LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Chowdhury , Soumyadeb; Poet , Ron; Mackenzie , Lewis (2013)
Publisher: Springer
Languages: English
Types: Conference object
Subjects: usability, [ INFO ] Computer Science [cs], user authentication, QA75, multiple image passwords
Part 1: Long and Short Papers (Continued); International audience; Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In this paper, we present the first published comparison of the usability of multiple graphical passwords with four different image types: Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longitudinal experiment was performed with 100 participants over a period of 8 weeks, to examine the usability performance of each of the image types. The results of the study demonstrate that object images are most usable in the sense of being more memorable and less time-consuming to employ, Mikon images are close behind but doodle and art images are significantly inferior. The results of our study complement cognitive literature on the picture superiority effect, visual search process and nameability of visually complex images.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Adams A, Sasse M.A (1999) Users are Not the Enemy. Communications of the ACM, 40- 46
    • 2. Florencio D, Herley C (2007) A large-scale study of web password habits. In proceedings of 16th International Conference on World Wide Web, University of Calgary, pp. 657-666
    • 3. Brostoff S, Sasse MA (2000) Are passfaces more usable than passwords? A field trial investigation. In proceedings of HCI on People and Computers XIV, pp. 405-424
    • 4. Madigan S. Picture Memory (1983) Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. In: Yuille, J (ed), Hillsdale: Lawrence Erlbaum Associates
    • 5. Paivio A (1986) Mental Representataions:A Dual Coding Approach, Oxford Press, UK.
    • 6. Chowdhury S, Poet R (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In proceeding of Conference on User science and Engineering, pp. 54-58.
    • 7. Davis D, Monrose F, Reiter M (2005) On user choice in graphical password schemes. In proceedings of the Conference on USENIX Security Symposium, vol.13, pp. 11-11
    • 8. Dhamija R, Perrig A (2000) Déjà vu: A user study using images for authentication. In proceedings of the Conference on USENIX Security Symposium, vol. 9, pp. 4-4
    • 9. Renaud K (2005) A Visuo- Biometric Authentication Mechanism for Old Users. In proceeding of British HCI, pp. 167-182
    • 10. Renaud K (2009) Web authentication using Mikon images. In proceedings of World Congress on Privacy, Security, Trust and the management of E-Business, pp. 1-10
    • 11. Moncur W, Leplâtre G (2007) Pictures at the ATM: exploring the usability of multiple graphical passwords. In proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 887-894
    • 12. Everitt K, Bragin T, Fogarty J, KohnoT (2009) A comprehensive study of frequency, interference and training of multiple graphical passwords. In proceedings of Conference on Human Factors in Computing Systems, pp. 889-898
    • 13. SUS questionnaire. Accessed 19th January 2013 http://www.usabilitynet.org/trump/methods/satisfaction.htm.
    • 14. NASA Task Load Index. Accessed 19 January 2013 http://humansystems.arc.nasa.gov/groups/TLX/downloads/TLXScale.pdf
    • 15. Strauss A, Corbin J (1990) Basics of qualitative research: Grounded theory procedures and techniques. Sage, Newbury Park
    • 16. Wolfe M (1994) Guided search 2.0 a revised model of visual search. Psychonomic Bulletin & Review 1(5), pp. 202-238
    • 17. Szekely A, Bates E (1999) Objective visual complexity as a variable in picture naming. CRL Newsletter Center for Research in Language, University of California, pp. 3-33
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Cite this article