Preventions and Features of Camera Based Attacks on Smart Phones

Generally, when talking about privacy protection, most Smartphone users pay attention to the safety of SMS, emails, contact lists, calling histories, location information and private files. Since they are mobile and used as everyday gadgets, they are susceptible to get lost or stolen. Hence, access control mechanisms such as user authentication are required to prevent the data from being accessed by an attacker. However, commonly used authentication mechanisms like PINs, passwords and android unlock patterns suffer from the same weakness: they are all vulnerable against different kinds of attacks, most notably shoulder-surfing.

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Resource Details

Provided by:
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Topic:
Mobility
Format:
PDF