Visual Image Authentication

Open Access
Article
Conference Proceedings
Authors: Michael Fiske

Abstract: Malware plays a critical role in breaching computer systems. Cybersecurity research has primarily focused on malware detection. Detection methods are currently up against fundamental limits in theoretical computer science. The purpose of visual image authentication is to create Artificial Intelligence (AI) problems that are easy for humans to understand, yet also hinder malware from understanding or capturing a human user’s credentials or keys. Human visual intelligence still surpasses AI visual recognition systems, particularly when a problem is undefined, or visual occlusions or distracting objects occur in the image. Our technology can exploit AI weaknesses because overlapping, outlining and distracting can help hinder AI recognition of visual images.

Keywords: Human-Computer Interaction, Artificial Intelligence, Malware, Visual Image One-Time Passcodes

DOI: 10.54941/ahfe100864

Cite this paper:

Downloads
236
Visits
722
Download