User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in.

Slides:



Advertisements
Similar presentations
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Advertisements

Design of icons for use by Chinese in Mainland China Interacting with computers 9(1998) Yee-Yin Choong, Gavriel Salvendy Report: Yang Kun, Ou.
AN OVERVIEW BY JAMIE STARKE The Role of Prototyping.
Small Displays Nicole Arksey Information Visualization December 5, 2005 My new kitty, Erwin.
Ch 11 Cognitive Walkthroughs and Heuristic Evaluation Yonglei Tao School of Computing and Info Systems GVSU.
Part 2c: Requirements Chapter 2: How to Gather Requirements: Some Techniques to Use Chapter 3: Finding Out about the Users and the Domain Chapter 4: Finding.
Semester in review. The Final May 7, 6:30pm – 9:45 pm Closed book, ONE PAGE OF NOTES Cumulative Similar format to midterm (probably about 25% longer)
3. Memory and Human Computer Interaction. Memory memory 4 The multi-store model of memory describes how the processes of the stage model of HCI are interconnected.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by.
Verbal Rehearsal, Semantic Elaboration, and Imagery.
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
Prototyping Teppo Räisänen
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
I have lost all my vacation pictures due to memory card corruption. Can I get them back? I have accidently deleted some important Photos, Music files.
Design, goal of design, design process in SE context, Process of design – Quality guidelines and attributes Evolution of software design process – Procedural,
Web Design Process CMPT 281. Outline How do we know good sites from bad sites? Web design process Class design exercise.
Pseudorandom Number Generators. Randomness and Security Many cryptographic protocols require the parties to generate random numbers. All the hashing algorithms.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
A SECURE RECOGNITION BASED ON GRAPHICAL PASSWORD
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
SD 142 – Catherine M. Burns 1 Memory Text p
1 SWE 513: Software Engineering Usability II. 2 Usability and Cost Good usability may be expensive in hardware or special software development User interface.
Computer –the machine the program runs on –often split between clients & servers Human-Computer Interaction (HCI) Human –the end-user of a program –the.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
2009 International Symposium on Ubiquitous Computing System at Beijing, China Hiroaki Kimura, Sota Matsuzawa, and Tatsuo Nakajima Department of Computer.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
CS CS 5150 Software Engineering Lecture 11 Usability 1.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
SPStudio Chris Johnston. What? SPStudio Tool to gather 3D data from digital photographs. Stereo Photogrammetry Give a computer depth perception. Stereo.
Seungwon Yang, Haeyong Chung, Chris North, and Edward A. Fox Virginia Tech, Blacksburg, VA USA 1ETD 2010, June 16-18, Austin, TX.
Florida Atlantic University Designing Web Sites at… 1999 Presented by Administrative Technology Systems Financial Affairs.
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Prototyping What prototyping is The benefits of prototyping Low-fidelity and high-fidelity prototypes, and the advantages of each How to build paper prototypes.
1 Human Computer Interaction Week 7 Prototyping. 2 Introduction Prototyping is a design technique where users can be involved in testing design ideas.
User Interfaces 4 BTECH: IT WIKI PAGE:
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
CS 352, W12 Eric Happe, Daniel Sills, Daniel Thornton, Marcos Zavala, Ben Zoon ANDROID/IOS RPG GAME UI.
Assistive Technology in the Classroom Setting Rebecca Puckett CAE6100 – GQ1 (24494) Dec. 7, 2009.
Understanding Users Cognition & Cognitive Frameworks
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Prototyping. REVIEW : Why a prototype? Helps with: –Screen layouts and information display –Work flow, task design –Technical issues –Difficult, controversial,
Java Fundamentals Usman Ependi UBD
Yonglei Tao School of Computing & Info Systems GVSU Ch 7 Design Guidelines.
User Interface Design In Windows using Blend.
Software Interface Design Features / Issues. Learning Objectives Discuss the features affecting interface design.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
By: Your Name ELEMENTS OF WEB DESIGN. VISUAL APPEAL Optimization of Graphics, for people to stay on your website, your pictures have to load out as soon.
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
Research in Computer Graphics, Visualization and Human- Computer Interaction CSc 8900/9900 Ying Zhu Associate Professor Department of Computer Science.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Authentication Schemes for Session Passwords using Color and Images
Human-Computer Interaction
Wrapping up prototyping
Introduction to Computers
Use Your Illusion: Secure Authentication Usable Anywhere
Secure graphical password system for high traffic public areas
Evaluation of Mobile Interfaces
The Role of Prototyping
Collaborative Collections
REU Summer Research in Computer Security
User interface design.
Medium-fi Prototype 10 Lines by: Team Art Attack! Selina Her
RECHORDS Assignment #6: Med-Fi Prototype
OX Isaac Goldstein Ian Hodge Cody Hankins Mischa Nee
Interactive Medium-Fi Prototyping
Anna Adams Martina Angela Sasse
Presentation transcript:

User Authentication Rachna Dhamija Human Centered Computing Course December 6, 1999 Image Recognition in

 Security systems  human factors?  Passwords  multiple long strings Problem

 Replace text w/ images?  Replace recall w/ recognition  Portfolio  “Random Art” & Real Images A solution

 “Vast, almost limitless memory” for pictures [Haber]  Recognition  Fraction of a sec to remember & recognize [Intraub, Pavio & Codes]  2560 photos for few seconds  90 % recognition rate [Standing, Conezio & Haber]  10,000 photos  2 days, 66% recognized [Standing]  Recall  recall semantics or sketch  “pictures are not only recognized better but are also recalled better than words” [Standing] Visual Memory

 Target population = general computer users  novice/expert users  few passwords/multiple passwords  10 (+20) people interviewed about behavior  10 – 40+ instances vs. 1-7 actual passwords  names, phone numbers, fav movies, ~6 char  tools: majority wrote them down, 2 PIM  minimum effort, never change them  ability to share is a feature  people hate passwords  but prefer them to alternatives Task Analysis

Security: Brute Force Attack 4 Digit PIN = 5 out of 20 images 6 char password = 10 out of 55 BUT most passwords require < brute force!

 Benefits  Images easier to remember  less errors  change more frequently  good for infrequently used passwords?  Images esp Random Art is hard to describe  Vulnerabilities  “shoulder surfing” attack  “intersection” attack Security Analysis (cont)

 Task: create portfolio & login  People can remember images! (4-10)  Photos/art – 50/50 preference & time  Wanted to view portfolio during creation  Must be simple and fast (no click through screens)  Horizontal layout for quick scanning Lo-fi Prototype

 Create 4 “passwords” PIN (4 digits) Password (6 char.) Art portfolio (5/100) Photo portfolio (5/100)  Login PIN Password Art (5/25) Photo (5/25)  Task order- 50% did Art first  Image order  Repeat login after 1 week! Experiment Design

Test Measures Does not include uncompleted tasks sev1: minor sev2: major, recoverable sev3: major, unrecoverable No unrecoverable errors made with portfolios

 Comfort Level  Create portfolio  Login portfolio - wow  Text vs. images  Passwords/PINS faster to create/logon  Photos easier to remember than PINS (short term)  Art vs. photos  Photos easier to remember, schemes, more personal  People chose similar photos, but not art  Interface issues  Scrolling is bad, one screen, thumbnails, single-click  Lack of feedback  # picked so far, which picked??  how to give feedback securely? More Results

1 image selected Changes to next version show # selected hide selected images smaller images

 Potential for use  where text input is hard, limited observation (e.g., ATM, PDA)  infrequent, high availability passwords  Future Directions  Self created images  authenticate: recreate or recognize Conclusions  Random Art + Text  Sharing & collaboration  Other human abilities?

 Houston JP. Fundamentals of learning and memory. 4th ed. Florida: Harcourt Brace Jovanovich;  Ralph Norman Haber. How we remember what we see. Scientific American, 222(5): , May  Lionel Standing. Learning 10,000 pictures. Quarterly Journal of Experimental Psychology, 25: ,  Lionel Standing, Jerry Conezio, and Ralph Norman Haber. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science, 19(2):73-74,  Helene Intraub. Presentation rate and the representation of briefly glimpsed pictures in memory. Journal of Experimental Psychology: Human Learning and Memory, 6(1):1-12,  Hash Visualization: A New Technique to Improve Real-World Security, Adrian Perrig and Dawn Song, in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CryTEC '99) References