Cognitive passwords: the key to easy access control
Computers and Security
Storytelling with digital photographs
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Content-Based Image Retrieval at the End of the Early Years
IEEE Transactions on Pattern Analysis and Machine Intelligence
End-User Searching Challenges Indexing Practices inthe Digital Newspaper Photo Archive
Information Retrieval
How do people manage their digital photographs?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
Using personal photos as pictorial passwords
CHI '05 Extended Abstracts on Human Factors in Computing Systems
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Time Course of Processes and Representations Supporting Visual Object Identification and Memory
Journal of Cognitive Neuroscience
Give and take: a study of consumer photo-sharing culture and practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The Emperor's New Security Indicators
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
A security class project in graphical passwords
Journal of Computing Sciences in Colleges
MARASIM: a novel jigsaw based authentication scheme using tagging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Facing the facts about image type in recognition-based graphical passwords
Proceedings of the 27th Annual Computer Security Applications Conference
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Recognition-based visual authentication schemes use a variety of different kinds of images. These mechanisms have now matured sufficiently that we should start considering tailoring and fine-tuning them-looking at ways to make them more efficient. Since these mechanisms use images, the obvious starting point in this tailoring process is to consider the image type or genre being used by the mechanism. Images have a number of properties which are bound to influence the efficacy of the visual authentication mechanism. In this paper the notion of essential and tuning image properties is proposed. The former are those that an image must exhibit or possess in order to be used in visual authentication at all-failure to meet these metrics should disqualify the image from use. Tuning properties, on the other hand, are properties that will improve the efficiency of the mechanism. The tuning property which is the focus of this paper is the user's involvement in the production of his/her secret images. A longitudinal study was carried out with a visual authentication system in order to determine the effectivity of images with three levels of user involvement, using randomly issued images from an archive, a set of hand-drawn images called doodles, and user-provided photos. The hand-drawn doodles performed better than both system-issued images and personal photos. Furthermore, whereas doodles demonstrate viability, personal photos have many insuperable problems which make them unsuitable for use in a security setting.