A Comprehensive Study of the Usability of Multiple Graphical Passwords

Conference object, Part of book or chapter of book English OPEN
Chowdhury , Soumyadeb ; Poet , Ron ; Mackenzie , Lewis (2013)
  • Publisher: Springer
  • Related identifiers: doi: 10.1007/978-3-642-40477-1_26
  • Subject: usability | [ INFO ] Computer Science [cs] | user authentication | QA75 | multiple image passwords

Part 1: Long and Short Papers (Continued); International audience; Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In this paper, we present the first published comparison of the usability of multiple graphical passwords with four different image types: Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longitudinal experiment was performed with 100 participants over a period of 8 weeks, to examine the usability performance of each of the image types. The results of the study demonstrate that object images are most usable in the sense of being more memorable and less time-consuming to employ, Mikon images are close behind but doodle and art images are significantly inferior. The results of our study complement cognitive literature on the picture superiority effect, visual search process and nameability of visually complex images.
  • References (17)
    17 references, page 1 of 2

    1. Adams A, Sasse M.A (1999) Users are Not the Enemy. Communications of the ACM, 40- 46

    2. Florencio D, Herley C (2007) A large-scale study of web password habits. In proceedings of 16th International Conference on World Wide Web, University of Calgary, pp. 657-666

    3. Brostoff S, Sasse MA (2000) Are passfaces more usable than passwords? A field trial investigation. In proceedings of HCI on People and Computers XIV, pp. 405-424

    4. Madigan S. Picture Memory (1983) Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. In: Yuille, J (ed), Hillsdale: Lawrence Erlbaum Associates

    5. Paivio A (1986) Mental Representataions:A Dual Coding Approach, Oxford Press, UK.

    6. Chowdhury S, Poet R (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In proceeding of Conference on User science and Engineering, pp. 54-58.

    7. Davis D, Monrose F, Reiter M (2005) On user choice in graphical password schemes. In proceedings of the Conference on USENIX Security Symposium, vol.13, pp. 11-11

    8. Dhamija R, Perrig A (2000) Déjà vu: A user study using images for authentication. In proceedings of the Conference on USENIX Security Symposium, vol. 9, pp. 4-4

    9. Renaud K (2005) A Visuo- Biometric Authentication Mechanism for Old Users. In proceeding of British HCI, pp. 167-182

    10. Renaud K (2009) Web authentication using Mikon images. In proceedings of World Congress on Privacy, Security, Trust and the management of E-Business, pp. 1-10

  • Similar Research Results (1)
  • Metrics
    No metrics available
Share - Bookmark