On the Personalization of Image Content in Graphical Passwords based on Users' Sociocultural Experiences: New Challenges and Opportunities

被引:1
|
作者
Constantinides, Argyris [1 ,2 ]
Fidas, Christos [3 ]
Belk, Marios [1 ,4 ]
Pitsillides, Andreas [1 ]
机构
[1] Univ Cyprus, Nicosia, Cyprus
[2] CiTARD Serv Ltd, Nicosia, Cyprus
[3] Univ Patras Rio, Patras, Greece
[4] Univ Cent Lancashire, CY Campus, Nicosia, Cyprus
基金
欧盟地平线“2020”;
关键词
User Authentication; Graphical Passwords; Sociocultural Experiences; Security; Memorability; PURELY AUTOMATED ATTACKS; PASSPOINTS;
D O I
10.1145/3314183.3324966
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent works underpin the added value of considering users' past sociocultural experiences as a personalization factor for the image content used within graphical password schemes, since it has a positive impact on the security and memorability of the user-chosen passwords. This paper discusses the need for personalization of the image content used in graphical password schemes, as well as the initial steps towards the realization of an image content personalization framework that aims to achieve a better equilibrium between security and memorability. The paper also discusses emerging challenges related to the elicitation and maintenance of individual sociocultural-centered user models, the image content personalization mechanism and privacy considerations.
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [1] On Cultural-centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability
    Constantinides, Argyris
    Belk, Marios
    Fidas, Christos
    Samaras, George
    [J]. PROCEEDINGS OF THE 26TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (UMAP'18), 2018, : 245 - 249
  • [2] The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords
    Suo, Xiaoyuan
    Zhu, Ying
    Owen, G. Scott
    [J]. ADVANCES IN VISUAL COMPUTING, PT 2, PROCEEDINGS, 2009, 5876 : 889 - +
  • [3] On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords
    Constantinides, Argyris
    Belk, Marios
    Fidas, Christos
    Pitsillides, Andreas
    [J]. ACM UMAP '19: PROCEEDINGS OF THE 27TH ACM CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION, 2019, : 201 - 205
  • [4] Facing the Facts about Image Type in Recognition-Based Graphical Passwords
    Hlywa, Max
    Biddle, Robert
    Patrick, Andrew
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 149 - 158
  • [5] Security Analyses of Click-based Graphical Passwords via Image Point Memorability
    Zhu, Bin B.
    Yan, Jeff
    Wei, Dongchen
    Yang, Maowei
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1217 - 1231
  • [6] A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs
    Wang, Hongyu
    Xu, Jin
    Ma, Mingyuan
    Zhang, Hongyan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots
    Constantinides, Argyris
    Belk, Marios
    Fidas, Christos
    Pitsillides, Andreas
    [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, IUI 2020, 2020, : 33 - 37
  • [8] Text indexing of images based on graphical image content
    Patrick, TB
    Sievert, MC
    Popescu, M
    [J]. ASIS 99: PROCEEDINGS OF THE 62ND ASIS ANNUAL MEETING, VOL 36, 1999: KNOWLEDGE: CREATION ORGANIZATION AND USE, 1999, 36 : 675 - 680
  • [9] New Test to Detect Clustered Graphical Passwords in Passpoints Based on the Perimeter of the Convex Hull
    Herrera-Macias, Joaquin Alberto
    Suarez-Plasencia, Lisset
    Legon-Perez, Carlos Miguel
    Sosa-Gomez, Guillermo
    Rojas, Omar
    [J]. INFORMATION, 2024, 15 (08)
  • [10] Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
    Zhu, Bin B.
    Yan, Jeff
    Bao, Guanbo
    Yang, Maowei
    Xu, Ning
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) : 891 - 904