Advertisement

A Comprehensive Study of the Usability of Multiple Graphical Passwords

  • Soumyadeb Chowdhury
  • Ron Poet
  • Lewis Mackenzie
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8119)

Abstract

Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In this paper, we present the first published comparison of the usability of multiple graphical passwords with four different image types: Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longitudinal experiment was performed with 100 participants over a period of 8 weeks, to examine the usability performance of each of the image types. The results of the study demonstrate that object images are most usable in the sense of being more memorable and less time-consuming to employ, Mikon images are close behind but doodle and art images are significantly inferior. The results of our study complement cognitive literature on the picture superiority effect, visual search process and nameability of visually complex images.

Keywords

usability user authentication multiple image passwords 

References

  1. 1.
    Adams, A., Sasse, M.: Users are Not the Enemy. Communications of the ACM, 40–46 (1999)Google Scholar
  2. 2.
    Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of 16th International Conference on World Wide Web, University of Calgary, pp. 657–666 (2007)Google Scholar
  3. 3.
    Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial in-vestigation. In: Proceedings of HCI on People and Computers XIV, pp. 405–424 (2000)Google Scholar
  4. 4.
    Madigan, S.: Picture Memory Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. In: Yuille, J. (ed.). Lawrence Erlbaum Associates, Hillsdale (1983)Google Scholar
  5. 5.
    Paivio, A.: Mental Representataions: A Dual Coding Approach. Oxford Press, UK (1986)Google Scholar
  6. 6.
    Chowdhury, S., Poet, R.: Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: Proceeding of Conference on User Science and Engineering, pp. 54–58 (2011)Google Scholar
  7. 7.
    Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: Proceedings of the Conference on USENIX Security Symposium, vol. 13, p. 11 (2005)Google Scholar
  8. 8.
    Dhamija, R., Perrig, A.: Déjà vu: A user study using images for authentication. In: Proceedings of the Conference on USENIX Security Symposium, vol. 9, p. 4 (2000)Google Scholar
  9. 9.
    Renaud, K.: A Visuo- Biometric Authentication Mechanism for Old Users. In: Proceeding of British HCI, pp. 167–182 (2005)Google Scholar
  10. 10.
    Renaud, K.: Web authentication using Mikon images. In: Proceedings of World Congress on Privacy, Security, Trust and the management of E-Business, pp. 1–10 (2009)Google Scholar
  11. 11.
    Moncur, W., Leplâtre, G.: Pictures at the ATM: exploring the usability of multiple graphical passwords. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 887–894 (2007)Google Scholar
  12. 12.
    Everitt, K., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference and training of multiple graphical passwords. In: Proceedings of Conference on Human Factors in Computing Systems, pp. 889–898 (2009)Google Scholar
  13. 13.
    SUS questionnaire (2013), http://www.usabilitynet.org/trump/methods/satisfaction.htm (accessed January 19, 2013)
  14. 14.
    NASA Task Load Index, http://humansystems.arc.nasa.gov/groups/TLX/downloads/TLXScale.pdf (accessed January 19, 2013)
  15. 15.
    Strauss, A., Corbin, J.: Basics of qualitative research: Grounded theory procedures and techniques. Sage, Newbury Park (1990)Google Scholar
  16. 16.
    Wolfe, M.: Guided search 2.0 a revised model of visual search. Psychonomic Bulletin & Review 1(5), 202–238 (1994)CrossRefGoogle Scholar
  17. 17.
    Szekely, A., Bates, E.: Objective visual complexity as a variable in picture naming, University of California. CRL Newsletter Center for Research in Language, pp. 3–33 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Soumyadeb Chowdhury
    • 1
  • Ron Poet
    • 1
  • Lewis Mackenzie
    • 1
  1. 1.School of Computing ScienceUniversity of GlasgowUK

Personalised recommendations