Skip to main content

Human-Computer Interaction

  • Chapter
  • First Online:
Fundamentals of Sketch-Based Passwords

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

The main objective of this chapter is to summarize the authors’ recent work which studied the human-computer interaction for sketch-based passwords. However, before discussing the previous results, the features used specifically for implementation of SKS are discussed, and an overview of the database used for the HCI study (and some experiments and results in the subsequent chapter) is provided. The features used for the application of sketch-based passwords incorporates four fundamental properties: (1) shape, (2) direction, (3) order, and (4) pressure, which comprise a local 5D feature descriptor at every sketch sample point. The database used for this HCI study was constructed by the authors in (Riggan et al., A human factors study of graphical passwords using biometrics. Proc. of the 36th German Conf. on Pattern Recognition, 2014). This database considers a sufficiently large and complete set of users and many variations of sketch-based passwords. The previous HCI is useful to understand the connection between human perception and certain similarity measures, specifically for sketch-based authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The term complexity, here, refers to the complexity of the drawing itself. There are many possible definition for complexity of a drawing, such as the polynomial order of an appropriate regression model or the number of self-intersections.

  2. 2.

    Distributions for H1, D2, and H2 are similar the distributions shown here.

  3. 3.

    For the D1, H1, D2, and H2 histograms, the reference sketches (i.e. used to build model) come from the D1 session and testing is performed on the sketch from the respective session. Note for the D1 session the scores corresponding to identical sketches are removed from the histogram to reduce result bias.

  4. 4.

    SKS may be more robust than the Frechet distance because it has a broad definition of similar and more narrow definition of different.

References

  1. P. K. Agarwal, H. K. Avraham, H. Kaplan, and M. Sharir. Computing the discrete freéchet distance in subquadratic time. Proc. of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 156–167, 2013.

    Google Scholar 

  2. H. Alt and H. Godau. Computing the fréchet distance between two polygonal curves. Int’l Journal of Computational Geometry and Applications, 5(1–2):75–91, 1995.

    Article  MATH  MathSciNet  Google Scholar 

  3. M. Martinez-Diaz, J. Fierrez, C. Martin-Diaz, and J. Ortega-Garcia. DooDB: A Graphical Password Database Containing Doodles and Pseudo-Signatures. 12th Int’l. Conf. on Frontiers in Handwriting Recognition, pages 339–344, 2010.

    Google Scholar 

  4. M. Martinez-Diaz, J. Fierrez, and J. Galbally. The DooDB Graphical Password Database: Data Analysis and Benchmark Results. IEEE Access, 1:596–605, 2013.

    Article  Google Scholar 

  5. B. S. Riggan, W. E. Snyder, X. Wang, and J Feng. A human factors study of graphical passwords using biometrics. Proc. of the 36th German Conf. on Pattern Recognition, 2014.

    Google Scholar 

  6. B. S. Riggan, W. E. Snyder, X. Wang, and L. K. Norris. A sketch-based authentication system with biometrics: security and usability analysis. Pattern Recognition (Under Review), 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benjamin S. Riggan .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Riggan, B., Snyder, W., Wang, C. (2014). Human-Computer Interaction. In: Fundamentals of Sketch-Based Passwords. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-13629-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13629-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13628-8

  • Online ISBN: 978-3-319-13629-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics