Abstract

The pattern password method is amongst the most attractive authentication methods and involves drawing a pattern; this is seen as easier than typing a password. However, since people with visual impairments have been increasing their usage of smart devices, this method is inaccessible for them as it requires them to select points on the touch screen. Therefore, this paper exploits the haptic technology by introducing a vibration-based pattern password approach in which the vibration feedback plays an important role. This approach allows visually impaired people to use a pattern password through two developed vibration feedback: pulses, which are counted by the user, and duration, which has to be estimated by the user. In order to make the proposed approach capable to prevent shoulder-surfing attacks, a camouflage pattern approach is applied. An experimental study is conducted to evaluate the proposed approach, the results of which show that the vibration pulses feedback is usable and resistant to shoulder-surfing attacks.

Highlights

  • Due to the technological revolution, people have become reliant on their smart devices in everyday life.many people store personal and sensitive information on them making security a major concern

  • This paper exploits the haptic technology by introducing a vibration-based pattern password approach in which the vibration feedback plays an important role. This approach allows visually impaired people to use a pattern password through two developed vibration feedback: pulses, which are counted by the user, and duration, which has to be estimated by the user

  • We have developed two vibration feedbacks: (1) feedback through vibration pulses which are counted by the user, and (2) feedback through vibration duration which has to be estimated by the user

Read more

Summary

Introduction

Many people store personal and sensitive information on them making security a major concern. This leads to the need to take into account the authentication process, which is a security technique [1]. There are many authentication approaches proposed in the literature One of these approaches is a graphical password [2] that has been developed as an alternative to the text password authentication system. It uses predefined items from a set of images or certain geometric shapes in a specific order [3]

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.