Skip to main content
Top

2014 | OriginalPaper | Chapter

A Human Factors Study of Graphical Passwords Using Biometrics

Authors : Benjamin S. Riggan, Wesley E. Snyder, Xiaogang Wang, Jing Feng

Published in: Pattern Recognition

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

One mode of authentication used in modern computing systems is graphical passwords. Graphical passwords are becoming more popular because touch-sensitive and pen-sensitive technologies are becoming ubiquitous. In this paper, we construct the “BioSketch” database, which is a general database of sketch-based passwords (SkPWs) with pressure information used as a biometric property. The BioSketch database is created so that recognition approaches may be commensurable with the benchmark performances. Using this database, we are also able to study the human-computer interaction (HCI) process for SkPWs. In this paper, we compare a generalized SKS recognition algorithm with the Fréchet distance in terms of the intra/inter-class variations and performances. The results show that the SKS-based approach achieves as much as a 7 % and 17 % reduction in equal error rate (EER) for random and skilled forgeries respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
Resistive touchscreens cannot measure pressure.
 
3
The distance is with respect to \(x_0\), which represents an arbitrary reference point (usually the centroid).
 
4
SKS may be more robust than the Fréchet distance because it has broad definition of similar and a more narrow definition of different.
 
Literature
1.
go back to reference Agarwal, P.K., Avraham, H.K., Kaplan, H., Sharir, M.: Computing the discrete freéchet distance in subquadratic time. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 156–167 (2013) Agarwal, P.K., Avraham, H.K., Kaplan, H., Sharir, M.: Computing the discrete freéchet distance in subquadratic time. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 156–167 (2013)
2.
go back to reference Alt, H., Godau, H.: Computing the fréchet distance between two polygonal curves. Int. J. Comput. Geom. Appl. 5(1–2), 75–91 (1995)MathSciNetMATHCrossRef Alt, H., Godau, H.: Computing the fréchet distance between two polygonal curves. Int. J. Comput. Geom. Appl. 5(1–2), 75–91 (1995)MathSciNetMATHCrossRef
3.
go back to reference Bellman, R.: Dynamic Programming. Princeton University Press, Princeton (1957)MATH Bellman, R.: Dynamic Programming. Princeton University Press, Princeton (1957)MATH
4.
go back to reference Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1–25 (2012)CrossRef Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1–25 (2012)CrossRef
5.
go back to reference De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)CrossRef De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1–2), 128–152 (2005)CrossRef
6.
go back to reference Dunphy, P., Yan, J.: Do background images improve “draw a secret” graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 36–47 (2007) Dunphy, P., Yan, J.: Do background images improve “draw a secret” graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 36–47 (2007)
7.
go back to reference Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yet another graphical password strategy. In: Proceedings of the Annual Computer Security Applications Conference, pp. 121–129 (2008) Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yet another graphical password strategy. In: Proceedings of the Annual Computer Security Applications Conference, pp. 121–129 (2008)
8.
go back to reference Goldberg, J., Hagman, J.: Doodling our way to better authentication. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, pp. 868–869 (2002) Goldberg, J., Hagman, J.: Doodling our way to better authentication. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, pp. 868–869 (2002)
9.
go back to reference Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 1–14 (1999) Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 1–14 (1999)
10.
go back to reference Krish, K., Heinrich, S., Snyder, W.E., Cakir, H., Khorram, S.: Global registration of overlapping images using accumulative image features. Pattern Recogn. Lett. 31, 112–118 (2010)CrossRef Krish, K., Heinrich, S., Snyder, W.E., Cakir, H., Khorram, S.: Global registration of overlapping images using accumulative image features. Pattern Recogn. Lett. 31, 112–118 (2010)CrossRef
11.
go back to reference Martinez-Diaz, M., Fierrez, J., Galbally, J.: The DooDB graphical password database: data analysis and benchmark results. IEEE Access 1, 596–605 (2013)CrossRef Martinez-Diaz, M., Fierrez, J., Galbally, J.: The DooDB graphical password database: data analysis and benchmark results. IEEE Access 1, 596–605 (2013)CrossRef
12.
go back to reference Martinez-Diaz, M., Fierrez, J., Martin-Diaz, C., Ortega-Garcia, J.: DooDB: a graphical password database containing doodles and pseudo-signatures. In: 12th International Conference on Frontiers in Handwriting Recognition, pp. 339–344 (2010) Martinez-Diaz, M., Fierrez, J., Martin-Diaz, C., Ortega-Garcia, J.: DooDB: a graphical password database containing doodles and pseudo-signatures. In: 12th International Conference on Frontiers in Handwriting Recognition, pp. 339–344 (2010)
13.
go back to reference Riggan, B.S.: Recognition of sketch-based passwords with biometric information using a generalized simple K-space model. Ph.D thesis/Dissertation, North Carolina State University (2014) Riggan, B.S.: Recognition of sketch-based passwords with biometric information using a generalized simple K-space model. Ph.D thesis/Dissertation, North Carolina State University (2014)
14.
go back to reference Rousson, M., Cremers, D.: Efficient kernel density estimation of shape and intensity priors for level set segmentation. In: Duncan, J.S., Gerig, G. (eds.) MICCAI 2005. LNCS, vol. 3750, pp. 757–764. Springer, Heidelberg (2005)CrossRef Rousson, M., Cremers, D.: Efficient kernel density estimation of shape and intensity priors for level set segmentation. In: Duncan, J.S., Gerig, G. (eds.) MICCAI 2005. LNCS, vol. 3750, pp. 757–764. Springer, Heidelberg (2005)CrossRef
15.
go back to reference Snyder, W.E.: A strategy for shape recognition. In: Srivastava, A. (ed.) Workshop on Challenges and Opportunities in Image Understanding, College Park, MD, January 2007 Snyder, W.E.: A strategy for shape recognition. In: Srivastava, A. (ed.) Workshop on Challenges and Opportunities in Image Understanding, College Park, MD, January 2007
16.
go back to reference Tao, H., Adams, C.: Pass-go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 7(2), 273–292 (2008) Tao, H., Adams, C.: Pass-go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 7(2), 273–292 (2008)
17.
go back to reference Varenhorst, C.: Passdoodles: a lightweight authentication method. MIT Research Science Institute, July 2004 Varenhorst, C.: Passdoodles: a lightweight authentication method. MIT Research Science Institute, July 2004
Metadata
Title
A Human Factors Study of Graphical Passwords Using Biometrics
Authors
Benjamin S. Riggan
Wesley E. Snyder
Xiaogang Wang
Jing Feng
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-11752-2_38

Premium Partner