Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

User authentication is widely used in automatic teller machines (ATMs) and Internet services. Recently, ATM passwords have been increasingly stolen with the aid of small charge-coupled device camera recordings. This article discusses a means of improving a user authentication method that accepts numerical passwords and that is tolerant to observation attacks. A vicious observation attack, or a video-recording attack, where the user’s password selection operation is video recorded, is well known. Conventionally, a few methods are tolerant when password selection operations are video recorded two times. However, the conventional methods require passwords that are significantly lengthy. This article proposes a user authentication method that is tolerant to attacks when the user’s password selection operation is video recorded two times, even when using shorter passwords, and its security is evaluated..

Keywords :

: password authentication method, video-recording attack, security

References :

  1. The Mitsubishi Tokyo UFJ bank, ‘A bank report about that the camera was put on secretly at the ATM machine by some person’. http://www.bk.mufg.jp/info/ufj/ufj_20051101.html
  2. Bank of Yokohama, ‘A bank report about that equipment for the sneak shot was installed in the unmanned agency (the ATM out of the store)’. http://www.boy.co.jp/info/pdf/9.pdf
  3. M. Une, T. Matsumoto, ‘About the fragilitas about the living body authentication: It studies mainly a fragilitas about the counterfeiting of a stigma by the finance’, Monetary Research, vol. 24, no. 2, pp. 35-84 (2005)
  4. Banno, ‘The recent trend, the forensic science technology of the living body authentication technology’, vol. 12, no. 1, pp. 1-12 (2007)
  5. Secom Co., Ltd., ‘It begins’ the ATM sneak shot damage prevention service ‘by the offer’ http://www.secom.co.jp/corporate /release/2006/nr20060814.html
  6. NEC, ‘The service of the investigation of the detectaphone and the sneak shot receptacle’ http://www.necf.jp/solution-service/office/hiddenmic-camera/
  7. V. Roth, K. Richter, R. Freidinger, ‘A PIN-entry method resilient against shoulder surfing’, CCS’04, pp. 236-245 (Oct 2004)
  8.  H. Zhao, X. Li, ‘S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme’, IEEE Advanced Information Networking and Applications Workshops 2007, pp. 467-472 (2007)
  9. T. Takada, ‘FakePointer: The authentication technique which has tolerance to video recording attacks’, IPSJ Transaction, vol.49, no.9, pp.3051-3061 (Sep 2008)
  10. T. Takada, ‘FakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication’, Cryptography and Information Security Symposium, SCIS2007 (2007)
  11. S. Sakurai, M. Yoshida, T. Munaka, ‘Mobile authentication method’, Computer Security Symposium 2004, pp. 625-630 (Oct 2004)
  12. S. Sakurai, T. Munaka, ‘Resistance evaluation of user authentication method using matrix against shoulder surfing’, IPSJ Transaction, vol. 49, no. 9, pp. 3038-3051 (Sept 2008)
  13. Y. Hirakawa, M. Take, K. Ohzeki, “Pass-Image Authentication Method Tolerant to Random and Video-Recording Attacks”, International Journal of Computer Science and Applications, vol. 9, no. 3, pp. 20-36 (2012)
  14. Y. Hirakawa, ‘Random Board:  Password Authentication Method with Tolerance to Video-Recording Attacks’, International Journal of Innovation Management and Technology, vol. 4, no. 5, pp.455-460 (2013)

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.