Skip to main content

An Empirical Study of Picture Password Composition on Smartwatches

  • Conference paper
  • First Online:
Human-Computer Interaction – INTERACT 2021 (INTERACT 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12935))

Included in the following conference series:

  • 1620 Accesses

Abstract

Recent research works suggest that human cognitive differences affect security and usability of picture passwords within a variety of interaction contexts, such as conventional desktops, smartphones, and extended reality. However, the interplay of human cognition towards users’ interaction behavior and security of picture passwords on smartwatch devices has not been investigated so far. In this paper, we report on such a research attempt that embraced a between-subjects in-lab user study (n = 50) in which users were classified according to their cognitive processing characteristics (i.e., Field Dependence-Independence cognitive differences), and further composed a picture password on a smartwatch device. Analysis of results reveal that already known effects of human cognition towards interaction behavior and security of picture passwords within conventional interaction contexts, do not necessarily replicate when these are deployed on smartwatch devices. Findings point towards the need to design for diversity and device-aware picture password schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nguyen, T., Memon, N.: Smartwatches locking methods: a comparative study. In: WAY 2017 Workshop at the Symposium on Usable Privacy and Security, USENIX (2017)

    Google Scholar 

  2. Harbach, M., De Luca, A., Egelman, S.: The anatomy of smartphone unlocking: a field study of android lock screens. In: ACM CHI 2016, pp. 4806–4817. ACM Press (2016)

    Google Scholar 

  3. Aviv, A., Gibson, K., Mossop, E., Blaze, M., Smith, J.: Smudge attacks on smartphone touch screens. In: USENIX Conference on Offensive Technologies (WOOT 2010), USENIX Association, pp. 1–7 (2010)

    Google Scholar 

  4. von Zezschwitz, E., De Luca, A., Janssen, P., Hussmann, H.: Easy to draw, but hard to trace?: On the observability of grid-based (un)lock patterns. In: ACM Conference on Human Factors in Computing Systems (CHI 2015), pp. 2339–2342. ACM Press (2015)

    Google Scholar 

  5. Belk M., Fidas, C., Germanakos, P., Samaras, G.: The interplay between humans, technology and user authentication: a cognitive processing perspective. Comput. Hum. Behav. 184–200 (2017)

    Google Scholar 

  6. Guerar, M., Verderame, L., Merlo, A., Palmieri, F., Migliardi, M., Vallerini, L.: CirclePIN: a novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices. ACM Trans. Cyber-Phys. Syst. 4(3), 1–19 (2020). https://doi.org/10.1145/3365995

    Article  Google Scholar 

  7. Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn pin on touch devices. Comput. Secur. 66, 115–128 (2017)

    Article  Google Scholar 

  8. Guerar, M., Verderame, L., Migliardi, M., Merlo, A.: 2GesturePIN: securing PIN-based authentication on smartwatches. In: IEEE Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 327–333. IEEE (2019)

    Google Scholar 

  9. Nguyen, T., Memon, N.: Tap-based user authentication for smartwatches. Comput. Secur. 78, 174–186 (2018)

    Article  Google Scholar 

  10. Oakley, I., Huh, J.H., Cho, J., Cho, G., Islam, R., Kim, H.: The personal identification chord: a four button authentication system for smartwatches. In: Asia Conference on Computer and Communications Security (ASIACCS 2018), pp. 75–87. ACM Press (2018)

    Google Scholar 

  11. Zhao, Y., Qiu, Z., Yang, Y., Li, W., Fan, M.: An empirical study of touch-based authentication methods on smartwatches. In: ACM Symposium on Wearable Computers (ISWC 2017) , pp. 122–125 ACM Press (2017)

    Google Scholar 

  12. Yang, J., Li, Y., Xie, M.: MotionAuth: motion-based authentication for wrist worn smart devices. In: IEEE Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015), pp. 550–555. IEEE (2015)

    Google Scholar 

  13. Lee, W., Lee, R.: Implicit sensor-based authentication of smartphone users with smartwatch. In: ACM Conference on Hardware and Architectural Support for Security and Privacy (HASP 2016), pp. 1–8. ACM Press, article 9 (2016)

    Google Scholar 

  14. Han, T., Hasan, K., Nakamura, K., Gomez, R., Irani, P.: SoundCraft: enabling spatial interactions on smartwatches using hand generated acoustics. In: ACM Symposium on User Interface Software and Technology (UIST 2017), pp. 579–591. ACM Press (2017)

    Google Scholar 

  15. Biddle, R., Chiasson, S., van Oorschot, P.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 41 (2012)

    Article  Google Scholar 

  16. Zhao, Z., Ahn, G.J., Seo, J.J., Hu, H.: On the security of picture gesture authentication. In: USENIX Security Symposium (USENIX Security 2013), USENIX, pp. 383–398 (2013)

    Google Scholar 

  17. Paivio, A., Csapo, K.: Picture superiority in free recall: imagery or dual coding? Cogn. Psychol. 5(2), 176–206 (1973)

    Article  Google Scholar 

  18. Fidas, C., Belk, M., Hadjidemetriou, G., Pitsillides, A.: Influences of mixed reality and human cognition on picture passwords: an eye tracking study. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11747, pp. 304–313. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29384-0_19

    Chapter  Google Scholar 

  19. Katsini, C., Fidas, C., Raptis, G., Belk, M., Samaras, G., Avouris, N.: Influences of human cognition and visual behavior on password security during picture password composition. In: ACM Human Factors in Computing Systems (CHI 2018), p. 87. ACM Press (2018)

    Google Scholar 

  20. Ma, Y., Feng, J., Kumin, L., Lazar, J.: Investigating user behavior for authentication methods: a comparison between individuals with down syndrome and neurotypical users. ACM Trans. Access. Comput. 4(4), 1–27 (2013). https://doi.org/10.1145/2493171.2493173

    Article  Google Scholar 

  21. Grindrod, K., et al.: Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE 13(1), e0189048 (2018)

    Article  MathSciNet  Google Scholar 

  22. Witkin, H., Moore, C., Goodenough, D., Cox, P.: Field-dependent and field-independent cognitive styles and their educational implications. Educ. Res. 47(1), 1–64 (1977)

    Google Scholar 

  23. Riding, R., Cheema, I.: Cognitive styles - an overview and integration. Educ. Psychol. 11(3–4), 193–215 (1991)

    Article  Google Scholar 

  24. Peterson, E., Rayner, S., Armstrong, S.: Researching the psychology of cognitive style and learning style: is there really a future? Learn. Indiv. Differ. 19(4), 518–523 (2009)

    Article  Google Scholar 

  25. Kozhevnikov, M.: Cognitive styles in the context of modern psychology: toward an integrated framework of cognitive style. Psychol. Bull. 133(3), 464–481 (2007)

    Article  Google Scholar 

  26. Hong, J., Hwang, M., Tam, K., Lai, Y., Liu, L.: Effects of cognitive style on digital jigsaw puzzle performance: a gridware analysis. Comput. Hum. Behav. 28(3), 920–928 (2012)

    Article  Google Scholar 

  27. Raptis, G.E., Katsini, C., Belk, M., Fidas, C., Samaras, G., Avouris, N.: Using eye gaze data and visual activities to infer human cognitive styles: method and feasibility studies. In: ACM User Modeling, Adaptation and Personalization (UMAP 2017), pp. 164–173 (2017)

    Google Scholar 

  28. Davis, J.: Educational implications of field dependence-independence. In: Field Dependence-Independence: Cognitive Style across the Lifespan, Lawrence Erlbaum, 149–175 (1991)

    Google Scholar 

  29. Johnson, J.J., Seixeiro, S., Pace, Z., van der Bogert, G., Gilmour, S., Siebens, L., Tubbs, K.: Picture Gesture Authentication (2014). https://www.google.com/patents/US8910253

  30. Witkin, H.A., Oltman, P., Raskin, E., Karp, S.: A Manual for the Embedded Figures Test. Consulting Psychologists Press, Palo Alto, CA (1971)

    Google Scholar 

  31. Zhao, Z., Ahn, G., Hu, H.: Picture gesture authentication: empirical analysis, automated attacks, and scheme evaluation. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–37 (2015)

    Article  Google Scholar 

  32. Constantinides, A., Fidas, C., Belk, M., Pietron, A.M., Han, T., Pitsillides, A.: From hotspots towards experience-spots: leveraging on users’ sociocultural experiences to enhance security in cued-recall graphical authentication. Int. J. Hum. Comput. Stud. 149, 102602 (2021). https://doi.org/10.1016/j.ijhcs.2021.102602

    Article  Google Scholar 

  33. Dunphy, P., Yan, J.: Do background images improve “Draw a Secret” graphical passwords?. In: Computer and Communications Security (CCS 2007), pp. 36–47. ACM Press (2007)

    Google Scholar 

  34. Raptis, G., Fidas, C., Avouris, N.: Effects of mixed-reality on players’ behaviour and immersion in a cultural tourism game: a cognitive processing perspective. Int. J. Hum Comput Stud. 114, 69–79 (2018)

    Article  Google Scholar 

  35. Katsini, C., Fidas, C., Raptis, G., Belk, M., Samaras, G., Avouris, N.: Eye gaze-driven prediction of cognitive differences during graphical password composition. In: ACM SIGCHI Intelligent User Interfaces (IUI 2018), pp. 147–152. ACM Press (2018)

    Google Scholar 

  36. Constantinides, A., Pietron, A., Belk, M., Fidas, C., Han, T., Pitsillides, A.: A cross-cultural perspective for personalizing picture passwords. In: ACM User Modeling Adaptation and Personalization (UMAP 2020), pp. 43–52. ACM Press (2020)

    Google Scholar 

Download references

Acknowledgements

This research has been partially supported by the EU Horizon 2020 Grant 826278 “Securing Medical Data in Smart Patient-Centric Healthcare Systems” (Serums), the Research and Innovation Foundation (Project DiversePass: COMPLEMENTARY/0916/0182), and the European project TRUSTID - Intelligent and Continuous Online Student Identity Management for Improving Security and Trust in European Higher Education Institutions (Grant Agreement No: 2020–1-EL01-KA226-HE-094869), which is funded by the European Commission within the Erasmus+ 2020 Programme and the Greek State Scholarships Foundation I.K.Y.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marios Belk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belk, M., Fidas, C., Katsi, E., Constantinides, A., Pitsillides, A. (2021). An Empirical Study of Picture Password Composition on Smartwatches. In: Ardito, C., et al. Human-Computer Interaction – INTERACT 2021. INTERACT 2021. Lecture Notes in Computer Science(), vol 12935. Springer, Cham. https://doi.org/10.1007/978-3-030-85610-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-85610-6_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-85609-0

  • Online ISBN: 978-3-030-85610-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics