Abstract
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been proposed as one potential solution to the need for more usable authentication. The rapid increase in the technologies requiring user authentication has increased the number of passwords that users have to remember. But nearly all prior work with RBGSs has studied the usability of a single password. In this paper, we present the first published comparison of the usability of multiple graphical passwords with four different image types: Mikon, doodle, art and everyday objects (food, buildings, sports etc.). A longitudinal experiment was performed with 100 participants over a period of 8 weeks, to examine the usability performance of each of the image types. The results of the study demonstrate that object images are most usable in the sense of being more memorable and less time-consuming to employ, Mikon images are close behind but doodle and art images are significantly inferior. The results of our study complement cognitive literature on the picture superiority effect, visual search process and nameability of visually complex images.
Chapter PDF
Similar content being viewed by others
References
Adams, A., Sasse, M.: Users are Not the Enemy. Communications of the ACM, 40–46 (1999)
Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of 16th International Conference on World Wide Web, University of Calgary, pp. 657–666 (2007)
Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial in-vestigation. In: Proceedings of HCI on People and Computers XIV, pp. 405–424 (2000)
Madigan, S.: Picture Memory Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. In: Yuille, J. (ed.). Lawrence Erlbaum Associates, Hillsdale (1983)
Paivio, A.: Mental Representataions: A Dual Coding Approach. Oxford Press, UK (1986)
Chowdhury, S., Poet, R.: Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: Proceeding of Conference on User Science and Engineering, pp. 54–58 (2011)
Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: Proceedings of the Conference on USENIX Security Symposium, vol. 13, p. 11 (2005)
Dhamija, R., Perrig, A.: Déjà vu: A user study using images for authentication. In: Proceedings of the Conference on USENIX Security Symposium, vol. 9, p. 4 (2000)
Renaud, K.: A Visuo- Biometric Authentication Mechanism for Old Users. In: Proceeding of British HCI, pp. 167–182 (2005)
Renaud, K.: Web authentication using Mikon images. In: Proceedings of World Congress on Privacy, Security, Trust and the management of E-Business, pp. 1–10 (2009)
Moncur, W., Leplâtre, G.: Pictures at the ATM: exploring the usability of multiple graphical passwords. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 887–894 (2007)
Everitt, K., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference and training of multiple graphical passwords. In: Proceedings of Conference on Human Factors in Computing Systems, pp. 889–898 (2009)
SUS questionnaire (2013), http://www.usabilitynet.org/trump/methods/satisfaction.htm (accessed January 19, 2013)
NASA Task Load Index, http://humansystems.arc.nasa.gov/groups/TLX/downloads/TLXScale.pdf (accessed January 19, 2013)
Strauss, A., Corbin, J.: Basics of qualitative research: Grounded theory procedures and techniques. Sage, Newbury Park (1990)
Wolfe, M.: Guided search 2.0 a revised model of visual search. Psychonomic Bulletin & Review 1(5), 202–238 (1994)
Szekely, A., Bates, E.: Objective visual complexity as a variable in picture naming, University of California. CRL Newsletter Center for Research in Language, pp. 3–33 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chowdhury, S., Poet, R., Mackenzie, L. (2013). A Comprehensive Study of the Usability of Multiple Graphical Passwords. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds) Human-Computer Interaction – INTERACT 2013. INTERACT 2013. Lecture Notes in Computer Science, vol 8119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40477-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-40477-1_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40476-4
Online ISBN: 978-3-642-40477-1
eBook Packages: Computer ScienceComputer Science (R0)