Use Your Illusion: Secure Authentication Usable Anywhere
Author(s): Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig

Date: 2008
Publication: Proceedings of the 4th Symposium On Usable Privacy and Security, SOUPS '08
Page(s): 35 - 45
Publisher: ACM
Source 1: http://www.cs.cmu.edu/~ehayashi/papers/HCDP-SOUPS08.pdf
Source 2: http://cups.cs.cmu.edu/soups/2008/proceedings/p35Hayashi.pdf
Source 3: http://dx.doi.org/10.1145/1408664.1408670 - Subscription or payment required

Abstract or Summary:
In this paper, we propose and evaluate Use Your Illusion, a novel mechanism for user authentication that is secure and usable regardless of the size of the device on which it is used. Our system relies on the human ability to recognize a degraded version of a previously seen image. We illustrate how distorted images can be used to maintain the usability of graphical password schemes while making them more resilient to social engineering or observation attacks. Because it is difficult to mentally "revert" a degraded image, without knowledge of the original image, our scheme provides a strong line of defense against impostor access, while preserving the desirable memorability properties of graphical password schemes.

Using low-fidelity tests to aid in the design, we implement prototypes of Use Your Illusion as i) an Ajax-based web service and ii) on Nokia N70 cellular phones. We conduct a between-subjects usability study of the cellular phone prototype with a total of 99 participants in two experiments. We demonstrate that, regardless of their age or gender, users are very skilled at recognizing degraded versions of self-chosen images, even on small displays and after time periods of one month. Our results indicate that graphical passwords with distorted images can achieve equivalent error rates to those using traditional images, but only when the original image is known.




Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index





[Home] [About Us] [News] [Research]

Copyright © 2016 PasswordResearch.com