The Effects of coherence of the image used in the graphical password scheme in terms of usability and security

Download
2012
Arslan Aydın, Ülkü
There is a dilemma between security and usability, which are two fundamentally conflicting issues. From the usability perspective, authentication protocols should be easy to use and passwords generated from these protocols should be easy to remember. From the security perspective, passwords should be hard to guess and should not be written down or stored in a plain text. Instead of using text based passwords, graphical passwords have been proposed to increase both memorability and security. Biederman (1972) and Biederman, Glass, & Stacy (1973) reported that the objects in a coherent image were recognized and identified more efficiently and quickly than the objects in a jumbled image in which the jumbled image was created by dividing the coherent image into sections and changing the position of the sections without rotating them. The study was designed to experimentally examine the differences in usability and security of the graphical password scheme by manipulating the coherence of the displayed image. Sixty-three volunteers participated in the main experiment. The participants were divided into groups according to the type of image they were presented in the password creation (either coherent-image or jumbled-image) task. Each participant created a graphical password and three days after the first session (i.e., second session) s/he tried to remember it in order to authenticate to the system. The results revealed that in the proposed graphical password scheme, using coherent image has more advantages over jumbled image in terms of usability and security.

Suggestions

On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach
Bıçakçı, Kemal; Baykal, Nazife; Department of Information Systems (2003)
Choosing an authentication protocol or a digital signature algorithm becomes more challenging when performance constraints are of concern. In this thesis, we discuss the possible options in a top-down approach and propose viable alternatives for the efficiency criteria. Before all the technical discussions, argue that identifying prerequisites, threats and risks on an organizational conthas utmost importance so that effective solutions can be delivered at a reasonable cost. For instance, one approach to sol...
Realizing the specifiation and execution of workflows through the event calculus
Yılmaz, Hüseyin; Çiçekli, Fehime Nihan; Department of Computer Engineering (2006)
Workflow management promises a solution to an age-old problem: controlling,monitoring, optimizing and supporting business processes. What is new about workflow management is the explicit representation of the business process logic which allows for computerized support. In the light of this support, many researchers developed different approaches to model new systems with different capabilities to solve this age-old problem. One of the approaches is using logicbased methodology for the specification and exe...
Providing scalability for an automated web service composition framework
Kaya, Ertay; Çiçekli, Fehime Nihan; Department of Computer Engineering (2010)
In this thesis, some enhancements to an existing automatic web service composition and execution system are described which provide a practical significance to the existing framework with scalability, i.e. the ability to operate on large service sets in reasonable time. In addition, the service storage mechanism utilized in the enhanced system presents an effective method to maintain large service sets. The described enhanced system provides scalability by implementing a pre-processing phase that extracts s...
A usability evaluation framework and a case study on a supplier portal system
Babayiğit, Elif Fatma; Şen, Tayyar; Department of Industrial Engineering (2003)
The goal of this thesis is to provide a usability evaluation framework in the area of e-procurement technologies and a case study on this base. A survey of the concepts of human computer interaction, usability and usability evaluation techniques is carried out. Additionally current e-procurement technologies are explored and specifically a Company̕s Supplier Portal System which was employed in year 2003, as an e-procurement technology for the procurement of direct goods, is taken into consideration. Pointin...
An interactive genetic algorithm applied to the multiobjective knapsack problem
Pamuk, S; Köksalan, Mustafa Murat (2001-01-01)
Multiobjective combinatorial problems are commonly encountered in practice and would benefit from the development of metaheuristics where the search effort is interactively guided towards the solutions favored by the decision maker. The present study introduces such an Interactive Genetic Algorithm designed for a general multiobjective combinatorial framework and discusses its behavior in simulations on the Multiobjective Knapsack Problem. The evolution strategies being employed reflect the multiobjective n...
Citation Formats
Ü. Arslan Aydın, “The Effects of coherence of the image used in the graphical password scheme in terms of usability and security,” M.S. - Master of Science, Middle East Technical University, 2012.