A Rapid Serial Visual Presentation Method for Graphical Authentication

  • Ashley A. Cain
  • Jeremiah D. Still
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 501)


We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication method that is suited for multi-touch mobile devices. This method presents degraded pictures of everyday objects in a temporal stream. Considering all the other authentication methods employ a spatial visual search, our method is unique (i.e., searching across time versus space). A temporal method of presentation is used to decreases login times down to 14 s and to allow login with a simple touch of the screen. By degrading the images, over-the-shoulder attackers are prevented from easily capturing the passcode. This study shows that all participants could successfully login at least once when allowed up to three attempts. After becoming familiar with the RSVP authentication method, participants took on the role of an attacker. Notably, no one was able to identify the passcode. The RSVP method offers a memorable, usable, quick, and secure alternative for authentication on multi-touch mobile devices.


Graphical password Authentication Rapid serial visual presentation Mobile 


  1. 1.
    Nicholson, J., Coventry, L., Briggs, P.: Faces and pictures: understanding age differences in two types of graphical authentications. Int. J. Hum Comput. Stud. 71(10), 958–966 (2013)CrossRefGoogle Scholar
  2. 2.
    Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Computer security applications conference, 21st annual, pp. 463–472. IEEE (2005, December)Google Scholar
  3. 3.
    Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Convergence and Hybrid Information Technology, 2008. ICCIT’08. Third International Conference on, vol. 2, pp. 1137–1143. IEEE (2008, November)Google Scholar
  4. 4.
    Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst., pp. 161–185 (1999)Google Scholar
  5. 5.
    Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Pass Points: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102–127 (2005)CrossRefGoogle Scholar
  6. 6.
    Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol J 19(3), 122–131 (2001)CrossRefGoogle Scholar
  7. 7.
    Menkus, B.: Understanding the use of passwords. Comput. Secur. 7(2), 132–136 (1988)CrossRefGoogle Scholar
  8. 8.
    Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)CrossRefGoogle Scholar
  9. 9.
    Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 15–29. ACM (2013, July)Google Scholar
  10. 10.
    Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: Computer Software and Applications Conference, 2009. COMPSAC’09. 33rd Annual IEEE International, vol. 2, pp. 318–323. IEEE (2009, July)Google Scholar
  11. 11.
    Davis, D., Monrose, F., Reiter, M. K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, pp. 11–11 (2004, August)Google Scholar
  12. 12.
    Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: Secure authentication usable anywhere. In: Proceedings of the 4th symposium on Usable privacy and security, pp. 35–45. ACM (2008, July)Google Scholar
  13. 13.
    Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Comput. 1, 30–36 (2003)CrossRefGoogle Scholar
  14. 14.
    RealUser, Last accessed in June 2005
  15. 15.
    Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177–184. ACM (2006, May)Google Scholar
  16. 16.
    Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp Psychol. Human Learn. Mem. 2(5), 523–528 (1976)CrossRefGoogle Scholar
  17. 17.
    Nickerson, R.S.: Short-term memory for complex meaningful visual configurations: a demonstration of capacity. Can. J. Psychol/Revue canadienne de psychologie 19(2), 155–160 (1965)CrossRefGoogle Scholar
  18. 18.
    Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156–163 (1967)CrossRefGoogle Scholar
  19. 19.
    Standing, L.: Learning 10000 pictures. Q. J. Exp. Psychology 25(2), 207–222 (1973)CrossRefGoogle Scholar
  20. 20.
    Standing, L., Conezio, J., Haber, R.N.: Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychon. Sci. 19(2), 73–74 (1970)CrossRefGoogle Scholar
  21. 21.
    Paivio, A.: Imagery and verbal processes. Psychology Press, UK (2013)Google Scholar
  22. 22.
    Mintzer, M.Z., Snodgrass, J.G.: The picture superiority effect: Support for the distinctiveness model. Am. J. Psychol. 112(1), 113–146 (1999)CrossRefGoogle Scholar
  23. 23.
    Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13–23. ACM (2012, December)Google Scholar
  24. 24.
    Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? A field trial investigation. In: People and Computers XIV—Usability or Else! pp. 405–424. Springer, London (2000)Google Scholar
  25. 25.
    Schaub, F., Walch, M., Könings, B., Weber, M.: Exploring the design space of graphical passwords on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11–26. ACM (2013, July)Google Scholar
  26. 26.
    Biederman, I.: Recognition-by-components: A theory of human image understanding. Psychol. Rev. 94(2), 115–147 (1987)CrossRefGoogle Scholar
  27. 27.
    Snodgrass, J.G., Vanderwart, M.: A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Human Learn. Mem. 6(2), 174–215 (1980)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of PsychologyOld Dominion UniversityNorfolkUSA

Personalised recommendations