Skip to main content

A Rapid Serial Visual Presentation Method for Graphical Authentication

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 501))

Abstract

We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication method that is suited for multi-touch mobile devices. This method presents degraded pictures of everyday objects in a temporal stream. Considering all the other authentication methods employ a spatial visual search, our method is unique (i.e., searching across time versus space). A temporal method of presentation is used to decreases login times down to 14 s and to allow login with a simple touch of the screen. By degrading the images, over-the-shoulder attackers are prevented from easily capturing the passcode. This study shows that all participants could successfully login at least once when allowed up to three attempts. After becoming familiar with the RSVP authentication method, participants took on the role of an attacker. Notably, no one was able to identify the passcode. The RSVP method offers a memorable, usable, quick, and secure alternative for authentication on multi-touch mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)

    Article  Google Scholar 

  2. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December)

    Google Scholar 

  3. Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November)

    Google Scholar 

  4. Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999)

    Google Scholar 

  5. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)

    Article  Google Scholar 

  6. Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol J 19(3), 122–131 (2001)

    Article  Google Scholar 

  7. Menkus, B.: Understanding the use of passwords. Comput. Secur. 7(2), 132–136 (1988)

    Article  Google Scholar 

  8. Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)

    Article  Google Scholar 

  9. Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 15–29. ACM (2013, July)

    Google Scholar 

  10. Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: Computer Software and Applications Conference, 2009. COMPSAC’09. 33rd Annual IEEE International, vol. 2, pp. 318–323. IEEE (2009, July)

    Google Scholar 

  11. Davis, D., Monrose, F., Reiter, M. K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004, August)

    Google Scholar 

  12. Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: Secure authentication usable anywhere. In: Proceedings of the 4th symposium on Usable privacy and security, pp. 35–45. ACM (2008, July)

    Google Scholar 

  13. Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Comput. 1, 30–36 (2003)

    Article  Google Scholar 

  14. RealUser, www.realuser.com. Last accessed in June 2005

  15. Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177–184. ACM (2006, May)

    Google Scholar 

  16. Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp Psychol. Human Learn. Mem. 2(5), 523–528 (1976)

    Article  Google Scholar 

  17. Nickerson, R.S.: Short-term memory for complex meaningful visual configurations: a demonstration of capacity. Can. J. Psychol/Revue canadienne de psychologie 19(2), 155–160 (1965)

    Article  Google Scholar 

  18. Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156–163 (1967)

    Article  Google Scholar 

  19. Standing, L.: Learning 10000 pictures. Q. J. Exp. Psychology 25(2), 207–222 (1973)

    Article  Google Scholar 

  20. Standing, L., Conezio, J., Haber, R.N.: Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychon. Sci. 19(2), 73–74 (1970)

    Article  Google Scholar 

  21. Paivio, A.: Imagery and verbal processes. Psychology Press, UK (2013)

    Google Scholar 

  22. Mintzer, M.Z., Snodgrass, J.G.: The picture superiority effect: Support for the distinctiveness model. Am. J. Psychol. 112(1), 113–146 (1999)

    Article  Google Scholar 

  23. Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13–23. ACM (2012, December)

    Google Scholar 

  24. Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV—Usability or Else! pp. 405–424. Springer, London (2000)

    Google Scholar 

  25. Schaub, F., Walch, M., Könings, B., Weber, M.: Exploring the design space of graphical passwords on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11–26. ACM (2013, July)

    Google Scholar 

  26. Biederman, I.: Recognition-by-components: A theory of human image understanding. Psychol. Rev. 94(2), 115–147 (1987)

    Article  Google Scholar 

  27. Snodgrass, J.G., Vanderwart, M.: A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Human Learn. Mem. 6(2), 174–215 (1980)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeremiah D. Still .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Cain, A.A., Still, J.D. (2016). A Rapid Serial Visual Presentation Method for Graphical Authentication. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics