2009
DOI: 10.2174/1875934300902010178
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithm for Automatically Choosing Distractors for Recognition Based Authentication using Minimal Image Types

Abstract: When a user logs on to a recognition based authentication system, he or she is presented with a number of images, one of which is their pass image and the others are distractors. The user must recognise and select their own image to enter the system. If any of the distractors is too similar to the target, the user is likely to become confused and may well choose a distractor by mistake.It is simple for humans to rule on image similarity but such a labour intensive approach hinders the wider uptake of these mec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Examples of the pictures used as graphical passwords are personal pictures [10], pictures of everyday objects [5], abstracts [11], faces [12], doodles [13], and mikons [14]. User studies have been conducted to compare the usability between these types of pictures.…”
Section: Types Of Pictures Used For Recognition-based Graphical Pmentioning
confidence: 99%
“…Examples of the pictures used as graphical passwords are personal pictures [10], pictures of everyday objects [5], abstracts [11], faces [12], doodles [13], and mikons [14]. User studies have been conducted to compare the usability between these types of pictures.…”
Section: Types Of Pictures Used For Recognition-based Graphical Pmentioning
confidence: 99%
“…An intersection attack, as defined by Dhamija et al [7] (and discussed in [8], [13] ) is an attack in which the at- • Use the same decoy images and pass images for each session.…”
Section: Observability: Intersection Attackmentioning
confidence: 99%
“…The first is the "Doodles" scheme [11] where black and white user drawings (doodles) are used for authentication. This was selected as an example of a recognition-based graphical password scheme where the user is involved in the creation of the passimage.…”
Section: A Recognition-based Graphical Password Schemesmentioning
confidence: 99%
“…The purpose was to minimize any ambiguity over doodle content. The following descriptions were used to define equivalence (taken from the categories of classification as discussed by Poet and Renaud [11]) same word; same concept, different word ; different levels of category, same concept.Doodle descriptions were deemed distinct if they fell into the following categories: whole picture vs. detail; different perspective; completely different concepts. Each doodle then had multiple classifications, these were then further refined into categories by applying a majority ruling.…”
Section: E Categorisation Of Doodle Passwords -Name That Doodle!mentioning
confidence: 99%