A Touchscreen Graphical Password
Summary By: Quaniesha H
December 12, 2013
Abstract
We analyze three biometric verification modalities – voice, face and motion – and in addition secret word passage, on a portable gadget, to investigate the relative requests on client time, exertion, blunder and errand interruption. Our research center study furnished perceptions of client movements, techniques, and responses to the validation strategies. Face and voice biometrics conditions were speedier than watchword passage. Talking a Pin was the speediest for biometric specimen entrance, yet fleeting memory review was better in the face check condition. None of the confirmation conditions were recognized exceptionally usable. In conditions that consolidated two biometric entrance routines, the opportunity to get the biometric examples was shorter than if obtained independently yet they were extremely disliked and had high memory assignment blunder rates. These quantitative effects exhibit cognitive and engine contrasts between biometric verification modalities, and brief strategy choices in selecting confirmation. Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. They designed a new graphical password scheme called Touchscreen Multi-layered Drawing specifically for use with touchscreens. They conducted an exploratory user study of three existing graphical passwords on smart phones and tablets with 31 users. From this, they set the design goals for TMD to include addressing input accuracy issues without having to memorize images, while maintaining an appropriately secure password space. Design features include warp cells which allow TMD users to continuously draw their passwords across multiple layers in order to create more complex passwords than normally possible on a small screen.
Introduction
Versatile
References: 1.Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In USENIX Conference on Offensive Technologies (WOOT) (2010). 2.Bao, P., Pierce, J., Whittaker, S., and Zhai, S. Smart phone use by non-mobile business users. In ACM MobileHCI (2011). 3.Biddle, R., Chiasson, S., and Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Computing Survey 44, 4 (Sept. 2012), 19:1--19:41. 4.Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. Influencing users towards better passwords: Persuasive Cued Click-Points. In British HCI Annual Conference (BCS-HCI) (2008). 5.Dunphy, P., Heiner, A. P., and Asokan, N. A closer look at recognition-based graphical passwords on mobile devices. In ACM Symposium on Usable Privacy and Security (SOUPS) (2010). 6.Dunphy, P., and Yan, J. Do background images improve "Draw a Secret" graphical passwords? In ACM Computer and Communications Security (CCS) (2007). 7.Florencio, D., Herley, C., and Coskun, B. Do strong web passwords accomplish anything? In USENIX Workshop on Hot Topics in Security (HOTSEC) (2007), 1--6. 8.Henze, N., Rukzio, E., and Boll, S. 100,000,000 taps: analysis and improvement of touch performance in the large. In ACM MobileHCI (2011). 9.Hlywa, M., Biddle, R., and Patrick, A. S. Facing the facts about image type in recognition-based graphical passwords. In Annual Computer Security Applications Conference (ACSAC) (2011). 10.Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. The design and analysis of graphical passwords. In USENIX Security Symposium (1999). 11.Lee, S., and Zhai, S. The performance of touch screen soft buttons. In Proceedings of the 27th international conference on Human factors in computing systems, CHI '09, ACM (New York, NY, USA, 2009), 309--318. 13.Sae-Bae, N., Ahmed, K., Isbister, K., and Memon, N. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In ACM CHI (2012). 14.Schaub, F., Deyhle, R., and Weber, M. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In ACM Conference on Mobile and Ubiquitous Multimedia (MUM) (2012). 15.Tao, H., and Adams, C. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security 7, 2 (2008). 16.van Oorschot, P. C., and Thorpe, J. On predictive models and user-drawn graphical passwords. ACM Transactions on Information System Security 10, 4 (2008