Eye Tracking Graphical Passwords

被引:2
|
作者
Mihajlov, Martin [1 ]
Jerman-Blazic, Borka [2 ]
机构
[1] Ss Cyril & Methodius Univ, Goce Delcev 9b, Skopje 1000, Macedonia
[2] Jozef Stefan Inst, Jamova 16, Ljubljana 1000, Slovenia
关键词
Eye tracking; Graphical authentication; Graphical passwords; MEMORY;
D O I
10.1007/978-3-319-60585-2_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we investigate the cognitive process behind graphical password selection by using eye-tracking. The goal of the study is to discover how users perceive and react to graphical authentication during graphical password selection, which is valuable for improving the design concepts in novel authentication mechanisms. As a result, we present the initial results of the study noting cognitive differences based on gender, and we define user profiles for enrolment and authentication processes.
引用
收藏
页码:37 / 44
页数:8
相关论文
共 50 条
  • [1] Guessing Click-Based Graphical Passwords by Eye Tracking
    LeBlanc, Daniel
    Forget, Alain
    Biddle, Robert
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 197 - 204
  • [2] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [3] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428
  • [4] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [5] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [6] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950
  • [7] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [8] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    [J]. Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [9] Graphical passwords: Behind the attainment of goals
    Vaddeti, Ankitha
    Vidiyala, Deepthi
    Puritipati, Vineetha
    Ponnuru, Raveendra Babu
    Shin, Ji Sun
    Alavalapati, Goutham Reddy
    [J]. SECURITY AND PRIVACY, 2020, 3 (06):
  • [10] An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots
    Constantinides, Argyris
    Belk, Marios
    Fidas, Christos
    Pitsillides, Andreas
    [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, IUI 2020, 2020, : 33 - 37