam, H., Moin, M.S.: A novel retinal identification system. EURASIP Journal on Advances in Signal Processing, 10 (2008)

    Google Scholar 

  10. Fitts, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology 47(6), 381–391 (1954)

    Article  Google Scholar 

  11. Greveler, U.: VTANs - eine anwendung visueller kryptographie in der online-sicherheit. In: GI Jahrestagung (2) 2007, pp. 210–214 (2007)

    Google Scholar 

  12. Hick, W.E.: On the rate of gain of information. Quarterly Journal of Experimental Psychology (4), 11–26 (1952)

    Google Scholar 

  13. Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 36(7), 1619 (2003)

    Article  Google Scholar 

  14. Jain, L., et al. (eds.): Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press (1999)

    Google Scholar 

  15. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging 14(3), 33019 (2005)

    Article  Google Scholar 

  16. Kim, M.R., Park, J.H., Zheng, Y.: Human-machine identification using visual cryptography. In: Proc. the 6th IEEE Int. Workshop on Intelligent Signal Processing and Communication Systems, pp. 178–182 (1998)

    Google Scholar 

  17. Laboratories, R.: Pkcs #5: Password-based cryptography standard, v2.0 (1999), ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2-0.pdf

  18. Lenovo: Thinkvantage®  client security solution, http://www.pc.ibm.com/us/think/thinkvantagetech/security.html

  19. Ltda., A.S.: Fingerauth password manager, http://www.fingerauth.com/

  20. Mackenzie, S.I., Soukoreff, W.R.: Text entry for mobile computing: Models and methods, theory and practice. Human-Computer Interaction 17(2 & 3), 147–198 (2002)

    Article  Google Scholar 

  21. Naor, M., Shamir, A.: Visual cryptography. Tech. rep. (1994)

    Google Scholar 

  22. Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

  23. OpenIntents: OI Safe, http://www.openintents.org/en/node/205

  24. Paul, N., Evans, D., Rubin, A.D., Wallach, D.S.: Authentication for remote voting. In: Workshop on Human-Computer Interaction and Security Systems (2003)

    Google Scholar 

  25. Pavaday, N., Soyjaudah, K.: A comparative study of secret code variants in terms of keystroke dynamics, pp. 133–140 (2008)

    Google Scholar 

  26. Admit One Security: Keystroke dynamics, http://www.biopassword.com/keystroke_dynamics_advantages.asp

  27. Yang, C.N., Laih, C.S.: New colored visual secret sharing schemes. Des. Codes Cryptography 20(3), 325–336 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  28. Youmaran, R., Adler, A., Miri, A.: An improved visual cryptography scheme for secret hiding. In: 23rd Biennial Symposium on Communications, pp. 340–343 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Filardo, N.W., Ateniese, G. (2012). High-Entropy Visual Identification for Touch Screen Devices. In: Ryan, M.D., Smyth, B., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2012. Lecture Notes in Computer Science, vol 7232. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29101-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29101-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29100-5

  • Online ISBN: 978-3-642-29101-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics