BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)

Slides:



Advertisements
Similar presentations
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Advertisements

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
(Biometrics Consortium)
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Identity Verification in a Networked World
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson.
BIOMETRICS IN RETAIL Ben McDaniel Paul Acken Wesley McAhren.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
A Comparative Usability Study of Two-Factor Authentication Emiliano de Cristofaro 1, Honglu Du 2, Julien Freudiger 2, Gregory Norcie 3 UCL 1, PARC 2, Indiana.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
IEEE Computer Society Report of an Online Survey of Current and Non-Renewing Members May 2012 – version 3.0 EDITED June 20, JMS Prepared by: Robin.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
Public Library National Strategy Working Group Media use and attitudes Past, present and future? Claire Mack Regulatory Affairs Manager.
G53SEC 1 Authentication and Identification Who? What? Where?
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
G53SEC 1 Authentication and Identification Who? What? Where?
WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.
PRESENTATION ON BIOMETRICS
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
3D Password.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometric Security Technology Acceptance Study
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Asst. Prof. Arvind Selwal, CUJ,Jammu
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
A SEMINAR REPORT ON BIOMETRICS
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)

Outline Introduction Motivation Literature Review Research Questions Research Methodology Findings Limitations Future Work

Introduction Increasingly sophisticated mobile devices More data generated, more services available More than 200,000 phones reported stolen each year in Australia alone (AMTA, 2008) How do you protect your phone?

Motivation Improper use of embedded mobile phone security (Clarke & Furnell 2005)  30% believe PIN troublesome  34% disable PIN  66% of those who use PIN  38% forgotten PIN at least once  45% use default PIN  42% change once (after purchase)  13% change more than once

Motivation (Cont) Password and PIN still the most used authentication mechanisms but often result inappropriate use and have memorability issues Token and Biometrics have limitations Research on image based authentication (IBA) shows promise Little focus on usability of new authentication methods

Literature Review The “Security Guard” Analogy Authentication  Something you know  Something you have  Someone you are  Also, someone you know

Literature Review (Cont) PIN and password  Used to be machine generated  Led to user generated  Mobile device needs instantaneous access, authentication in the way get disabled Limitation  Memorability and usability issues  In secure PIN and Password

Literature Review (Cont) Token Authentication  Removes need to remember password  Store digital certificate  Smart media  Transient Authentication Limitation  Extra hardware/cost  Left in situ  Can be forgotten or lost  Use PIN or password as fallback Source: Nicholson, Corner & Noble 2006

Literature Review (Cont) Biometrics  Physiological (Fingerprint, Face, Iris)  Behavioural (Voice, Keystroke pattern, Gait, Signature) Limitation  Extra hardware/cost  Accuracy issues  Privacy issues  Use PIN or password as fallback Source: Furnell, S, Clarke & Karatzouni 2008

Literature Review (Cont) Graphical Based Authentication  Recognition based  Recall based Source: Takada & Koike 2003 Source: Weiss & Luca 2008

Research Questions Questions  Which IBA authenticates faster?  Which IBA has higher authentication success rates?  What are users’ opinionson user authentication and IBA? Contributions  Usability studies for user authentication especially for IBA  Improving user authentication experience can result better acceptance and usage among consumers

Research Methodology Develop prototype Compare PIN, Password, Picture Password, and Awase-E Data Collection  Enrolment and learning  Test 1 (Survey then verification)  Test 2 (Verification after 1 week) Authentication speed and success rate

Findings Authentication Speed Authentication Success Rate User Opinions

Authentication Speed

Authentication Speed Summary Pin was the fastest, speed decreased but significantly faster than other techniques Password was at least twice as slow as PIN Picture Password was similar to password’s speed Awase-E was surprisingly faster than predicted and reported User may still prefer PIN as it is the fastest technique, may tolerate slower authentication if only authenticate once or several times only

Authentication Success Rate

Authentication Success Rate Summary PIN and Password expected to decline over time and did, password did worse Picture Password performed well initially, but experienced a huge drop after a week to 55% Awase-E performed as expected, maintaining high success rate User still prefer PIN and password despite doing worse than Awase-E, probably due to familiarity, 35% still prefer PIN and password despite making an error

User Opinions Authentication Frequency  15% none, 40% once, 25% several times, 20% every time  Total 85% willing to use some sort of authentication Usage of mobile authentication  Only 35% use it – protect data, account, unintended use  65% do not use it – don’t know how to set it up, unnecessary, no significant data, troublesome, time consuming, had never let other people use their phone Opportunities to persuade user to adopt mobile security function, including IBA

User Preference Techniques/PINPasswordPicture PasswordAwase-E Preference0 week1 week0 week1 week0 week1 week0 week1 week Top 115%25%20%35%25%0%45%40% Top 245%50%45%55%45%30%70%65% Preference for PIN due to speed and success rate Preference for Password also increased although it did worse than initially Significant drop for Picture Password expected due to poor performance Awase-E maintained high preference

Limitation and Future work Sample size (20 participants)  Use average, and standard deviation not taken into consideration  Exploratory research to provide indication of the performance of IBA techniques and future research direction Future Research  This research is an exploratory endeavour to provide indication for the usabilities of IBA techniques and also direction for future research  Larger sample size  Incorporate other factors such as age and social groups

References ATMA 2008, '2008 Annual Report', AMTA Publication. Clarke, N & Furnell, S 2005, 'Authentication of users on mobile telephones–A survey of attitudes and practices', Computers & Security, vol. 24, no. 7, pp Furnell, S, Clarke, N & Karatzouni, S 2008, 'Beyond the PIN: Enhancing user authentication for mobile devices', Computer Fraud and Security, vol. 2008, no. 8, pp Nicholson, AJ, Corner, MD & Noble, BD 2006, 'Mobile device security using transient authentication', IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp SliperryBrick, 2006, “LG KE850 Touch Screen Mobile Phone”, viewed 3 June 2009, Takada, T & Koike, H 2003, 'Awase-E: image-based authentication for mobile phones using user's favorite images', Lecture Notes in Computer Science, pp Takada, T, Onuki, T & Koike, H 2006, 'Awase-E: Recognition-based Image Authentication Scheme Using Users’ Personal Photographs', Innovations in Information Technology, 2006, pp Weiss, R & Luca, AD 2008, PassShapes: utilizing stroke based authentication to increase password memorability, ACM, Lund, Sweden.

Q & A Thank You