The effect of baroque music on the PassPoints graphical password

Unknown, Conference object, Preprint English OPEN
Gao, Haichang ; Ren, Zhongjie ; Chang, Xiuling ; Liu, Xiyang ; Aickelin, Uwe (2010)
  • Subject: Computer Science - Human-Computer Interaction | Computer Science - Computers and Society | Computer Science - Cryptography and Security

Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are easier to attack. The crux of the problem is users' memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. We introduce baroque music to the PassPoints graphical password scheme and conduct a laboratory study in this paper. Results shown that there is no statistic difference between the music group and the control group without music in short-term recall experiments, both had high recall success rates. But in long-term recall, the music group performed significantly better. We also found that the music group tended to set significantly more complicated passwords, which are usually more resistant to dictionary and other guess attacks. But compared with the control group, the music group took more time to log in both in short-term and long-term tests. Besides, it appears that background music does not work in terms of hotspots.
  • References (29)
    29 references, page 1 of 3

    [1] G. E. Blonder. Graphical password. US Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ, August 30, 1995.

    [2] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot. Influencing users towards better passwords: Persuasive cued click-points. In British Computer Society Conference on Human-Computer Interaction, 2008.

    [3] S. Chiasson, P. van Oorschot, and R. Biddle. Graphical password authentication using cued click-points. ESORICS, 2007.

    [4] D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.

    [5] A. DeAngeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. In International Journal of Human-Computer Studies, 2005.128-152.

    [6] R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In 9th USENIX Security Symposium, 2000.

    [7] A. Dirik, N. Memon, and J. Birget. Modeling user choice in the passpoints graphical password scheme. In Symp. on Usable Privacy and Security, 2007.

    [8] G. Dryden and J. Vos. The Learning Revolution - To change the way the world learns. Stafford: Network Educational Press, 2001.

    [9] P. M. Dunpy and J. Yan. Do background images improve a,ˇrdraw a secreta,´s graphical passwords? In Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, 36-47.

    [10] E. Fassbender, D. Richards, and M. Kavakli. Game engineering approach to the effect of music on learning in virtual-immersive environments. In International Conference on Games Research and Development: CyberGames, Western Australia, 2006.

  • Metrics
    No metrics available
Share - Bookmark