LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Gao, Haichang; Ren, Zhongjie; Chang, Xiuling; Liu, Xiyang; Aickelin, Uwe
Languages: English
Types: Unknown
Subjects: Computer Science - Human-Computer Interaction, Computer Science - Computers and Society, Computer Science - Cryptography and Security
Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are easier to attack. The crux of the problem is users' memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. We introduce baroque music to the PassPoints graphical password scheme and conduct a laboratory study in this paper. Results shown that there is no statistic difference between the music group and the control group without music in short-term recall experiments, both had high recall success rates. But in long-term recall, the music group performed significantly better. We also found that the music group tended to set significantly more complicated passwords, which are usually more resistant to dictionary and other guess attacks. But compared with the control group, the music group took more time to log in both in short-term and long-term tests. Besides, it appears that background music does not work in terms of hotspots.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] G. E. Blonder. Graphical password. US Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.
    • [2] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot. Influencing users towards better passwords: Persuasive cued click-points. In British Computer Society Conference on Human-Computer Interaction, 2008.
    • [3] S. Chiasson, P. van Oorschot, and R. Biddle. Graphical password authentication using cued click-points. ESORICS, 2007.
    • [4] D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
    • [5] A. DeAngeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. In International Journal of Human-Computer Studies, 2005.128-152.
    • [6] R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In 9th USENIX Security Symposium, 2000.
    • [7] A. Dirik, N. Memon, and J. Birget. Modeling user choice in the passpoints graphical password scheme. In Symp. on Usable Privacy and Security, 2007.
    • [8] G. Dryden and J. Vos. The Learning Revolution - To change the way the world learns. Stafford: Network Educational Press, 2001.
    • [9] P. M. Dunpy and J. Yan. Do background images improve a,ˇrdraw a secreta,´s graphical passwords? In Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, 36-47.
    • [10] E. Fassbender, D. Richards, and M. Kavakli. Game engineering approach to the effect of music on learning in virtual-immersive environments. In International Conference on Games Research and Development: CyberGames, Western Australia, 2006.
    • [11] H. Gao, X. Guo, X. Chen, L. Wang, and X. Liu. Yagp: Yet another graphical password strategy. In Annual Computer Security Applications Conference, 2008, 121-129.
    • [12] H. Gao, X. Liu, R. Dai, S. Wang, and X. Chang. Analysis and evaluation of the colorlogin graphical password scheme. In Fifth International Conference on Image and Graphics, 2009, 722-727.
    • [13] K. Higbee. Your Memory: How it Works and How to Improve it, Second ed. Prentice- Hall Press, New York, 1988.
    • [14] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, August 1999.
    • [15] S. Madigan. Picture memory. Imagery, Memory, and Cognition, Lawrence Erlbaum Associates, pages 65-86, 1983.
    • [16] D. Nali and J. Thorpe. Analyzing user choice in graphical passwords. Technical report, School of Information Technology and Engineering, University of Ottawa, Canada, 2004.
    • [17] D. L. Nelson, U. S. Reed, and J. R. Walling. Picture superiority effect. Journal of Experimental Psychology: Human Learning and Memory, 3:485-497, 1977.
    • [18] G. Notoatmodjo. Exploring the weakest link: A study of personal password security. Master's thesis, The University of Auckland, New Zealand, 2007.
    • [19] Passfaces. http://www.realuser.com. Realuser website, Mar 10, 2010.
    • [20] A. S. Patrick, A. C. Long, and S. Flinn. Hci and security systems. In ACM Conference on Human Factors in Computing Systems, Ft. Lauderdale, Florida, USA, 2003.
    • [21] F. Rauscher, G. Shaw, and K. Ky. Music and spatial task performance. Nature, 365(6447):611-611, 1993.
    • [22] X. Suo, Y. Zhu, and G. Owen. Graphical passwords: A survey. In Annual Computer Security Applications Conference, 2005.
    • [23] J. Thorpe and P. Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In USENIX Security Symp, 2007.
    • [24] T. Valentine. An evaluation of the passface personal authentication system. Technical report, Goldsmiths College, University of London, 1998.
    • [25] T. Valentine. Memory for passfaces after a long delay. Technical report, Goldsmiths College, University of London, 1999.
    • [26] D. Weinshall and A. S. Kirkpatrick. Passwords you'll never forget, but can't recall. In International conference for human-computer interaction, 2004.
    • [27] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies, 63:102-127, 2005.
    • [28] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. In Symposium on Usable Privacy and Security, Carnegie-Mellon University, Pittsburgh, 2005.
    • [29] J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security & Privacy, 2, 2004.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article