skip to main content
research-article

A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things

Authors Info & Claims
Published:22 October 2021Publication History
Skip Abstract Section

Abstract

Authentication receives enormous consideration from the research community and is proven to be an interesting field in today’s era. User authentication is the major concern because people have their private data on devices. To strengthen user authentication, passwords have been introduced. In the past, the text-based password was the traditional way of authentication, but this method has particular shortcomings. The graphical password has been introduced as an alternative, which uses a picture or a set of pictures to generate a password. In the future, it is a requirement of such approaches to maintain robustness and consume fewer energy resources to become suitable for the Green Internet of Things (IoT). Similarly, diverse graphical password authentication mechanisms have been used to provide users with better security and usability. In this article, we conduct an extensive survey on the existing approaches of graphical password authentication to highlight the challenges required to be addressed for Green IoT. In comparison to other existing surveys, the objective is to consolidate the graphical password technique and to identify the problem associated with it. Besides, this survey will also identify the vulnerabilities of the graphical password against several potential attacks. We have also examined the strengths and weaknesses of each technique along with the future research directions. This study also evaluates the usability of each approach by considering learnability, memorability, and so forth and also presents a comparative analysis with security.

REFERENCES

  1. [1] Agnes A. Antush. 2018. Reliable application enhanced framework (RAEF) for frenzie application upon a frenzy cloud overlay architecture for presence services using biometrics through smartphones. Journal of Excellence in Computer Science and Engineering 4, 1 (2018), 110.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Akhtar Zahid, Hadid Abdenour, Nixon Mark, Tistarelli Massimo, Dugelay Jean-Luc, and Marcel Sebastien. 2018. Biometrics: In search of identity and security (Q & A). IEEE MultiMedia 25, 3 (2018), 2235.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Akula Srinath and Devisetty Veerabhadram. 2004. Image based registration and authentication system. In Proceedings of Midwest Instruction and Computing Symposium, Vol. 4. 5.Google ScholarGoogle Scholar
  4. [4] Alam Badiul, Jin Zhe, Yap Wun-She, and Goi Bok-Min. 2018. An alignment-free cancelable fingerprint template for bio-cryptosystems. Journal of Network and Computer Applications 115 (2018), 2032.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Ali Rifaqat, Chandrakar Preeti, and Kumar Aashish. 2020. On the security weaknesses in password-based anonymous authentication scheme for e-health care. In Design Frameworks for Wireless Networks. Springer, 2340.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Ali Shaukat, Islam Naveed, Rauf Azhar, Din Ikram Ud, Guizani Mohsen, and Rodrigues Joel J. P. C.. 2018. Privacy and security issues in online social networks. Future Internet 10, 12 (2018), 114.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Ali Wajahat, Din Ikram Ud, Almogren Ahmad, Guizani Mohsen, and Zuair Mansour. 2020. ALPHA: An anonymous orthogonal code-based privacy preserving scheme for industrial cyber physical systems. IEEE Transactions on Industrial Informatics 17, 11 (2020), 77167724.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Almogren Ahmad, Mohiuddin Irfan, Din Ikram Ud, Majed Hisham Al, and Guizani Nadra. 2020. FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in internet of medical things. IEEE Internet of Things Journal 8, 6 (2020), 44854497.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Alsulaiman Fawaz A. and Saddik Abdulmotaleb El. 2006. A novel 3d graphical password schema. In Proceedings of 2006 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems. IEEE, 125128. https://doi.org/10.1109/VECIMS.2006.250805Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Alt Florian, Schneegass Stefan, Shirazi Alireza Sahami, Hassib Mariam, and Bulling Andreas. 2015. Graphical passwords in the wild: Understanding how users choose pictures and passwords in image-based authentication schemes. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. 316322. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Amin Ruhul, Islam S. K. Hafizul, Biswas G. P., Khan Muhammad Khurram, and Kumar Neeraj. 2015. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. Journal of Medical Systems 39, 11 (2015), 180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Amin Ruhul, Islam S. K. Hafizul, Kumar Neeraj, and Choo Kim-Kwang Raymond. 2018. An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of Network and Computer Applications 104 (2018), 133144.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] An Fengping and Liu Zhiwen. 2020. Facial expression recognition algorithm based on parameter adaptive initialization of CNN and LSTM. Visual Computer 36, 3 (2020), 483498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Andriotis Panagiotis, Tryfonas Theo, Oikonomou George, and Yildiz Can. 2013. A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 16. https://doi.org/10.1145/2462096.2462098 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Assal Hala, Imran Ahsan, and Chiasson Sonia. 2018. An exploration of graphical password authentication for children. International Journal of Child-Computer Interaction 18 (November 2018), 3746.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Aviv Adam J. and Fichter Dane. 2014. Understanding visual perceptions of usability and security of Android’s graphical password pattern. In Proceedings of the 30th Annual Computer Security Applications Conference. 286295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Awan Kamran Ahmad, Din Ikram Ud, Almogren Ahmad, Guizani Mohsen, Altameem Ayman, and Jadoon Sultan Ullah. 2019. Robusttrust–A pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7 (2019), 6209562106.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Awan Kamran Ahmad, Din Ikram Ud, Almogren Ahmad, Guizani Mohsen, and Khan Sonia. 2020. StabTrust—A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 8 (2020), 2115921177.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Awan Kamran Ahmad, Din Ikram Ud, Zareei Mahdi, Talha Muhammad, Guizani Mohsen, and Jadoon Sultan Ullah. 2019. Holitrust-A holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 7 (2019), 5219152201.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Awan Kamran Ahmad, Din Ikram Ud, Almogren Ahmad, and Almajed Hisham. 2020. AgriTrust—A trust management approach for smart agriculture in cloud-based internet of agriculture things. Sensors 20, 21 (2020), 6174.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Bailador Gonzalo, Ríos-Sánchez Belén, Sánchez-Reillo Raúl, Ishikawa Hiroshi, and Sánchez-Ávila Carmen. 2018. Flooding-based segmentation for contactless hand biometrics oriented to mobile devices. IET Biometrics 7, 5 (2018), 431438.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Bali Rasmeet S. and Kumar Neeraj. 2016. Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems 56 (2016), 476492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Banerjee Debdeep and Yu Kevin. 2020. 3D face authentication software test automation. IEEE Access 8 (2020), 4654646558.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Banerjee Salil P. and Woodard Damon L.. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116139.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Barpanda Soubhagya Sankar, Majhi Banshidhar, Sa Panjak Kumar, Sangaiah Arun Kumar, and Bakshi Sambit. 2019. Iris feature extraction through wavelet mel-frequency cepstrum coefficients. Optics & Laser Technology 110 (2019), 1323.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Behera Manoranjan and Rasool Akhtar. 2019. Big data security threats and prevention measures in cloud and hadoop. In Data Management, Analytics and Innovation. Springer, 143156.Google ScholarGoogle Scholar
  27. [27] Beukes Emile and Coetzer Johannes. 2020. Hand vein-based biometric authentication using two-channel similarity measure networks. In International SAUPEC/RobMech/PRASA Conference. (2020) Jan 29. IEEE, 16.Google ScholarGoogle Scholar
  28. [28] Bhawiyuga Adhitya, Data Mahendra, and Warda Andri. 2017. Architectural design of token based authentication of MQTT protocol in constrained IoT device. In 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA’17). IEEE, 14.Google ScholarGoogle Scholar
  29. [29] Bianchi Andrea, Oakley Ian, and Kim Hyoungshick. 2016. PassBYOP: Bring your own picture for securing graphical passwords. IEEE Transactions on Human-Machine Systems 46, 3 (2016), 380389. https://doi.org/10.1109/THMS.2015.2487511Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Bicakci Kemal, Atalay Nart Bedin, Yuceel Mustafa, Gurbaslar Hakan, and Erdeniz Burak. 2009. Towards usable solutions to graphical password hotspot problem. In 33rd Annual IEEE International Computer Software and Applications Conference, 2009 (COMPSAC’09), Vol. 2. IEEE, 318323. https://doi.org/10.1109/COMPSAC.2009.153 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Biddle Robert, Chiasson Sonia, and Oorschot Paul C. Van. 2012. Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR) 44, 4 (2012), 141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Blonder G. and GRAPHICAL P. W.. 1996. United States Patent 5559961. Graphical Passwords (1996). http://patents.com/us-5559961.html.Google ScholarGoogle Scholar
  33. [33] Boisrayon Michel P., Scarpitta Alain A., and Meyer Luc P.. 2002. Triboelectric device. US Patent 6,335,856.Google ScholarGoogle Scholar
  34. [34] Bojinov Hristo and Boneh Dan. 2011. Mobile token-based authentication on a budget. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications. 1419. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Borah Sagarika and Borah Bhogeswar. 2020. Three-dimensional (3d) polygon mesh authentication using sequential bit substitution strategy. In Computational Intelligence in Data Mining. Springer, 617627.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Bošnjak L. and Brumen B.. 2019. Examining security and usability aspects of knowledge-based authentication methods. In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’19). IEEE, 11811186.Google ScholarGoogle Scholar
  37. [37] Brostoff Sacha and Sasse M. Angela. 2000. Are passfaces more usable than passwords? A field trial investigation. In People and Computers XIV—Usability or Else. Springer, 405424. https://doi.org/10.1007/978-1-4471-0515-2_27Google ScholarGoogle Scholar
  38. [38] Cain Ashley A. and Still Jeremiah D.. 2018. Usability comparison of over-the-shoulder attack resistant authentication schemes. Journal of Usability Studies 13, 4 (2018), 19.Google ScholarGoogle Scholar
  39. [39] Chen Ye and Liginlal Divakaran. 2008. A maximum entropy approach to feature selection in knowledge-based authentication. Decision Support Systems 46, 1 (2008), 388398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Chiasson Sonia, Forget Alain, Biddle Robert, and Oorschot Paul C. van. 2008. Influencing users towards better passwords: Persuasive cued click-points. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1. British Computer Society, 121130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Chiasson Sonia, Stobert Elizabeth, Forget Alain, Biddle Robert, and Oorschot Paul C. Van. 2011. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Transactions on Dependable and Secure Computing 9, 2 (2011), 222235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Chiasson Sonia, Oorschot Paul C. van, and Biddle Robert. 2007. Graphical password authentication using cued click points. In ESORICS, Vol. 7. Springer, 359374. https://doi.org/10.1007/978-3-540-74835-9_24 Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Chopra Abhishek and Chaudhary Mukund. 2020. The need for information security. In Implementing an Information Security Management System. Springer, 120.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Choudhary Tejalal, Mishra Vipul, Goswami Anurag, and Sarangapani Jagannathan. 2020. A comprehensive survey on model compression and acceleration. Artificial Intelligence Review 53, 7 (2020), 51135155.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Sahare Sneha, Chouragade Prashant, Khonde Ninad, Dhopre Kapil, and Shende Sagar. 2017. Multilayer graphical password authentication. International Journal of Innovative Research in Computer and Communication Engineering 5, 2 (2017), 17751779.Google ScholarGoogle Scholar
  46. [46] Constantinides Argyris, Belk Marios, Fidas Christos, and Pitsillides Andreas. 2020. An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots. In Proceedings of the 25th International Conference on Intelligent User Interfaces. 3337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Constantinides Argyris, Belk Marios, Fidas Christos, and Samaras George. 2018. On cultural-centered graphical passwords: Leveraging on users’ cultural experiences for improving password memorability. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization. 245249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Darbanian Elham et al. 2015. A graphical password against spyware and shoulder-surfing attacks. In 2015 International Symposium on Computer Science and Software Engineering (CSSE’15). IEEE, 16. https://doi.org/10.1109/CSICSSE.2015.7369239Google ScholarGoogle Scholar
  49. [49] Das Manik Lal, Saxena Ashutosh, and Gulati Ved P.. 2004. A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 2 (2004), 629631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Datta Priyanka, Bhardwaj Shanu, Panda S. N., Tanwar Sarvesh, and Badotra Sumit. 2020. Survey of security and privacy issues on biometric system. In Handbook of Computer Networks and Cyber Security. Springer, 763776.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Davis Darren, Monrose Fabian, and Reiter Michael K.. 2004. On user choice in graphical password schemes. In USENIX Security Symposium, Vol. 13. 1111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Angeli Antonella De, Coventry Lynne, Johnson Graham, and Renaud Karen. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-computer Studies 63, 1 (2005), 128152 https://doi.org/10.1016/j.ijhcs.2005.04.020 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. [53] Devlin Matthieu, Nurse Jason R. C., Hodges Duncan, Goldsmith Michael, and Creese Sadie. 2015. Predicting graphical passwords. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 2335. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Dhamija Rachna and Perrig Adrian. 2000. Deja vu-A user study: Using images for authentication. In USENIX Security Symposium, Vol. 9. 44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Din Ikram Ud, Guizani Mohsen, Rodrigues Joel J. P. C., Hassan Suhaidi, and Korotaev Valery V.. 2019. Machine learning in the Internet of Things: Designed techniques for smart cities. Future Generation Computer Systems 100 (2019), 826843.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Dunphy Paul and Yan Jeff. 2007. Do background images improve draw a secret graphical passwords? In Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, 3647. https://doi.org/10.1145/1315245.1315252 Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Haq Muhammad Ehatisham-ul, Azam Muhammad Awais, Naeem Usman, Amin Yasar, and Loo Jonathan. 2018. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. Journal of Network and Computer Applications 109 (2018), 2435. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Eljetlawi Ali Mohamed and Ithnin Norafida. 2008. Graphical password: Prototype usability survey. In 2008 International Conference on Advanced Computer Theory and Engineering. IEEE, 351355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Éluard Marc, Maetz Yves, and Alessio Davide. 2011. Action-based graphical password: “Click-a-Secret.” In 2011 IEEE International Conference on Consumer Electronics (ICCE’11). IEEE, 265266. https://doi.org/10.1109/ICCE.2011.5722575Google ScholarGoogle Scholar
  60. [60] Esposito Christian. 2018. Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations. Journal of Network and Computer Applications 108 (2018), 124136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] Fang He, Wang Xianbin, and Hanzo Lajos. 2020. Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes. IEEE Transactions on Communications 68, 4 (2020), 2607–20.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Fantacci Romano, Maccari Leonardo, Pecorella Tommaso, and Frosali Federico. 2006. A secure and performant token-based authentication for infrastructure and mesh 802.1 X networks. In IEEE Conference on Computer Communications (INFOCOM’06).Google ScholarGoogle Scholar
  63. [63] Fatehah M. D., Jali Mohd Zalisham, Wafa M. K., and Anuar Nor Badrul. 2013. Educating users to generate secure graphical password secrets: An initial study. In 2013 IEEE 5th Conference on Engineering Education (ICEED’13). IEEE, 2631.Google ScholarGoogle Scholar
  64. [64] Fatima Ramsha, Siddiqui Nadia, Umar M. Sarosh, and Khan M. H.. 2019. A novel text-based user authentication scheme using pseudo-dynamic password. In Information and Communication Technology for Competitive Strategies. Springer, 177186.Google ScholarGoogle Scholar
  65. [65] Ferrag Mohamed Amine, Maglaras Leandros, Derhab Abdelouahid, and Janicke Helge. 2020. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Telecommunication Systems 73, 2 (2020), 317348.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Fianyi Israel and Zia Tanveer A.. 2019. Biometric technology solutions to countering today’s terrorism. In Violent Extremism: Breakthroughs in Research and Practice. IGI Global, 399412.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Fisher Lee Adam. 2006. Token-based authentication for network connection. US Patent 7,134,140.Google ScholarGoogle Scholar
  68. [68] Furnell Steven M., Dowland P. S., Illingworth H. M., and Reynolds Paul L.. 2000. Authentication and supervision: A survey of user attitudes. Computers & Security 19, 6 (2000), 529539. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Gao Haichang, Guo Xuewu, Chen Xiaoping, Wang Liming, and Liu Xiyang. 2008. YAGP: Yet another graphical password strategy. In Annual Computer Security Applications Conference, 2008 (ACSAC’08). IEEE, 121129. https://doi.org/10.1109/ACSAC.2008.19 Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Gao Hang, Hu Mengting, Gao Tiegang, and Cheng Renhong. 2019. Robust detection of median filtering based on combined features of difference image. Signal Processing: Image Communication 72 (2019), 126133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. [71] Gao Haichang, Ma Licheng, Qiu Jinhua, and Liu Xiyang. 2011. Exploration of a hand-based graphical password scheme. In Proceedings of the 4th International Conference on Security of Information and Networks. ACM, 143150. https://doi.org/10.1145/2070425.2070449 Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Gilhooly Kym. 2005. Biometrics: Getting back to business. Computerworld 9 (May 2005), 2005.Google ScholarGoogle Scholar
  73. [73] Gunturk Bahadir K., Batur Aziz Umit, Altunbasak Yucel, Hayes Monson H., and Mersereau Russell M.. 2003. Eigenface-domain super-resolution for face recognition. IEEE Transactions on Image Processing 12, 5 (2003), 597606. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Gupta Neha and Kapoor Vivek. 2020. Hybrid cryptographic technique to secure data in web application. Journal of Discrete Mathematical Sciences and Cryptography 23, 1 (2020), 125135.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Han Shui-Hua and Chu Chao-Hsien. 2010. Content-based image authentication: Current status, issues, and challenges. International Journal of Information Security 9, 1 (2010), 1932. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Hartanto Budi, Santoso Bagus, and Welly Siauw. 2006. The usage of graphical password as a replacement to the alphanumerical password. Jurnal Informatika 7, 2 (2006), 9197.Google ScholarGoogle Scholar
  77. [77] Hartmann Valentin and Schuhmacher Dominic. 2020. Semi-discrete optimal transport: A solution procedure for the unsquared Euclidean distance case. Mathematical Methods of Operations Research92 (2020), 133163.Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Hartson H. Rex, Andre Terence S., and Williges Robert C.. 2003. Criteria for evaluating usability evaluation methods. International Journal of Human-Computer Interaction 15, 1 (2003), 145181.Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] Haseeb Khalid, Din Ikram Ud, Almogren Ahmad, Islam Naveed, and Altameem Ayman. 2020. RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks. IEEE Access 8 (2020), 6837968390.Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] Haseeb Khalid, Din Ikram Ud, Almogren Ahmad, Jan Zahoor, Abbas Naveed, and Adnan Muhammad. 2020. DDR-ESC: A distributed and data reliability model for mobile edge-based sensor-cloud. IEEE Access 8 (2020), 185752185760.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] Haseeb Khalid, Islam Naveed, Almogren Ahmad, and Din Ikram Ud. 2019. Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7 (2019), 185496185505.Google ScholarGoogle ScholarCross RefCross Ref
  82. [82] Haseeb Khalid, Islam Naveed, Almogren Ahmad, Din Ikram Ud, Almajed Hisham N., and Guizani Nadra. 2019. Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7 (2019), 7998079988.Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Hayashi Eiji, Dhamija Rachna, Christin Nicolas, and Perrig Adrian. 2008. Use your illusion: Secure authentication usable anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security. ACM, 3545. https://doi.org/10.1145/1408664.1408670 Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] He Debiao, Kumar Neeraj, and Lee Jong-Hyouk. 2016. Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks 22, 2 (2016), 491502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] Hwang Inseok, Kistler Michael D., Mukundan Janani, and Taban Gelareh. 2019. Dynamic knowledge-based authentication. US Patent 10,362,016.Google ScholarGoogle Scholar
  86. [86] Iancu Ion and Constantinescu Nicolae. 2013. Intuitionistic fuzzy system for fingerprints authentication. Applied Soft Computing 13, 4 (2013), 21362142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. [87] Islam Amanul, Por Lip Yee, Othman Fazidah, and Ku Chin Soon. 2019. A review on recognition-based graphical password techniques. In Computational Science and Technology. Springer, 503512.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Islam Naveed, Faheem Yasir, Din Ikram Ud, Talha Muhammad, Guizani Mohsen, and Khalil Mudassir. 2019. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Future Generation Computer Systems 100 (2019), 569578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Jain Anil, Hong Lin, and Pankanti Sharath. 2000. Biometric identification. Communications of the ACM 43, 2 (2000), 9098. https://doi.org/10.1145/328236.328110 Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. [90] Jansen Wayne, Gavrila Serban I., Korolev Vladimir, Ayers Richard P., and Swanstrom Ryan. 2003. Picture password: A visual login technique for mobile devices. NIST Interagency/Internal Report (NISTIR)-7030 (2003).Google ScholarGoogle Scholar
  91. [91] Jarrahi Mohammad Hossein. 2018. Artificial intelligence and the future of work: Human-AI symbiosis in organizational decision making. Business Horizons 61, 4 (2018), 577586.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Jaswal Gaurav, Kaul Amit, and Nath Ravinder. 2018. Multimodal biometric authentication system using local hand features. In Advances in Machine Learning and Data Science. Springer, 325336.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Jeng Judy. 2005. Usability assessment of academic digital libraries: Effectiveness, efficiency, satisfaction, and learnability. Libri 55, 2–3 (2005), 96121.Google ScholarGoogle ScholarCross RefCross Ref
  94. [94] Joo Soohyung, Lin Suyu, and Lu Kun. 2011. A usability evaluation model for academic library websites: Efficiency, effectiveness and learnability. Journal of Library and Information Studies 9, 2 (2011), 1126.Google ScholarGoogle Scholar
  95. [95] Joshi Dhara, Patel Chintan, Doshi Nishant, Jhaveri Rutvij, and Wang Xianmin. 2018. An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment. Preprints 2018, 2018100151. DOI: 10.20944/preprints201810.0151.v1.Google ScholarGoogle Scholar
  96. [96] Kaiafas Georgios, Varisteas Georgios, Lagraa Sofiane, State Radu, Nguyen Cu D., Ries Thorsten, and Ourdane Mohamed. 2018. Detecting malicious authentication events trustfully. In 2018 IEEE/IFIP Network Operations and Management Symposium (NOMS’18). IEEE, 16.Google ScholarGoogle Scholar
  97. [97] Kalra Sakshi and Lamba Anil. 2014. A survey on multimodal biometric. International Journal of Computer Science and Information Technologies 5, 2 (2014), 21482151.Google ScholarGoogle Scholar
  98. [98] Kang Hyeok, Lee Keun-Ho, and Kim Gui-Jung. 2019. Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication. Cluster Computing 22, 1 (2019), 20172026.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. [99] Karmarkar Jayant S.. 2007. Restricted multimedia episode distribution with synthetically generated random outcomes to players with intra-episode biometric image based authentication. US Patent 7,285,048.Google ScholarGoogle Scholar
  100. [100] Kathed Aman, Azam Sami, Shanmugam Bharanidharan, Karim Asif, Yeo Kheng Cher, Boer Friso De, and Jonkman Mirjam. 2019. An enhanced 3-tier multimodal biometric authentication. In 2019 International Conference on Computer Communication and Informatics (ICCCI’19). IEEE, 16.Google ScholarGoogle Scholar
  101. [101] Kaur Harkeerat and Khanna Pritee. 2020. Remote multimodal biometric authentication using visual cryptography. In Proceedings of 3rd International Conference on Computer Vision and Image Processing. Springer, 1325.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Khan Mudassar Ali, Din Ikram Ud, Jadoon Sultan Ullah, Khan Muhammad Khurram, Guizani Mohsen, and Awan Kamran Ahmad. 2019. g-RAT| A novel graphical randomized authentication technique for consumer smart devices. IEEE Transactions on Consumer Electronics 65, 2 (2019), 215223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. [103] Khan Mudassar Ali, Israr Sabahat, Almogren Abeer S., Din Ikram Ud, Almogren Ahmad, and Rodrigues Joel J. P. C.. 2020. Using augmented reality and deep learning to enhance Taxila museum experience. Journal of Real-Time Image Processing 18, 2 (2020), 321322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Khattak Hasan Ali, Tehreem Komal, Almogren Ahmad, Ameer Zoobia, Din Ikram Ud, and Adnan Muhammad. 2020. Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities. Journal of Information Security and Applications 55 (2020), 102615.Google ScholarGoogle ScholarCross RefCross Ref
  105. [105] Khattri Vipin, Nayak Sandeep Kumar, and Singh Deepak Kumar. 2020. Development of integrated distance authentication and fingerprint authorization mechanism to reduce fraudulent online transaction. In Intelligent Communication, Control and Devices. Springer, 7383.Google ScholarGoogle Scholar
  106. [106] Khodadadi Touraj, Islam A. K. M. Muzahidul, Baharun Sabariah, and Komaki Shozo. 2016. Evaluation of recognition-based graphical password schemes in terms of usability and security attributes. International Journal of Electrical and Computer Engineering 6, 6 (2016), 2939.Google ScholarGoogle Scholar
  107. [107] Khokhlov Igor and Reznik Leon. 2018. Android system security evaluation. In 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC’18). IEEE, 12.Google ScholarGoogle Scholar
  108. [108] Kim Junhong, Kim Haedong, and Kang Pilsung. 2018. Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Applied Soft Computing 62 (2018), 10771087.Google ScholarGoogle ScholarCross RefCross Ref
  109. [109] Kjeldskov Jesper and Stage Jan. 2004. New techniques for usability evaluation of mobile systems. International Journal of Human-Computer Studies 60, 5–6 (2004), 599620.Google ScholarGoogle ScholarCross RefCross Ref
  110. [110] Kosmidis Ioannis, Pagui Euloge Clovis Kenne, and Sartori Nicola. 2020. Mean and median bias reduction in generalized linear models. Statistics and Computing 30, 1 (2020), 4359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. [111] Kulkarni Sushama and Fadewar Hanmant. 2020. Accuracy comparison of classification techniques for mouse dynamics-based biometric CaRP. In Proceedings of the 3rd International Conference on Computational Intelligence and Informatics. Springer, 701711.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Kumar Vinod, Ahmad Musheer, and Kumar Pankaj. 2019. An identity-based authentication framework for big data security. In Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer, 6371.Google ScholarGoogle ScholarCross RefCross Ref
  113. [113] Land Walker H. and Schaffer J. David. 2020. The support vector machine. In The Art and Science of Machine Intelligence. Springer, 4576.Google ScholarGoogle ScholarCross RefCross Ref
  114. [114] Lashkari Arash Habibi and Farmand Samaneh. 2009. A survey on usability and security features in graphical user authentication algorithms. IJCSNS International Journal of Computer Science and Network Security 9, 9 (2009), 195204.Google ScholarGoogle Scholar
  115. [115] Lashkari Arash Habibi, Gani Abdullah, Sabet Leila Ghasemi, and Farmand Samaneh. 2010. A new algorithm on graphical user authentication (GUA) based on multi-line grids. Scientific Research and Essays 5, 24 (2010), 38653875.Google ScholarGoogle Scholar
  116. [116] Lewis James R. and Sauro Jeff. 2009. The factor structure of the system usability scale. In International Conference on Human Centered Design. Springer, 94103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. [117] Li Shan and Deng Weihong. 2020. Deep facial expression recognition: A survey. IEEE Transactions on Affective Computing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  118. [118] Lin Di, Dunphy Paul, Olivier Patrick, and Yan Jeff. 2007. Graphical passwords & qualitative spatial relations. In Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, 161162. https://doi.org/10.1145/1280680.1280708Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. [119] Liu Ximing, Li Yingjiu, Deng Robert H., Chang Bing, and Li Shujun. 2019. When human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers & Security 80 (2019), 90107.Google ScholarGoogle ScholarCross RefCross Ref
  120. [120] Lu Chun-Shien and Liao H.-Y. M.. 2001. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10, 10 (2001), 15791592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. [121] Lu Li, Han Jinsong, Hu Lei, Huai Jinpeng, Liu Yunhao, and Ni Lionel M.. 2007. Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In 2007 IEEE International Parallel and Distributed Processing Symposium. IEEE, 110.Google ScholarGoogle Scholar
  122. [122] Lu Wei, Hancock John, Osowiecki Benjamin, Taft Aram, and Li Wei. 2019. Leveraging cloud-based resources for automated biometric identification. In Biometric-Based Physical and Cybersecurity Systems. Springer, 437454.Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] Maggi Federico, Volpatto Alberto, Gasparini Simone, Boracchi Giacomo, and Zanero Stefano. 2011. A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS’11). IEEE, 320325.Google ScholarGoogle Scholar
  124. [124] Mahey Rajat, Singh Nimish, Kumar Chandan, Bhagwat Nitin, and Verma Poonam. 2018. Graphical password using an intuitive approach. In International Conference on Intelligent Computing and Applications. Springer, 153161. https://doi.org/10.1007/978-981-10-5520-1_15Google ScholarGoogle Scholar
  125. [125] Manaa Mehdi Ebady and Al-Rikaby Marwa K.. 2017. Robust authentication approach based on keyboard graphical password. Journal of Engineering and Applied Sciences 12, 7 (2017), 17381745.Google ScholarGoogle Scholar
  126. [126] Manzoor Awais, Shah Munam Ali, Khattak Hasan Ali, Din Ikram Ud, and Khan Muhammad Khurram. 2019. Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. International Journal of Communication Systems (2019), e4033.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Marsman Maarten, Waldorp Lourens, Dablander Fabian, and Wagenmakers Eric-Jan. 2019. Bayesian estimation of explained variance in ANOVA designs. Statistica Neerlandica 73, 3 (2019), 351372.Google ScholarGoogle ScholarCross RefCross Ref
  128. [128] Masood Faiza, Almogren Ahmad, Abbas Assad, Khattak Hasan Ali, Din Ikram Ud, Guizani Mohsen, and Zuair Mansour. 2019. Spammer detection and fake user identification on social networks. IEEE Access 7 (2019), 6814068152.Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Mathur Priyanka and Chande Swati V.. 2020. Empirical investigation of usability evaluation methods for mobile applications using evidence-based approach. In Microservices in Big Data Analytics. Springer, 95110.Google ScholarGoogle ScholarCross RefCross Ref
  130. [130] Meng Weizhi, Wang Yu, Wong Duncan S., Wen Sheng, and Xiang Yang. 2018. TouchWB: Touch behavioral user authentication based on web browsing on smartphones. Journal of Network and Computer Applications 117 (2018), 19.Google ScholarGoogle ScholarCross RefCross Ref
  131. [131] Mohamad Zarina, Thong Lim Yan, Zakaria Aznida Hayati, and Awang Wan Suryani Wan. 2018. Image based authentication using zero-knowledge protocol. In 2018 4th International Conference on Computer and Technology Applications (ICCTA’18). IEEE, 202210.Google ScholarGoogle Scholar
  132. [132] Mohammed Afreen Fatima and Qyser Ahmed Abdul Moiz. 2019. A hybrid approach for secure iris-based authentication in IoT. In International Conference on Intelligent Computing and Communication Technologies. Springer, 159167.Google ScholarGoogle Scholar
  133. [133] Mutagi Rohan, Gohil Chintan, Kopuri Sai Sailesh, Lee Philip Alexander, Wu Felix, and Liang Nancy Yi. 2018. Dynamic user authentication. US Patent App. 10/027,662.Google ScholarGoogle Scholar
  134. [134] Nadler Asaf, Aminov Avi, and Shabtai Asaf. 2019. Detection of malicious and low throughput data exfiltration over the DNS protocol. Computers & Security 80 (2019), 3653.Google ScholarGoogle ScholarCross RefCross Ref
  135. [135] Nicolis Davide. 2020. A general framework for shared control in robot teleoperation with force and visual feedback. In Special Topics in Information Technology. Springer, 119131.Google ScholarGoogle ScholarCross RefCross Ref
  136. [136] Nizamani Shah Zaman, Hassan Syed Raheel, Shaikh Riaz Ahmed, and Bakhsh Sheikh Tahir. 2019. An evaluation model for recognition-based graphical password schemes. Journal of Information Assurance & Security 14, 3 (2019), 067077.Google ScholarGoogle Scholar
  137. [137] Novel Coronavirus Pneumonia Emergency Response Epidemiology et al. 2020. The epidemiological characteristics of an outbreak of 2019 novel coronavirus diseases (COVID-19) in China. Zhonghua Liu Xing Bing Xue Za Zhi= Zhonghua Liuxingbingxue Zazhi 41, 2 (2020), 145.Google ScholarGoogle Scholar
  138. [138] Peng Chunlei, Gao Xinbo, Wang Nannan, and Li Jie. 2019. Sparse graphical representation based discriminant analysis for heterogeneous face recognition. Signal Processing 156 (2019), 4661.Google ScholarGoogle ScholarCross RefCross Ref
  139. [139] Pering Trevor, Sundar Murali, Light John, and Want Roy. 2003. Photographic authentication through untrusted terminals. IEEE Pervasive Computing 2, 1 (2003), 3036. https://doi.org/10.1109/MPRV.2003.1186723 Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. [140] Pham Trinh Thi Doan, Kim Sesong, Lu Yucheng, Jung Seung-Won, and Won Chee-Sun. 2019. Facial action units-based image retrieval for facial expression recognition. IEEE Access 7 (2019), 52005207.Google ScholarGoogle ScholarCross RefCross Ref
  141. [141] Phillips Tyler, Zou Xukai, Li Feng, and Li Ninghui. 2019. Enhancing biometric-capsule-based authentication and facial recognition via deep learning. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. 141146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. [142] Popp Nicolas, Bajaj Siddharth, and Hallam-Baker Phillip Martin. 2016. Hybrid authentication. US Patent 9,240,891.Google ScholarGoogle Scholar
  143. [143] Por Lip Yee, Ku Chin Soon, Islam Amanul, and Ang Tan Fong. 2017. Graphical password: Prevent shoulder-surfing attack using digraph substitution rules. Frontiers of Computer Science 11, 6 (2017), 10981108. https://doi.org/10.1007/s11704-016-5472-z Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. [144] Chiasson S., Stobert E., Forget A., Biddle R., and Oorschot P. C. Van. 2011. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Transactions on Dependable and Secure Computing 9, 2 (2011), 222235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. [145] Rajarajan S., Prabhu M., Palanivel S., and Karthikeyan M. P.. 2014. GRAMAP: Three stage graphical password authentication scheme. Journal of Theoretical & Applied Information Technology 61, 2 (2014), 262269.Google ScholarGoogle Scholar
  146. [146] Ríos Eva María Artime, Crespo María del Mar Seguí, Sánchez Ana Suarez, Gómez Sergio Luis Suárez, and Lasheras Fernando Sánchez. 2017. Genetic algorithm based on support vector machines for computer vision syndrome classification. In Proceedings of the International Joint Conference SOCO’17-CISIS’17-ICEUTE’17. Springer, 381390.Google ScholarGoogle Scholar
  147. [147] Rioux Gabriel, Scarvelis Christopher, Choksi Rustum, Hoheisel Tim, and Marechal Pierre. 2019. Blind deblurring of barcodes via Kullback-Leibler divergence. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 1 (2019), 7788.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. [148] Roy Soumen, Roy Utpal, and Sinha D. D.. 2019. Analysis of typing pattern in identifying soft biometric information and its impact in user recognition. In Information Technology and Applied Mathematics. Springer, 6983.Google ScholarGoogle ScholarCross RefCross Ref
  149. [149] Saevanee Hataichanok, Clarke Nathan, Furnell Steven, and Biscione Valerio. 2014. Text-based active authentication for mobile devices. In IFIP International Information Security Conference. Springer, 99112.Google ScholarGoogle Scholar
  150. [150] Saha Manas, Naskar Mrinal Kanti, and Chatterji B. N.. 2020. Advanced wavelet transform for image processing—A survey. In Information, Photonics and Communication. Springer, 185194.Google ScholarGoogle Scholar
  151. [151] Sahu Saraswati B. and Singh Angad. 2014. Survey on various techniques of user authentication and graphical password. International Journal of Computer Trends and Technology (IJCTT) 16, 3 (2014), 98102.Google ScholarGoogle ScholarCross RefCross Ref
  152. [152] Saleema A. and Thampi Sabu M.. 2018. Voice biometrics: The promising future of authentication in the internet of things. In Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science. IGI Global, 360389.Google ScholarGoogle ScholarCross RefCross Ref
  153. [153] Salian Nisha, Godbole Sayali, and Wagh Shalaka. 2015. Advanced authentication using 3d passwords in virtual world. International Journal of Engineering and Technical Research 3, 2 (2015), 120125.Google ScholarGoogle Scholar
  154. [154] Sarohi Harsh Kumar and Khan Farhat Ullah. 2013. Graphical password authentication schemes: Current status and key issues. International Journal of Computer Science Issues (IJCSI) 10, 2 Part 1 (2013), 437.Google ScholarGoogle Scholar
  155. [155] Schneider Jonathan. 2004. Graphical event-based password system. US Patent App. 10/418,266.Google ScholarGoogle Scholar
  156. [156] Şengel Öznur, Aydin Muhammed Ali, and Sertbaş Ahmet. 2019. A survey on white box cryptography model for mobile payment systems. In International Telecommunications Conference. Springer, 215225.Google ScholarGoogle ScholarCross RefCross Ref
  157. [157] Shen Jian, Gui Ziyuan, Ji Sai, Shen Jun, Tan Haowen, and Tang Yi. 2018. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications 106 (2018), 117123.Google ScholarGoogle ScholarCross RefCross Ref
  158. [158] Shenoy K. Manjula and Supriya A.. 2019. Authentication using alignment of the graphical password. In 3rd International Conference on Advanced Informatics for Computing Research (ICAICR’19). Association for Computing Machinery (ACM), a21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. [159] Shepard Roger N.. 1967. Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior 6, 1 (1967), 156163. https://doi.org/10.1016/S0022-5371(67)80067-7Google ScholarGoogle ScholarCross RefCross Ref
  160. [160] Shyu Chi-Ren, Hongfei C. A. O., Klaric Matthew, and Uhlmann Jeffrey. 2019. Visual storytelling authentication. US Patent 10,467,400.Google ScholarGoogle Scholar
  161. [161] Siegal Jon, Rowell Simon, and Hintz Thomas. 2018. Method and system for providing online authentication utilizing biometric data. US Patent 9,911,146.Google ScholarGoogle Scholar
  162. [162] Sohrabi Catrin, Alsafi Zaid, O’Neill Niamh, Khan Mehdi, Kerwan Ahmed, Al-Jabir Ahmed, Iosifidis Christos, and Agha Riaz. 2020. World Health Organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19). International Journal of Surgery76 (2020), 7176.Google ScholarGoogle ScholarCross RefCross Ref
  163. [163] Srinivas J., Das Ashok Kumar, Kumar Neeraj, and Rodrigues Joel. 2018. Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing 17, 5 (2018), 942–56.Google ScholarGoogle ScholarCross RefCross Ref
  164. [164] Stubblefield Adam and Simon Dan. 2004. Inkblot authentication. Microsoft Research.Google ScholarGoogle Scholar
  165. [165] Sun Hung-Min, Chen Shiuan-Tung, Yeh Jyh-Haw, and Cheng Chia-Yun. 2018. A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing 15, 2 (2018), 180193.Google ScholarGoogle ScholarCross RefCross Ref
  166. [166] Sun Hung-Min, Chen Shiuan-Tung, Yeh Jyh-Haw, and Cheng Chia-Yun. 2018. A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing 15, 2 (2018), 180193.Google ScholarGoogle ScholarCross RefCross Ref
  167. [167] Suo Xiaoyuan, Zhu Ying, and Owen G. Scott. 2005. Graphical passwords: A survey. In 21st Annual Computer Security Applications Conference. IEEE, 10–pp. https://doi.org/10.1109/CSAC.2005.27 Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. [168] Suresh Sumi and Narayanan Athi. 2019. Improving classification accuracy using combined filter + wrapper feature selection technique. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’19). IEEE, 16.Google ScholarGoogle Scholar
  169. [169] Syukri Agus Fanar, Okamoto Eiji, and Mambo Masahiro. 1998. A user identification system using signature written with mouse. In Australasian Conference on Information Security and Privacy. Springer, 403414. https://doi.org/10.1007/BFb0053751 Google ScholarGoogle ScholarDigital LibraryDigital Library
  170. [170] Tabrez Shums and Sai D. Jagadeesh. 2017. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS’17). IEEE, 776781. https://doi.org/10.1109/ICCONS.2017.8250568Google ScholarGoogle Scholar
  171. [171] Takada Tetsuji and Koike Hideki. 2003. Awase-E: Image-based authentication for mobile phones using user’s favorite images. In International Conference on Mobile Human-Computer Interaction. Springer, 347351.Google ScholarGoogle Scholar
  172. [172] Tan Yu-an, Xue Yuan, Liang Chen, Zheng Jun, Zhang Quanxin, Zheng Jiamin, and Li Yuanzhang. 2018. A root privilege management scheme with revocable authorization for Android devices. Journal of Network and Computer Applications 107 (2018), 6982.Google ScholarGoogle ScholarCross RefCross Ref
  173. [173] Tanvi Parekh, Sonal Gawshinde, and Kumar Sharma Mayank. 2011. Token based authentication using mobile phone. In 2011 International Conference on Communication Systems and Network Technologies. IEEE, 8588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. [174] Tao Hai and Adams Carlisle. 2008. Pass-go: A proposal to improve the usability of graphical passwords. IJ Network Security 7, 2 (2008), 273292.Google ScholarGoogle Scholar
  175. [175] Tian Jing, Qu Chengzhang, Xu Wenyuan, and Wang Song. 2013. KinWrite: Handwriting-based authentication using kinect. In NDSS, Vol. 93. 94.Google ScholarGoogle Scholar
  176. [176] Towhidi Farnaz and Masrom Maslin. 2009. A survey on recognition based graphical user authentication algorithms. arXiv preprint arXiv:0912.0942 (2009).Google ScholarGoogle Scholar
  177. [177] Tsutsumi Masafumi. 2020. Password authentication device. US Patent App. 16/534,409.Google ScholarGoogle Scholar
  178. [178] Verbraeken Joost, Wolting Matthijs, Katzy Jonathan, Kloppenburg Jeroen, Verbelen Tim, and Rellermeyer Jan S.. 2020. A survey on distributed machine learning. ACM Computing Surveys (CSUR) 53, 2 (2020), 133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. [179] Vidyashree L., Alworafi Mokhtar A., El-Booz Sheren A., et al. 2019. Survey of security mechanisms in internet of things. In Recent Findings in Intelligent Computing Techniques. Springer, 353361.Google ScholarGoogle Scholar
  180. [180] Wang Lei, Niu Jianwei, Song Houbing, and Atiquzzaman Mohammed. 2018. SentiRelated: A cross-domain sentiment classification algorithm for short texts through sentiment related index. Journal of Network and Computer Applications 101 (2018), 111119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. [181] Waykar Shritika, Barhate Tejaswini, and Iche Nidhi. 2018. A survey of various password authentication schemes. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET) 4, 1 (2018), 1822.Google ScholarGoogle Scholar
  182. [182] Wazir Waqas, Khattak Hasan Ali, Almogren Ahmad, Khan Mudassar Ali, and Din Ikram Ud. 2020. Doodle-based authentication technique using augmented reality. IEEE Access 8 (2020), 40224034.Google ScholarGoogle ScholarCross RefCross Ref
  183. [183] Weinshall Daphna. 2006. Cognitive authentication schemes safe against spyware. In 2006 IEEE Symposium on Security and Privacy. IEEE, 6–pp. https://doi.org/10.1109/SP.2006.10 Google ScholarGoogle ScholarDigital LibraryDigital Library
  184. [184] Wiedenbeck Susan, Waters Jim, Birget Jean-Camille, Brodskiy Alex, and Memon Nasir. 2005. Authentication using graphical passwords: Effects of tolerance and image choice. In Proceedings of the 2005 Symposium on Usable Privacy and Security. 112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. [185] Wiedenbeck Susan, Waters Jim, Birget Jean-Camille, Brodskiy Alex, and Memon Nasir. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1 (2005), 102127. https://doi.org/10.1016/j.ijhcs.2005.04.010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  186. [186] Wiedenbeck Susan, Waters Jim, Sobrado Leonardo, and Birget Jean-Camille. 2006. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, 177184. https://doi.org/10.1145/1133265.1133303 Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. [187] Woods Naomi and Siponen Mikko. 2019. Improving password memorability, while not inconveniencing the user. International Journal of Human-Computer Studies 128 (2019), 6171.Google ScholarGoogle ScholarDigital LibraryDigital Library
  188. [188] Wu Changsheng, Ding Wenbo, Liu Ruiyuan, Wang Jiyu, Wang Aurelia C., Wang Jie, Li Shengming, Zi Yunlong, and Wang Zhong Lin. 2018. Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array. Materials Today 21, 3 (2018), 216222.Google ScholarGoogle ScholarCross RefCross Ref
  189. [189] Yamamoto Takumi, Harada Atsushi, Isarida Takeo, and Nishigaki Masakatsu. 2008. Improvement of user authentication using schema of visual memory: Exploitation of “Schema of Story.” In 22nd International Conference on Advanced Information Networking and Applications (AINA’08). IEEE, 4047. Google ScholarGoogle ScholarDigital LibraryDigital Library
  190. [190] Yan Junjie, Huang Kevin, Bonaci Tamara, and Chizeck Howard J.. 2015. Haptic passwords. In 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’15). IEEE, 11941199. https://doi.org/10.1109/IROS.2015.7353521Google ScholarGoogle Scholar
  191. [191] Ye Guixin, Tang Zhanyong, Fang Dingyi, Chen Xiaojiang, Kim Kwang In, Taylor Ben, and Wang Zheng. 2017. Cracking android pattern lock in five attempts. In The Network and Distributed System Security Symposium. https://doi.org/10.14722/ndss.2017.23130Google ScholarGoogle Scholar
  192. [192] Ye Guixin, Tang Zhanyong, Fang Dingyi, Chen Xiaojiang, Wolff Willy, Aviv Adam J., and Wang Zheng. 2018. A video-based attack for android pattern lock. ACM Transactions on Privacy and Security (TOPS) 21, 4 (2018), 131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. [193] Yu Xingjie, Wang Zhan, Li Yingjiu, Li Liang, Zhu Wen Tao, and Song Li. 2017. EvoPass: Evolvable graphical password against shoulder-surfing attacks. Computers & Security 70 (2017), 179198. https://doi.org/10.1016/j.cose.2017.05.006Google ScholarGoogle ScholarCross RefCross Ref
  194. [194] Zaheer Zainab, Khan Aysha, Umar M. Sarosh, and Khan Muneeb Hasan. 2019. One-tip secure: Next-gen of text-based password. In Information and Communication Technology for Competitive Strategies. Springer, 235243.Google ScholarGoogle Scholar
  195. [195] Zhan Shu and Ando Shigeru. 2006. Facial authentication system based on real-time 3D facial imaging by using correlation image sensor. In 6th International Conference on Intelligent Systems Design and Applications, Vol. 2. IEEE, 396400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  196. [196] Zhang Yin, Gravina Raffaele, Lu Huimin, Villari Massimo, and Fortino Giancarlo. 2018. PEA: Parallel electrocardiogram-based authentication for smart healthcare systems. Journal of Network and Computer Applications 117 (2018), 1016.Google ScholarGoogle ScholarCross RefCross Ref
  197. [197] Zhou Lina, Kang Yin, Zhang Dongsong, and Lai Jianwei. 2016. Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones. Decision Support Systems 92 (2016), 1424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. [198] Zhou Man, Wang Qian, Yang Jingxiao, Li Qi, Xiao Feng, Wang Zhibo, and Chen Xiaofeng. 2018. Patternlistener: Cracking android pattern lock using acoustic signals. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 17751787.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 2
      May 2022
      582 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3490674
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 October 2021
      • Accepted: 1 November 2020
      • Revised: 1 October 2020
      • Received: 1 June 2020
      Published in toit Volume 22, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!