Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

A Rapid Serial Visual Presentation Method for Graphical Authentication

verfasst von : Ashley A. Cain, Jeremiah D. Still

Erschienen in: Advances in Human Factors in Cybersecurity

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication method that is suited for multi-touch mobile devices. This method presents degraded pictures of everyday objects in a temporal stream. Considering all the other authentication methods employ a spatial visual search, our method is unique (i.e., searching across time versus space). A temporal method of presentation is used to decreases login times down to 14 s and to allow login with a simple touch of the screen. By degrading the images, over-the-shoulder attackers are prevented from easily capturing the passcode. This study shows that all participants could successfully login at least once when allowed up to three attempts. After becoming familiar with the RSVP authentication method, participants took on the role of an attacker. Notably, no one was able to identify the passcode. The RSVP method offers a memorable, usable, quick, and secure alternative for authentication on multi-touch mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)CrossRef Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)CrossRef
2.
Zurück zum Zitat Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December) Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December)
3.
Zurück zum Zitat Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November) Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November)
4.
Zurück zum Zitat Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999) Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999)
5.
Zurück zum Zitat Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)CrossRef Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)CrossRef
6.
Zurück zum Zitat Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol J 19(3), 122–131 (2001)CrossRef Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol J 19(3), 122–131 (2001)CrossRef
7.
Zurück zum Zitat Menkus, B.: Understanding the use of passwords. Comput. Secur. 7(2), 132–136 (1988)CrossRef Menkus, B.: Understanding the use of passwords. Comput. Secur. 7(2), 132–136 (1988)CrossRef
8.
Zurück zum Zitat Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)CrossRef Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)CrossRef
9.
Zurück zum Zitat Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 15–29. ACM (2013, July) Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 15–29. ACM (2013, July)
10.
Zurück zum Zitat Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: Computer Software and Applications Conference, 2009. COMPSAC’09. 33rd Annual IEEE International, vol. 2, pp. 318–323. IEEE (2009, July) Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: Computer Software and Applications Conference, 2009. COMPSAC’09. 33rd Annual IEEE International, vol. 2, pp. 318–323. IEEE (2009, July)
11.
Zurück zum Zitat Davis, D., Monrose, F., Reiter, M. K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004, August) Davis, D., Monrose, F., Reiter, M. K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004, August)
12.
Zurück zum Zitat Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: Secure authentication usable anywhere. In: Proceedings of the 4th symposium on Usable privacy and security, pp. 35–45. ACM (2008, July) Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: Secure authentication usable anywhere. In: Proceedings of the 4th symposium on Usable privacy and security, pp. 35–45. ACM (2008, July)
13.
Zurück zum Zitat Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Comput. 1, 30–36 (2003)CrossRef Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Comput. 1, 30–36 (2003)CrossRef
15.
Zurück zum Zitat Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177–184. ACM (2006, May) Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177–184. ACM (2006, May)
16.
Zurück zum Zitat Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp Psychol. Human Learn. Mem. 2(5), 523–528 (1976)CrossRef Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp Psychol. Human Learn. Mem. 2(5), 523–528 (1976)CrossRef
17.
Zurück zum Zitat Nickerson, R.S.: Short-term memory for complex meaningful visual configurations: a demonstration of capacity. Can. J. Psychol/Revue canadienne de psychologie 19(2), 155–160 (1965)CrossRef Nickerson, R.S.: Short-term memory for complex meaningful visual configurations: a demonstration of capacity. Can. J. Psychol/Revue canadienne de psychologie 19(2), 155–160 (1965)CrossRef
18.
Zurück zum Zitat Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156–163 (1967)CrossRef Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156–163 (1967)CrossRef
19.
Zurück zum Zitat Standing, L.: Learning 10000 pictures. Q. J. Exp. Psychology 25(2), 207–222 (1973)CrossRef Standing, L.: Learning 10000 pictures. Q. J. Exp. Psychology 25(2), 207–222 (1973)CrossRef
20.
Zurück zum Zitat Standing, L., Conezio, J., Haber, R.N.: Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychon. Sci. 19(2), 73–74 (1970)CrossRef Standing, L., Conezio, J., Haber, R.N.: Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychon. Sci. 19(2), 73–74 (1970)CrossRef
21.
Zurück zum Zitat Paivio, A.: Imagery and verbal processes. Psychology Press, UK (2013) Paivio, A.: Imagery and verbal processes. Psychology Press, UK (2013)
22.
Zurück zum Zitat Mintzer, M.Z., Snodgrass, J.G.: The picture superiority effect: Support for the distinctiveness model. Am. J. Psychol. 112(1), 113–146 (1999)CrossRef Mintzer, M.Z., Snodgrass, J.G.: The picture superiority effect: Support for the distinctiveness model. Am. J. Psychol. 112(1), 113–146 (1999)CrossRef
23.
Zurück zum Zitat Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13–23. ACM (2012, December) Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13–23. ACM (2012, December)
24.
Zurück zum Zitat Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV—Usability or Else! pp. 405–424. Springer, London (2000) Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV—Usability or Else! pp. 405–424. Springer, London (2000)
25.
Zurück zum Zitat Schaub, F., Walch, M., Könings, B., Weber, M.: Exploring the design space of graphical passwords on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11–26. ACM (2013, July) Schaub, F., Walch, M., Könings, B., Weber, M.: Exploring the design space of graphical passwords on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11–26. ACM (2013, July)
26.
Zurück zum Zitat Biederman, I.: Recognition-by-components: A theory of human image understanding. Psychol. Rev. 94(2), 115–147 (1987)CrossRef Biederman, I.: Recognition-by-components: A theory of human image understanding. Psychol. Rev. 94(2), 115–147 (1987)CrossRef
27.
Zurück zum Zitat Snodgrass, J.G., Vanderwart, M.: A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Human Learn. Mem. 6(2), 174–215 (1980)CrossRef Snodgrass, J.G., Vanderwart, M.: A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Human Learn. Mem. 6(2), 174–215 (1980)CrossRef
Metadaten
Titel
A Rapid Serial Visual Presentation Method for Graphical Authentication
verfasst von
Ashley A. Cain
Jeremiah D. Still
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-41932-9_1