Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This work introduces the basic concepts of authentication explaining their relationship with property protection. The basic functionalities of Challenge-Response frameworks are presented, together with several applications and the future trends. Property Protection and User Authentication in IP Networks

[1]  H. Gish,et al.  Text-independent speaker identification , 1994, IEEE Signal Processing Magazine.

[2]  Kejun Wang,et al.  A study of hand vein recognition method , 2005, IEEE International Conference Mechatronics and Automation, 2005.

[3]  Richard P. Ayers,et al.  Picture Password: A Visual Login Technique for Mobile Devices , 2003 .

[4]  B.S. Atal,et al.  Automatic recognition of speakers from their voices , 1976, Proceedings of the IEEE.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Ying Zhu,et al.  Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[7]  Daniele D. Giusto,et al.  Application-Scalable Image-based Authentication Framework with JPEG2000 , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[8]  Do Van Thanh,et al.  Strong authentication with mobile phone as security token , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[9]  Ashok Samal,et al.  Automatic recognition and analysis of human faces and facial expressions: a survey , 1992, Pattern Recognit..

[10]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[11]  David R. Mackay,et al.  Graphical Authentication: Justifications and Objectives , 2004, AISM.

[12]  E. Fatemizadeh,et al.  Biometric Identification through Hand Geometry , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".

[13]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[14]  Réjean Plamondon,et al.  Automatic Signature Verification: The State of the Art - 1989-1993 , 1994, Int. J. Pattern Recognit. Artif. Intell..

[15]  J.K. Omura Novel applications of cryptography in digital communications , 1990, IEEE Communications Magazine.

[16]  Daniele D. Giusto,et al.  Mutual Image-Based Authentication Framework with JPEG2000 in Wireless Environment , 2006, EURASIP J. Wirel. Commun. Netw..

[17]  T. Tanaka,et al.  Biometric authentication by hand vein patterns , 2004, SICE 2004 Annual Conference.

[18]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[19]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[20]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[21]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[22]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[23]  Sugata Sanyal,et al.  CompChall: addressing password guessing attacks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[24]  Chris J. Mitchell,et al.  Limitations of challenge-response entity authentication , 1989 .

[25]  Rachna Dhamija,et al.  Hash visualization in user authentication , 2000, CHI Extended Abstracts.

[26]  Ken Krechmer,et al.  Standardization and Innovation Policies in the Information Age , 2004, Int. J. IT Stand. Stand. Res..

[27]  Min-Shiang Hwang,et al.  Security enhancement for Optimal Strong-Password Authentication protocol , 2003, OPSR.

[28]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[29]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[30]  Ana González-Marcos,et al.  Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[32]  M. Faundez-Zanuy Biometric verification of humans by means of hand geometry , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[33]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[34]  James Ze Wang,et al.  Exploiting the Human–Machine Gap in Image Recognition for Designing CAPTCHAs , 2009, IEEE Transactions on Information Forensics and Security.

[35]  Xiaoqi Ma,et al.  Verifying and Fixing Password Authentication Protocol , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[36]  Hideki Koike,et al.  Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.

[37]  Giaime Ginesu,et al.  Transmission-Efficient Image-Based Authentication for Mobile Devices , 2005, VLBV.

[38]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[39]  M. Sandirigama,et al.  SAS-3: A polynomial based strong password authentication protocol , 2007, 2007 International Conference on Industrial and Information Systems.

[40]  Munish Sood,et al.  Image Based Authentication System with Sign-In Seal * , 2008 .

[41]  Chin-Chen Chang,et al.  A secure and efficient strong-password authentication protocol , 2004, OPSR.

[42]  Esharenana E. Adomi Frameworks for ICT Policy: Government, Social and Legal Issues , 2010 .

[43]  Richard M. Lindstrom Limits for Qualitative Detection and Quantitative Determination in A Century of Excellence in Measurements, Standards, and Technology - A Chronicle of Selected NBS/NIST Publications, 1901-2000 | NIST , 2001 .

[44]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[45]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).