Abstract
Recent research works suggest that human cognitive differences affect security and usability of picture passwords within a variety of interaction contexts, such as conventional desktops, smartphones, and extended reality. However, the interplay of human cognition towards users’ interaction behavior and security of picture passwords on smartwatch devices has not been investigated so far. In this paper, we report on such a research attempt that embraced a between-subjects in-lab user study (n = 50) in which users were classified according to their cognitive processing characteristics (i.e., Field Dependence-Independence cognitive differences), and further composed a picture password on a smartwatch device. Analysis of results reveal that already known effects of human cognition towards interaction behavior and security of picture passwords within conventional interaction contexts, do not necessarily replicate when these are deployed on smartwatch devices. Findings point towards the need to design for diversity and device-aware picture password schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nguyen, T., Memon, N.: Smartwatches locking methods: a comparative study. In: WAY 2017 Workshop at the Symposium on Usable Privacy and Security, USENIX (2017)
Harbach, M., De Luca, A., Egelman, S.: The anatomy of smartphone unlocking: a field study of android lock screens. In: ACM CHI 2016, pp. 4806–4817. ACM Press (2016)
Aviv, A., Gibson, K., Mossop, E., Blaze, M., Smith, J.: Smudge attacks on smartphone touch screens. In: USENIX Conference on Offensive Technologies (WOOT 2010), USENIX Association, pp. 1–7 (2010)
von Zezschwitz, E., De Luca, A., Janssen, P., Hussmann, H.: Easy to draw, but hard to trace?: On the observability of grid-based (un)lock patterns. In: ACM Conference on Human Factors in Computing Systems (CHI 2015), pp. 2339–2342. ACM Press (2015)
Belk M., Fidas, C., Germanakos, P., Samaras, G.: The interplay between humans, technology and user authentication: a cognitive processing perspective. Comput. Hum. Behav. 184–200 (2017)
Guerar, M., Verderame, L., Merlo, A., Palmieri, F., Migliardi, M., Vallerini, L.: CirclePIN: a novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices. ACM Trans. Cyber-Phys. Syst. 4(3), 1–19 (2020). https://doi.org/10.1145/3365995
Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn pin on touch devices. Comput. Secur. 66, 115–128 (2017)
Guerar, M., Verderame, L., Migliardi, M., Merlo, A.: 2GesturePIN: securing PIN-based authentication on smartwatches. In: IEEE Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 327–333. IEEE (2019)
Nguyen, T., Memon, N.: Tap-based user authentication for smartwatches. Comput. Secur. 78, 174–186 (2018)
Oakley, I., Huh, J.H., Cho, J., Cho, G., Islam, R., Kim, H.: The personal identification chord: a four button authentication system for smartwatches. In: Asia Conference on Computer and Communications Security (ASIACCS 2018), pp. 75–87. ACM Press (2018)
Zhao, Y., Qiu, Z., Yang, Y., Li, W., Fan, M.: An empirical study of touch-based authentication methods on smartwatches. In: ACM Symposium on Wearable Computers (ISWC 2017) , pp. 122–125 ACM Press (2017)
Yang, J., Li, Y., Xie, M.: MotionAuth: motion-based authentication for wrist worn smart devices. In: IEEE Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015), pp. 550–555. IEEE (2015)
Lee, W., Lee, R.: Implicit sensor-based authentication of smartphone users with smartwatch. In: ACM Conference on Hardware and Architectural Support for Security and Privacy (HASP 2016), pp. 1–8. ACM Press, article 9 (2016)
Han, T., Hasan, K., Nakamura, K., Gomez, R., Irani, P.: SoundCraft: enabling spatial interactions on smartwatches using hand generated acoustics. In: ACM Symposium on User Interface Software and Technology (UIST 2017), pp. 579–591. ACM Press (2017)
Biddle, R., Chiasson, S., van Oorschot, P.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 41 (2012)
Zhao, Z., Ahn, G.J., Seo, J.J., Hu, H.: On the security of picture gesture authentication. In: USENIX Security Symposium (USENIX Security 2013), USENIX, pp. 383–398 (2013)
Paivio, A., Csapo, K.: Picture superiority in free recall: imagery or dual coding? Cogn. Psychol. 5(2), 176–206 (1973)
Fidas, C., Belk, M., Hadjidemetriou, G., Pitsillides, A.: Influences of mixed reality and human cognition on picture passwords: an eye tracking study. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11747, pp. 304–313. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29384-0_19
Katsini, C., Fidas, C., Raptis, G., Belk, M., Samaras, G., Avouris, N.: Influences of human cognition and visual behavior on password security during picture password composition. In: ACM Human Factors in Computing Systems (CHI 2018), p. 87. ACM Press (2018)
Ma, Y., Feng, J., Kumin, L., Lazar, J.: Investigating user behavior for authentication methods: a comparison between individuals with down syndrome and neurotypical users. ACM Trans. Access. Comput. 4(4), 1–27 (2013). https://doi.org/10.1145/2493171.2493173
Grindrod, K., et al.: Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE 13(1), e0189048 (2018)
Witkin, H., Moore, C., Goodenough, D., Cox, P.: Field-dependent and field-independent cognitive styles and their educational implications. Educ. Res. 47(1), 1–64 (1977)
Riding, R., Cheema, I.: Cognitive styles - an overview and integration. Educ. Psychol. 11(3–4), 193–215 (1991)
Peterson, E., Rayner, S., Armstrong, S.: Researching the psychology of cognitive style and learning style: is there really a future? Learn. Indiv. Differ. 19(4), 518–523 (2009)
Kozhevnikov, M.: Cognitive styles in the context of modern psychology: toward an integrated framework of cognitive style. Psychol. Bull. 133(3), 464–481 (2007)
Hong, J., Hwang, M., Tam, K., Lai, Y., Liu, L.: Effects of cognitive style on digital jigsaw puzzle performance: a gridware analysis. Comput. Hum. Behav. 28(3), 920–928 (2012)
Raptis, G.E., Katsini, C., Belk, M., Fidas, C., Samaras, G., Avouris, N.: Using eye gaze data and visual activities to infer human cognitive styles: method and feasibility studies. In: ACM User Modeling, Adaptation and Personalization (UMAP 2017), pp. 164–173 (2017)
Davis, J.: Educational implications of field dependence-independence. In: Field Dependence-Independence: Cognitive Style across the Lifespan, Lawrence Erlbaum, 149–175 (1991)
Johnson, J.J., Seixeiro, S., Pace, Z., van der Bogert, G., Gilmour, S., Siebens, L., Tubbs, K.: Picture Gesture Authentication (2014). https://www.google.com/patents/US8910253
Witkin, H.A., Oltman, P., Raskin, E., Karp, S.: A Manual for the Embedded Figures Test. Consulting Psychologists Press, Palo Alto, CA (1971)
Zhao, Z., Ahn, G., Hu, H.: Picture gesture authentication: empirical analysis, automated attacks, and scheme evaluation. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–37 (2015)
Constantinides, A., Fidas, C., Belk, M., Pietron, A.M., Han, T., Pitsillides, A.: From hotspots towards experience-spots: leveraging on users’ sociocultural experiences to enhance security in cued-recall graphical authentication. Int. J. Hum. Comput. Stud. 149, 102602 (2021). https://doi.org/10.1016/j.ijhcs.2021.102602
Dunphy, P., Yan, J.: Do background images improve “Draw a Secret” graphical passwords?. In: Computer and Communications Security (CCS 2007), pp. 36–47. ACM Press (2007)
Raptis, G., Fidas, C., Avouris, N.: Effects of mixed-reality on players’ behaviour and immersion in a cultural tourism game: a cognitive processing perspective. Int. J. Hum Comput Stud. 114, 69–79 (2018)
Katsini, C., Fidas, C., Raptis, G., Belk, M., Samaras, G., Avouris, N.: Eye gaze-driven prediction of cognitive differences during graphical password composition. In: ACM SIGCHI Intelligent User Interfaces (IUI 2018), pp. 147–152. ACM Press (2018)
Constantinides, A., Pietron, A., Belk, M., Fidas, C., Han, T., Pitsillides, A.: A cross-cultural perspective for personalizing picture passwords. In: ACM User Modeling Adaptation and Personalization (UMAP 2020), pp. 43–52. ACM Press (2020)
Acknowledgements
This research has been partially supported by the EU Horizon 2020 Grant 826278 “Securing Medical Data in Smart Patient-Centric Healthcare Systems” (Serums), the Research and Innovation Foundation (Project DiversePass: COMPLEMENTARY/0916/0182), and the European project TRUSTID - Intelligent and Continuous Online Student Identity Management for Improving Security and Trust in European Higher Education Institutions (Grant Agreement No: 2020–1-EL01-KA226-HE-094869), which is funded by the European Commission within the Erasmus+ 2020 Programme and the Greek State Scholarships Foundation I.K.Y.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 IFIP International Federation for Information Processing
About this paper
Cite this paper
Belk, M., Fidas, C., Katsi, E., Constantinides, A., Pitsillides, A. (2021). An Empirical Study of Picture Password Composition on Smartwatches. In: Ardito, C., et al. Human-Computer Interaction – INTERACT 2021. INTERACT 2021. Lecture Notes in Computer Science(), vol 12935. Springer, Cham. https://doi.org/10.1007/978-3-030-85610-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-85610-6_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85609-0
Online ISBN: 978-3-030-85610-6
eBook Packages: Computer ScienceComputer Science (R0)