A structural similarity assessment for generating hybrid images

We discuss a structural similarity evaluation method in order to generate hybrid images for graphical password. The hybrid image consists of two images. One is edge information of a key image and the other is coarse features of a decoy image. Visibility of the hybrid image depends on the viewing distance and the structural similarity of the images. This property of the hybrid image is useful for preventing shoulder-surfing of graphical password. However, an evaluation method for checking whether the decoy image is appropriate to overlay the key image has not been established. To address this issue, we utilize Speeded Up Robust Features (SURF) to evaluate structural similarity between two images. Simulation results show that our similarity measure mostly coincides with the visibility of a key image. We also compare our objective metric with the structural similarity (SSIM) index and subjective scores obtained from a user test based on Scheffe's method of paired comparisons.

[1]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[2]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[3]  Shigeo Kato,et al.  A study on an image synthesis method for graphical passwords , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[4]  Shigeo Kato,et al.  A study on memorability and shoulder-surfing robustness of graphical password using DWT-based image blending , 2010, 28th Picture Coding Symposium.

[5]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[6]  Nicolas Christin,et al.  Use Your Illusion: secure authentication usable anywhere , 2008, SOUPS '08.

[7]  Antonio Torralba,et al.  Hybrid images , 2006, SIGGRAPH 2006.

[8]  Ying Zhu,et al.  Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[9]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.