New system for protecting picture passwords using adjustable distortion

System Configuration and user interface of EYEDi: (a) First, a legitimate user registers several key images from his or her mobile device or PC. In our experiment, the number of key images was five. For simplification, this illustration shows three key images. The key image is stored in a database, and the experimenter prepares a dummy image in advance. (b) The key image is randomly cropped to a size of 4/5. Crop processing makes it difficult for the attacker to find the cue since the feature points in the key image appear and disappear with each authentication. (c) Three image processing …

Be the first to comment

Leave a Reply

Your email address will not be published.