“…As established authentication methods like Android unlock patterns [46] and text-based input [37] are very easy to observe, most prior work focused on investigating and proposing alternative authentication concepts which conceal the entered secret and make the authentication process observation-resistant. A literature review indicates that improved observation-resistance is usually achieved by visual overload (e.g., [18,45,40]), indirect input (e.g., [12,49]), multiplexed input (e.g., [35,44]) or by establishing a second, non-observable, communication channel (e.g., [4,11,26,36,51]). That is, the presentation style or interaction concept are usually modified in a way that makes the input harder to observe.…”