Abstract
We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication method that is suited for multi-touch mobile devices. This method presents degraded pictures of everyday objects in a temporal stream. Considering all the other authentication methods employ a spatial visual search, our method is unique (i.e., searching across time versus space). A temporal method of presentation is used to decreases login times down to 14 s and to allow login with a simple touch of the screen. By degrading the images, over-the-shoulder attackers are prevented from easily capturing the passcode. This study shows that all participants could successfully login at least once when allowed up to three attempts. After becoming familiar with the RSVP authentication method, participants took on the role of an attacker. Notably, no one was able to identify the passcode. The RSVP method offers a memorable, usable, quick, and secure alternative for authentication on multi-touch mobile devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)
Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December)
Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November)
Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999)
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)
Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol J 19(3), 122–131 (2001)
Menkus, B.: Understanding the use of passwords. Comput. Secur. 7(2), 132–136 (1988)
Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)
Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 15–29. ACM (2013, July)
Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: Computer Software and Applications Conference, 2009. COMPSAC’09. 33rd Annual IEEE International, vol. 2, pp. 318–323. IEEE (2009, July)
Davis, D., Monrose, F., Reiter, M. K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004, August)
Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: Secure authentication usable anywhere. In: Proceedings of the 4th symposium on Usable privacy and security, pp. 35–45. ACM (2008, July)
Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Comput. 1, 30–36 (2003)
RealUser, www.realuser.com. Last accessed in June 2005
Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177–184. ACM (2006, May)
Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp Psychol. Human Learn. Mem. 2(5), 523–528 (1976)
Nickerson, R.S.: Short-term memory for complex meaningful visual configurations: a demonstration of capacity. Can. J. Psychol/Revue canadienne de psychologie 19(2), 155–160 (1965)
Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156–163 (1967)
Standing, L.: Learning 10000 pictures. Q. J. Exp. Psychology 25(2), 207–222 (1973)
Standing, L., Conezio, J., Haber, R.N.: Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychon. Sci. 19(2), 73–74 (1970)
Paivio, A.: Imagery and verbal processes. Psychology Press, UK (2013)
Mintzer, M.Z., Snodgrass, J.G.: The picture superiority effect: Support for the distinctiveness model. Am. J. Psychol. 112(1), 113–146 (1999)
Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13–23. ACM (2012, December)
Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV—Usability or Else! pp. 405–424. Springer, London (2000)
Schaub, F., Walch, M., Könings, B., Weber, M.: Exploring the design space of graphical passwords on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11–26. ACM (2013, July)
Biederman, I.: Recognition-by-components: A theory of human image understanding. Psychol. Rev. 94(2), 115–147 (1987)
Snodgrass, J.G., Vanderwart, M.: A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Human Learn. Mem. 6(2), 174–215 (1980)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Cain, A.A., Still, J.D. (2016). A Rapid Serial Visual Presentation Method for Graphical Authentication. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-41932-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41931-2
Online ISBN: 978-3-319-41932-9
eBook Packages: EngineeringEngineering (R0)