Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 13, Issue. 8, August 2024, pg.107 – 117
Improving the Usability of Graphical
Authentication Systems Using
Subject-Based Images
Hassan Umar Suru
Department of Computer Science, Kebbi State University of Science and Technology, Aliero
Email: hu.suru@ksusta.edu.ng; suruhassan@yahoo.com
DOI: https://doi.org/10.47760/ijcsmc.2024.v13i08.012
Abstract – Recognition based graphical authentication systems rely on a system user’s ability to recognize
previously chosen images and use those images to gain access into a computing systems, devices or application.
Recognition based systems that utilise several types of images have been developed and studied. The déjà vu
scheme depends on the use of abstract (meaningless) images. Images in the déjà vu scheme have no exact
meaning. This scheme has also been actively studied. This article presents a between user study conducted on
two recognition-based schemes using system prototypes. The Abstract Based Graphical Authentication (ABGA)
was designed to simulate the déjà vu scheme. The performance of this system was compared with the
performance of a novel system developed for this research. The novel system, called Subject Based Graphical
Authentication (SBGA), in which the system used images from the various disciplines of the research
participants. The researcher conducted a lab-based study with 100 participants, 50 participants for each of the
prototypes. The study investigated the impact of using subject based images to enhance the usability and
security of recognition-based graphical passwords. Two graphical models were thus developed and presented to
the 100 participants, which comprised of staff and students from the departments of Computer Science,
Mathematics, and Engineering. In the experiments, participants selected their graphical passwords from sets of
images representing their various disciplines. The researcher observed that the memorability rate for graphical
passwords consisting of subject based images aligned with participants' disciplines surpassed the rate for
passwords with purely abstract images. The results indicated 81.7% successful login rate and 18.3% failure
rate for Subject Based Graphical Authentication (SBGA). In contrast, Abstract Based Graphical Authentication
(ABGP) exhibited a 51.5% successful login rate and a 48.7% failure rate. The findings provide significant
insights for graphical password designers and developers seeking to enhance system memorability. Balancing
image familiarity with security considerations can lead to more user-friendly and effective recognition-based
authentication systems. This study provides valuable insights into the benefits of incorporating familiar images
in recognition-based graphical passwords, showcasing a significant improvement in memorability and user
authentication success. The findings underscore the importance of considering the user’s familiarity with
portfolio images in the design of graphical authentication systems.
Keywords – Graphical, Authentication, Authentication, Authentication Systems, Usability, Subject based.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
107
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
I. INTRODUCTION
Authentication, the process of permitting access to authorized users while preventing
unauthorized access, stands as a crucial aspect of computer security (Shammee et al., 2020).
For decades, user authentication has been at the forefront of computing security, especially
with the continuous growth of technology raising concerns about security threats from
attackers, hackers, crackers, scammers, and spammers (Pirim et al., 2008). Authentication,
therefore, plays a pivotal role in both research and practical applications of security (Gao et
al., 2009; Velásquez et al., 2018).
The most widely adopted method for remote user authentication is passwords, where a
password, defined as a secret word or string of characters, serves to prove identity and grant
access to resources (Das et al., 2004). Despite its popularity due to high usability and costeffectiveness compared to alternatives like graphic and biometric authentication, text-based
authentication has drawbacks. Users often resort to inse cure practices, such as reusing single
passwords across multiple accounts for ease of remembrance, compromising security (Devika
& Backiyalakshmi, 2014).
In response to the limitations of traditional text-based passwords, graphical password
techniques have emerged. Leveraging images, which are inherently more memorable than
text, these techniques aim to enhance the security and usability of authentication (Yahia et al.,
2021). Graphical passwords, also known as graphical authentication systems, replace
characters or numbers with images during user authentication (Suru & Murano, 2019). These
techniques can be broadly categorized into Recognition-based, Pure Recall-Based, Cued
Recall-Based, and Hybrid Techniques (Perrig et al., 1999).
As digital systems continue to evolve, the necessity for authentication methods that balance
security and user-friendliness becomes increasingly apparent. This research titled "Improving
the Usability of Graphical Authentication Systems Using Subject-Based Images" focused on
understanding the effect of utilizing subject based images in enhancing the memorability of
graphical passwords, particularly within users' academic disciplines. The study employs a
combination of quantitative measures (success rates, login time) and qualitative data gathered
from user feedback and perceptions. By exploring the relationship between image familiarity
and the memorability of graphical authentication methods, the research aims to provide
valuable insights into user preferences and experiences. Preliminary findings suggest that
graphical passwords associated with familiar images exhibit higher memorability, indicating
a user preference for authentication systems that leverage familiar visual cues. The study not
only offers practical recommendations for the implementation of graphical password systems,
but also highlights the importance of user-centered design principles. Acknowledging
limitations, including sample bias and the short-term nature of the study, the research
suggests avenues for future exploration to address these constraints. In conclusion, this
research contributes essential insights to the field of graphical authentication, emphasizing
the significance of the familiarity of portfolio images to systems’ users in enhancing
memorability and user preferences in the ever-evolving digital landscape.
II. RELATED WORK
2.1 Graphical-Based Authentication Techniques
The evolution of authentication methods has led to the emergence of graphical password techniques,
offering a solution to the limitations inherent in traditional text-based approaches, given the inherently
higher recall value of images compared to text (Yahia et al., 2021). The Graphical-Based
Authentication Technique involves users creating a password by selecting an image during the
registration process, which is subsequently stored in a database. When the user opts for the
authentication process, these pre-selected images are retrieved and presented. Within this technique,
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
108
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
users then choose a specific image from a collection and designate multiple points of interest (POI)
regions within the selected image. Each POI is characterized by a circle (center and radius). For each
designated POI, the user associates a word or phrase, which is then combined with the specific points
of interest. Notably, the user has the flexibility to either enforce a specific order for selecting POIs,
resulting in a stronger password, or render the order insignificant.
The classification of graphical password techniques reveals four distinct categories: Recognitionbased techniques, Pure Recall-Based techniques, Cued Recall-Based, and Hybrid approaches (Perrig
et al., 1999). This categorization underscores the diverse strategies employed within graphical
authentication, showcasing the breadth of methods available for securing digital access.
This foundational understanding of graphical-based authentication techniques serves as a crucial
background for exploring their effectiveness and user preferences, aligning with the research goal of
investigating the effect of using subject based images on the memorability of recognition-based
graphical authentication systems. By recognizing the diverse categories of graphical techniques, the
research aims to discern patterns in user behavior and preferences, particularly in the context of
subject based and abstract images.
2.2 PURE RECALL-BASED GRAPHICAL PASSWORDS
Pure recall-based systems, also known as draw metric systems, necessitate users to memorize and
replicate secret drawings created during the registration process (Robert et al., 2012). These systems,
devoid of memory cues, typically generate and recall passwords based on users' ability to recreate
their initial drawings accurately. Numerous graphical password algorithms have adopted pure recallbased methods, often building upon or enhancing the pioneering Draw-A-Secret (DAS) scheme.
DAS, proposed by Jermyn et al., allows users to create a free-form drawing on a 5x5 grid during
registration, with the same drawing reproduced during authentication for access to secure resources.
Remarkably, the DAS system is alphabet-independent, accessible to users of any language for various
applications (Dunphy & Yan, 2007). The technique provides users the freedom to draw passwords of
any length without the need for image transfers over networks, reducing traffic loads and server-side
graphical database storage. The password space of grid-based schemes surpasses that of traditional
textual passwords. However, vulnerabilities include susceptibility to guessing and shoulder-surfing
attacks.
Thorpe and van Oorschot (2004) conducted a comprehensive analysis of the memorable password
space of the DAS scheme. Introducing the concept of graphical dictionaries, they explored the
potential for brute-force attacks and identified security concerns. Their findings revealed that longer
DAS passwords, especially those of length 8 or larger on a 5x5 grid, exhibited reduced susceptibility
to dictionary attacks compared to textual passwords. Additionally, the study uncovered that the space
of mirror symmetric graphical passwords in DAS was significantly smaller than the full password
space, potentially compromising security. To address this, the researchers suggested using longer
passwords to mitigate the security risk associated with symmetric passwords.urther research by
Thorpe and van Oorschot delved into the impact of password length and stroke count on the
complexity of the DAS scheme. Their study highlighted that stroke count significantly influences the
DAS password space, with fewer strokes leading to a substantial decrease in password space for a
fixed length. To enhance security, the researchers proposed a "Grid Selection" technique, allowing
users to select a drawing grid, a specific rectangular region, from an initially large grid during
authentication. This proposed method aimed to augment the DAS password space substantially.
In contrast, signature techniques, proposed by Syukri et al. (1998), involve users drawing their
signatures during registration and verification stages. The system extracts the signature area during
registration and employs geometric average means and dynamic database updates for verification.
However, drawbacks include susceptibility to signature forgery, as drawing with a mouse may be
unfamiliar and challenging for some users.
Point of Departure with Research Goal: This literature provides a foundation for understanding the
intricacies of pure recall-based graphical passwords, particularly the vulnerabilities and proposed
enhancements. The research goal, investigating the effect of using subject based images on the
memorability of recognition-based graphical authentication, aligns with this understanding by
focusing on user preferences and experiences, shedding light on the effectiveness of these techniques
in real-world scenarios.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
109
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
2.3 Cued-Recall Systems
Cued-recall systems represent a distinct category where users are prompted to remember and pinpoint
specific locations within an image (Robert et al., 2012). This design aims to alleviate the memory
burden on users by presenting a more manageable memory task compared to pure recall. Unlike pure
recall, where users must reproduce an entire image, cued-recall tasks involve remembering specific
details or regions within an image.
Research suggests that individuals possess accurate and detailed visual memories of objects they
previously focused on in visual scenes. This implies that users might be capable of accurately
recalling specific parts of an image if those parts were the focus of their attention. In an effective
cued-recall system, the cue should be beneficial solely to legitimate users, offering assistance in
recalling the password, while remaining elusive to attackers attempting to guess the password.
Point of Departure with Research Goal: The exploration of cued-recall systems aligns with the
research goal of understanding the effect of using subject based images on the memorability of
recognition-based graphical authentication. Cued-recall systems, by design, offer a compromise
between pure recall and recognition, potentially enhancing user experience and security. Investigating
the effectiveness of cued-recall systems, particularly in the context of user preferences for subject
based images, contributes valuable insights to the overarching research goal.
2.4 Recognition-Based Technique
Recognition-based graphical authentication systems rely on the user's ability to recognize
images selected earlier from a substantial collection of images (Suru & Murano, 2019). In
this approach, during each authentication attempt, users are presented with numerous images,
and they are expected to correctly identify and select the images representing their chosen
password.
Figure 1.: Déjà vu (Touraj, 2015)
Various recognition-based schemes have been developed and evaluated in this context.
Dunphy and Yan (2007) introduced a graphical authentication scheme based on the Hash
Visualization Technique proposed by Perrig et al. (1999). In this system, users are prompted
to select a specific number of images from a set of randomly generated pictures.
Subsequently, during authentication, users need to identify and choose the pre-selected
images. Results from evaluations demonstrated a success rate of 90% for participants using
this technique, surpassing the 70% success rate achieved with text-based passwords.
However, a drawback is the necessity for the server to store the seeds of the portfolio images
for each user in plain text, introducing potential security concerns. Additionally, the process
can be perceived as tedious and time-consuming.
From a security standpoint, recognition-based systems may not be direct replacements for
text passwords, as their password spaces are comparable in cardinality to 4 or 5-digit PINs,
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
110
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
assuming a reasonable set of images for usability purposes. Proposed recognition-based
systems incorporate various image types, including faces, random art, everyday objects, and
icons. Renaud delves into specific security and usability considerations, offering design
guidelines to enhance the usability of recognition-based systems.
Figure 2.: Passfaces Scheme (Davis 2014)
Point of Departure with current study, the Recognition-based techniques play a crucial role in
the exploration of the the effect of using subject based images on the memorability of recognitionbased graphical authentication. By understanding the strengths and weaknesses of
recognition-based systems, especially in the context of users' preferences for familiar images,
the research aims to contribute insights into the practicality and effectiveness of these
techniques in real-world scenarios.
III. MATERIALS AND METHODS
1.
2.
3.
4.
The research goal was to investigate the effect of using subject based images on the usability and
security of recognition-based graphical authentication system. Focused on understanding the
effect of using subject based images in enhancing the memorability of graphical
authentication systems, particularly within users' academic disciplines. The study employs a
combination of quantitative measures (success rates, login time) and qualitative data (user
satisfaction) gathered from user feedback and perceptions through research questionnaires.
To achieve the research objectives, lab-based studies were conducted to answer the following
research questions in order to provide a deeper understanding of the user behavior, as well as
to collect benchmarks and ideas for the development of future authentication systems:
How does the memorability of graphical passwords based on subject based images compare
to those based on abstract images?
Will there be a significant difference in password creation time by users using subject based
images compared to abstract images?
What is the login failure rate for users attempting authentication with subject image-based
passwords versus abstract image-based passwords?
How do users perceive and prefer graphical passwords based on subject based or familiar
images compared to those based on abstract images?
Two graphical models were developed: the first model contains images from three disciplines
of mathematics, computer science, and engineering as shown in fig. 3, fig. 4 and fig. 5. The
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
111
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
second model contains abstract images. A total of 50 participants were recruited from both
staff and students, selected from the departments of computer science, mathematics, and
engineering. All participants were introduced to the new system and its intended purpose.
Before starting, participants answered demographic questions, including gender, age, and the
number of familiar (chosen) images from their selected images after registration. User
authentication behaviors and preferences are recorded and analyzed using basic statistical
data analysis tools.
Figure 3: Image Selection from Discipline of Mathematics
Figure 4: Image Selection from Discipline of Computer Science
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
112
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
Figure 5: Image Selection from Discipline of Engineering
3.1 USABILITY METRICS
Poet, (2012) suggests the means by which data can be efficiently captured for data analysis in
the usability evaluation of graphical authentication systems. This research used this model in
the implementation and evaluating user behaviors.
Dependent variable
1. Effectiveness
2. Efficiency
3. User satisfaction
Table 1: The Usability Metrics
Behaviors to be measured
Ease to remember
Ease to remember
Authentication
time
+
Enrolment time
Ease to recall
Ease to find the
authenticator image during
authentication
Preference of the user
Method of measurement
Questionnaire
System log
System log
Questionnaire
Questionnaire
Questionnaire
3.2 EXPERIMENT PROCEDURE
In the initial authentication session, each participant is tasked with generating a graphical
password using one of the developed models. Subsequently, the participant logs into the
system using the newly created password. The researcher requires only data pertaining to the
success of user authentication across various authentication sessions. The participant is
subsequently requested to return for a succeeding authentication session at a later date. Each
participant undergoes a total of four login sessions. The initial login session occurs on the day
the password is created, followed by the second session taking place two days after the first.
The third login session is conducted one week after the second session, and finally, the fourth
login session is completed two weeks after the third session. This gradual increase in time
intervals is implemented to help understand the effects of time to long-term memory.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
113
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
IV. RESULT AND DISCUSSION
4.1 LOGIN SUCCESS RATES
Purpose: To measure how successfully participants can create and remember graphical
passwords.
The statistical analysis provides strong evidence that Subject-Based Graphical Authentication
(SBGA) yields significantly higher login success rates compared to Abstract-Based Graphical
Authentication (ABGA). This suggests that incorporating familiar images into the graphical
authentication process enhances the chances of successful logins.
Table 2: Login Success Rates
Login Success Rates
Model Type
Means
SBGA
86.7
ABGA
53.5
SD
2.99
8.35
P-V
0.001338
Figure 6: Login Success Rates
Table 2 shows that the mean login success rate for SBGA (86.7) is notably higher than that for ABGA
(53.5). This suggests that, on average, users in the SBGA group had a higher success rate in login
compared to users in the ABGA group. The standard deviation gives an indication of the variability
in the data. The lower standard deviation for SBGA (SD = 2.99) suggests that the login success rates
in this group are less variable around the mean compared to the ABGA group (SD = 8.35). The pvalue of 0.001338 is less than the conventional significance level of 0.05. This indicates that there is a
statistically significant difference in login success difference between SBGA and ABGA
4.2 PASSWORD CREATION TIME
The statistical analysis indicates a significant difference in the time taken to create passwords between
Subject Based Graphical Authentication (SBGA) and Abstract-Based Graphical Authentication
(ABGA). On average, users in the SBGA group spent less time creating passwords compared to the
ABGA group.
Table 3: Password Creation Time
Password Creation Time
Model Type
Means SD
p-Value
SBGA
6.125
1.312335
0.010323
ABGA
7.875
1.154701
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
114
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
Figure 7: Password Creation Time
On average, participants in the SBGA group as shown in Table 2 shows that it took less time
(6.125 seconds) to create a password compared to participants in the ABGA group (7.875
seconds). This indicates a notable difference in the time required to create passwords between
the two groups. The standard deviation for the SBGA group (1.312335) and ABGA group
(1.154701) provides information about the variability in the time taken. The lower standard deviation
for SBGA suggests less variability in the time taken to create passwords compared to ABGA. The pvalue of 0.010323 is less than the conventional significance level of 0.05. This suggests that there is a
statistically significant difference in the time taken to create passwords between SBGA and ABGA.
4.3 NUMBER OF AUTHENTICATION ATTEMPTS
The statistical analysis from Table 3 reveals a statistically significant difference in the mean
number of authentication attempts between users in the ABGA and SBGA groups. On
average, users in the SBGA group required fewer authentication attempts compared to the
ABGA group.
Table 4: Authentication Attempts
Number of Authentication Attempts
Model Type
SBGA
ABGA
mean
1.25
2.50
sd
1.142609
1.258306
p-value
0.042948
On average, participants in the SBGA group required fewer authentication attempts (1.25)
compared to participants in the ABGA group (2.50). This suggests a statistically significant
difference in the efficiency of authentication between the two groups. The standard deviation
for the SBGA group (1.1426091) and ABGA group (1.258306) provides information about
the variability in the number of authentication attempts. The lower standard deviation for
SBGA suggests less variability in the number of attempts compared to ABGA. The p-value
of 0.042948 is less than the conventional significance level of 0.05. This indicates that there
is a statistically significant difference in the number of authentication attempts between
SBGA and ABGA. The findings as shown in Table 3 suggest that Subject-Based Graphical
Authentication (SBGA) may offer a more efficient authentication process, as reflected in the
significantly lower number of attempts required. This could have positive implications for
user experience and system efficiency.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
115
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
4.5 LOGIN FAILURE RATES
Table 5: Login Failure Rates
LOGIN FAILURE RATES
Password Type
Means SD
P-value
SBGA
13.3
0.5
0.000478
ABGA
46.7
3.8
The mean login failure rate for the Subject Based Graphical Authentication (SBGA) group is
13.3. The mean login failure rate for the Abstract Based Graphical Authentication (ABGA) is
46.7. The standard deviation for the SBGA group (0.5) and ABGA (3.8) provides information
about the variability in the login failure rates. The lower standard deviation for SBGA
suggests less variability in the failure rates compared to ABGA. The p-value of 0.000478 is
less than the conventional significance level of 0.05. This indicates that there is a statistically
significant difference in the login failure rates between SBGA and ABGA.
V. CONCLUSION AND FUTURE WORK
In exploring "Improving the Usability of Graphical Authentication Systems Using Subject
Based Images" the study has uncovered valuable insights into the usability aspects of
graphical password systems. The findings shed light on the significance of image familiarity
in the user authentication process.
The results indicate that graphical passwords created from familiar images demonstrate a
higher level of memorability compared to those based on abstract images. Users, when given
the choice, exhibited a preference for graphical passwords associated with images from their
familiar surroundings, such as academic disciplines. This aligns with the idea that leveraging
familiar imagery contributes positively to the user experience and may enhance the overall
usability of recognition-based graphical authentication systems.
While the study provides practical recommendations for system developers to consider
incorporating familiar images into graphical password designs, certain limitations are
acknowledged. These include the potential for sample bias, the short-term nature of the study,
and the influence of learning effects. Future research endeavors should address these
limitations by conducting longitudinal studies with diverse user populations to provide a
more comprehensive understanding of the long-term impact of image familiarity on
memorability.
The study underscores the importance of user-centered design principles in the development
of graphical authentication systems. By recognizing the role of image familiarity in
enhancing memorability, system designers can work towards creating more user-friendly and
effective authentication methods. The implications of these findings extend beyond the
specifics of the study, prompting a broader discussion on the delicate balance between
usability and security in the realm of graphical authentication.
In conclusion, this research contributes valuable insights to the field, emphasizing the
significance of user familiarity with images in the design and implementation of secure and
memorable authentication systems.
References
[1]. Alsuhibany, S. A. (2021). A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing
Attack. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/6653076
[2]. Bryant, K., & Campbell, J. (2006). User Behaviours Associated with Password Security and Management. Australasian
Journal of Information Systems, 14(1). https://doi.org/10.3127/ajis.v14i1.9
[3]. Cranor, L. F., & Garfinkel, S. (2004). Secure or usable? IEEE Security and Privacy, 2(5), 16–18.
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
116
Hassan Umar Suru, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.8, August- 2024, pg. 107-117
https://doi.org/10.1109/MSP.2004.69
[4]. Devika, S., & Backiyalakshmi, R. (2014). Design and Analysis of User Identification for Graphical Password System.
5(1), 486–489.
[5]. Dunphy, P., & Yan, J. (2007). Do background images improve “draw a secret” graphical passwords? Proceedings of the
ACM Conference on Computer and
[6]. Lauesen, S., & Younessi, H. (1988). Six Styles for Usability Requirements. Refsq, 1–12.
[7]. Perrig, A., Perrigcscmuedu, A., Song, D., & Songcscmuedu, D. (1999). Hash Visualization : a New Technique to
improve Real-World Security. International Workshop on Cryptographic Techniques and E-Commerce, 1–8.
https://azrael.digipen.edu/~mmead/www/Courses/CS180/HashVisualization.pdf
[8]. Preußner, J., Rudnik, Y., Brehm, H., Völkl, R., & Glatzel, U. (2009). Original Research Article. International Journal
of Plasticity, 25(5), 973–994. http://www.sciencedirect.com/science/article/pii/S074964190800065X
[9]. Poet, R. (2012). Deposited on: 4 October 2012 Enlighten – Research publications by members of the University of
Glasgow http://eprints.gla.ac.uk. 27(November), 4–11.
[10]. Robert, B., Chiasson, S., & Van Oorschot, P. C. (2012). Graphical passwords: Learning from the first twelve years.
ACM Computing Surveys, 44(4). https://doi.org/10.1145/2333112.2333114
[11]. Shammee, T. I., Akter, T., Mou, M., Chowdhury, F., & Ferdous, M. S. (2020). A Systematic Literature Review of
Graphical Password Schemes. Journal of Computing Science and Engineering, 16(4), 163–185.
https://doi.org/10.5626/JCSE.2020.14.4.163
[12]. Syukri, A. F., Okamoto, E., & Mambo, M. (1998). A user identification system using signature written with mouse.
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 1438(January 1998), 403–414. https://doi.org/10.1007/bfb0053751
[13]. Suru, H. U., & Murano, P. (2019). Security and User Interface Usability of Graphical Authentication Systems – A
Review.
International
Journal
of
Computer
Trends
and
Technology,
67(2),
17–36.
https://doi.org/10.14445/22312803/ijctt-v67i2p104
[14]. Yahia, H. S., Zeebaree, S. R. M., Sadeeq, M. A. M., Salim, N. O. M., Kak, S. F., AL-Zebari, A., Salih, A. A., &
Hussein, H. A. (2021). Comprehensive Survey for Cloud Computing Based Nature-Inspired Algorithms Optimization
Scheduling. Asian Journal of Research in Computer Science, 8(2), 1–16. https://doi.org/10.9734/ajrcos/2021/v8i230195
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden
117