Javascript must be enabled to continue!
Camera Based Two Factor Authentication Through Mobile and Wearable Devices
View through CrossRef
We introduce Pixie, a novel, camera based two factor authentication solution for mobile and wearable devices. A quick and familiar user action of snapping a photo is sufficient for Pixie to simultaneously perform a graphical password authentication and a physical token based authentication, yet it does not require any expensive, uncommon hardware. Pixie establishes trust based on both the knowledge and possession of an arbitrary physical object readily accessible to the user, called trinket. Users choose their trinkets similar to setting a password, and authenticate by presenting the same trinket to the camera. The fact that the object is the trinket, is secret to the user. Pixie extracts robust, novel features from trinket images, and leverages a supervised learning classifier to effectively address inconsistencies between images of the same trinket captured in different circumstances.
Pixie achieved a false accept rate below 0.09% in a brute force attack with 14.3 million authentication attempts, generated with 40,000 trinket images that we captured and collected from public datasets. We identify master images, that match multiple trinkets, and study techniques to reduce their impact.
In a user study with 42 participants over 8 days in 3 sessions we found that Pixie outperforms text based passwords on memorability, speed, and user preference. Furthermore, Pixie was easily discoverable by new users and accurate under field use. Users were able to remember their trinkets 2 and 7 days after registering them, without any practice between the 3 test dates.
Association for Computing Machinery (ACM)
Title: Camera Based Two Factor Authentication Through Mobile and Wearable Devices
Description:
We introduce Pixie, a novel, camera based two factor authentication solution for mobile and wearable devices.
A quick and familiar user action of snapping a photo is sufficient for Pixie to simultaneously perform a graphical password authentication and a physical token based authentication, yet it does not require any expensive, uncommon hardware.
Pixie establishes trust based on both the knowledge and possession of an arbitrary physical object readily accessible to the user, called trinket.
Users choose their trinkets similar to setting a password, and authenticate by presenting the same trinket to the camera.
The fact that the object is the trinket, is secret to the user.
Pixie extracts robust, novel features from trinket images, and leverages a supervised learning classifier to effectively address inconsistencies between images of the same trinket captured in different circumstances.
Pixie achieved a false accept rate below 0.
09% in a brute force attack with 14.
3 million authentication attempts, generated with 40,000 trinket images that we captured and collected from public datasets.
We identify master images, that match multiple trinkets, and study techniques to reduce their impact.
In a user study with 42 participants over 8 days in 3 sessions we found that Pixie outperforms text based passwords on memorability, speed, and user preference.
Furthermore, Pixie was easily discoverable by new users and accurate under field use.
Users were able to remember their trinkets 2 and 7 days after registering them, without any practice between the 3 test dates.
Related Results
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Machine learning techniques for forensic camera model identification and anti-forensic attacks
Machine learning techniques for forensic camera model identification and anti-forensic attacks
The goal of camera model identification is to determine the manufacturer and model of an image's source camera. Camera model identification is an important task in multimedia foren...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Development of a secure multi-factor authentication algorithm for mobile money applications
Development of a secure multi-factor authentication algorithm for mobile money applications
With the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financ...
Development of a secure multi-factor authentication algorithm for mobile money applications
Development of a secure multi-factor authentication algorithm for mobile money applications
With the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financ...
Is a Fitbit a Diary? Self-Tracking and Autobiography
Is a Fitbit a Diary? Self-Tracking and Autobiography
Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spu...

