Abstract
We exhibit a system for improving the quality of user-derived keying material on touch-screen devices. We allow a device to recover previously generated, highly entropic data suitable for use as (part of) a strong secret key from a user’s act of identifying to the device. Our system uses visual cryptography [21], using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on the touch-screen. Our scheme is similar to the identification scheme of [22] but tailored for constrained, touch-screen displays.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Warinschi, B.: Password-Based Encryption Analyzed. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 664–676. Springer, Heidelberg (2005)
Abeni, P., Baltatu, M., D’Alessandro, R.: User authentication based on face recognition with support vector machines. In: CRV 2006: Proceedings of the The 3rd Canadian Conference on Computer and Robot Vision, p. 42. IEEE Computer Society (2006)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2), 143–161 (2001)
Chang, C.C., Yu, T.X.: Sharing a secret gray image in multiple images. In: Proceedings of the First International Symposium on Cyber Worlds, pp. 230–237 (2002)
Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3), 261–276 (2007)
Dhamija, R., Perrig, A.: Déjà vu: a user study using images for authentication. In: SSYM 2000: Proceedings of the 9th Conference on USENIX Security Symposium, p. 4. USENIX Association (2000)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97–139 (2008)
Farzin, H., Abrishami-Moghaddam, H., Moin, M.S.: A novel retinal identification system. EURASIP Journal on Advances in Signal Processing, 10 (2008)
Fitts, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology 47(6), 381–391 (1954)
Greveler, U.: VTANs - eine anwendung visueller kryptographie in der online-sicherheit. In: GI Jahrestagung (2) 2007, pp. 210–214 (2007)
Hick, W.E.: On the rate of gain of information. Quarterly Journal of Experimental Psychology (4), 11–26 (1952)
Hou, Y.C.: Visual cryptography for color images. Pattern Recognition 36(7), 1619 (2003)
Jain, L., et al. (eds.): Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press (1999)
Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging 14(3), 33019 (2005)
Kim, M.R., Park, J.H., Zheng, Y.: Human-machine identification using visual cryptography. In: Proc. the 6th IEEE Int. Workshop on Intelligent Signal Processing and Communication Systems, pp. 178–182 (1998)
Laboratories, R.: Pkcs #5: Password-based cryptography standard, v2.0 (1999), ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2-0.pdf
Lenovo: Thinkvantage® client security solution, http://www.pc.ibm.com/us/think/thinkvantagetech/security.html
Ltda., A.S.: Fingerauth password manager, http://www.fingerauth.com/
Mackenzie, S.I., Soukoreff, W.R.: Text entry for mobile computing: Models and methods, theory and practice. Human-Computer Interaction 17(2 & 3), 147–198 (2002)
Naor, M., Shamir, A.: Visual cryptography. Tech. rep. (1994)
Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)
OpenIntents: OI Safe, http://www.openintents.org/en/node/205
Paul, N., Evans, D., Rubin, A.D., Wallach, D.S.: Authentication for remote voting. In: Workshop on Human-Computer Interaction and Security Systems (2003)
Pavaday, N., Soyjaudah, K.: A comparative study of secret code variants in terms of keystroke dynamics, pp. 133–140 (2008)
Admit One Security: Keystroke dynamics, http://www.biopassword.com/keystroke_dynamics_advantages.asp
Yang, C.N., Laih, C.S.: New colored visual secret sharing schemes. Des. Codes Cryptography 20(3), 325–336 (2000)
Youmaran, R., Adler, A., Miri, A.: An improved visual cryptography scheme for secret hiding. In: 23rd Biennial Symposium on Communications, pp. 340–343 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Filardo, N.W., Ateniese, G. (2012). High-Entropy Visual Identification for Touch Screen Devices. In: Ryan, M.D., Smyth, B., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2012. Lecture Notes in Computer Science, vol 7232. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29101-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-29101-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29100-5
Online ISBN: 978-3-642-29101-2
eBook Packages: Computer ScienceComputer Science (R0)