skip to main content
10.1145/2335356.2335367acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Do you see your password?: applying recognition to textual passwords

Published:11 July 2012Publication History

ABSTRACT

Text-based password systems are the authentication mechanism most commonly used on computer systems. Graphical passwords have recently been proposed because the pictorial-superiority effect suggests that people have better memory for images. The most widely advocated graphical password systems are based on recognition rather than recall. This approach is favored because recognition is a more effective manner of retrieval than recall, exhibiting greater accuracy and longevity of material. However, schemes such as these combine both the use of graphical images and the use of recognition as a retrieval mechanism. This paper reports on a study that sought to address this confound by exploring the recognition of text as a novel means of authentication. We hypothesized that there would be significant differences between text recognition and text recall conditions. Our study, however, showed that the conditions were comparable; we found no significant difference in memorability. Furthermore, text recognition required more time to authenticate successfully.

References

  1. Bauer, J. L. 2008. Ogden's Basic English. Retrieved November, 2010, from http://ogden.basic-english.org/Google ScholarGoogle Scholar
  2. Biddle, R., Chiasson, S., & van Oorschot, P. C. in press. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Brostoff, S. & Sasse, M. A. 2000. Are PassFaces More Usable Than Passwords? A Field Trial Investigation. British Human-Computer Interaction Conference (HCI), September 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. Burr, W. E., Dodson, D. F., Polk, W. T., Evans, D. L. 2004. Electronic Authentication Guideline, in NIST Special Publication 800-63.Google ScholarGoogle Scholar
  5. Chiasson, S., Biddle, R. & van Oorschot, P. C. 2007. A Second Look at the Usability of Click-Based Graphical Passwords. Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, U. S. A. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chiasson, S., Forget, A., Biddle, R., & Van Oorschot, P. C. 2008. Influencing users toward better passwords: Persuasive Cued Click-Points. Human Computer Interaction (HCI), the British Computer Society, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chiasson, S., Forget, A., Stobert, E., Biddle, R., & Van Oorschot, P. C. 2009. Multiple password interference in text and click-based graphical passwords. ACM Computer and Communications Security (CCS), Chicago, USA, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chiasson, S., Deschamps, C., Stobert, E., Hlywa, M., Freitas Machado, B., Forget, A., Wright, N., Chan, G., & Biddle, R. 2012 The MVP Web-based Authentication Framework, Financial Cryptography and Data Security, Springer.Google ScholarGoogle Scholar
  9. Craik, F. I. M. & Lockhart, R. S. 1972. Levels of processing. A framework for memory research. Journal of Verbal Learning and Verbal Behaviour (11), 671--684.Google ScholarGoogle ScholarCross RefCross Ref
  10. Crowder, R. G. 1976. Principles of Learning and Memory. New Jersey: Lawrence Erlbaum Associates.Google ScholarGoogle Scholar
  11. Davis, D., Monrose, F., & Reiter, M. K. 2004. On User Choice in Graphical Password Schemes. Proceedings of the 13th USENIX Security Symposium, 151--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. De Angeli, A., Coventry, L., Johnson, G. & Renaud, K. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies (63), 128--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deese, J. 1959. Influence of inter-item associative strength upon immediate free recall. Psychological Reports (5), 305--312.Google ScholarGoogle Scholar
  14. Dhamija, R., & Perrig, A. 2000. Dééjà vu: A user study using Images for Authentication. Proceedings of the 9th Conference on USENIX Security Symposium, 9, 4-4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dunphy, P. & Yan, J. 2007. Do Background Images improve "Draw a Secret" Graphical Passwords? Proceedings of the ACM conference on computer and communications security. pp. 36--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Federal Information Processing Standards Publication (FIPS) 1985. FIPS 112: Password Usage, National Institute of Standards and Technology, http://www.itl.nist.gov/fipspubs/fip112.htm. Accessed Jan, 2011.Google ScholarGoogle Scholar
  17. Florencio, D. & Herley, C. 2007. A Large-Scale Study of Web Password Habits. WWW: Banff, AB. Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Florencio, D. & Herley, C. 2010. Where do security policies come from? Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM: Washington. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gardiner, J. M. 1988. Functional aspects of recollective experience. Memory and Cognition. 16(4), 309--313.Google ScholarGoogle ScholarCross RefCross Ref
  20. Hintzman, D. L. 1990 Human learning and memory: Connections and Dissociations. Annual Review of Psychology. 41, 109--139.Google ScholarGoogle ScholarCross RefCross Ref
  21. Hirshman, E., & Jackson, E. 1997. Distinctive perceptual processing and memory. Journal of Memory and Language, 36(1), 2--12.Google ScholarGoogle ScholarCross RefCross Ref
  22. Hunt, R. R, & Elliot, J. M. 1980. The role of nonsemantic information in memory: Orthographic distinctiveness effects on retention. Journal of Experimental Psychology: General, 109(1), 49--74.Google ScholarGoogle ScholarCross RefCross Ref
  23. Hlywa, M. A. X., Patrick, A. S, Biddle, R. 2011. Do houses have faces? The effect of image type in recognition-based graphical passwords. Annual Computer Security Applications Conference (ACSAC 2012).Google ScholarGoogle ScholarCross RefCross Ref
  24. Jacoby, L. L. 1983. Perceptual enhancement: Persistent effects of an experience. Journal of Experimental Psychology: Learning, Memory, and Cognition, 9, 21-3.Google ScholarGoogle ScholarCross RefCross Ref
  25. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D. 1999. The design and analysis of graphical passwords. Proceedings of the 8th conference on USENIX Security Symposium, p.1-1, Washington, D. C. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Johnston, W. A., Dark, V. J., & Jacoby, L. L. 1985. Perceptual fluency and recognition judgments. Journal of Experimental Psychology: Learning, Memory and Cognition. 11(1), 3--11.Google ScholarGoogle ScholarCross RefCross Ref
  27. Jung, J. 1968. Verbal Learning. New York: Holt, Rinehart & Winston.Google ScholarGoogle Scholar
  28. Just, M. & Aspinall, D. 2009 Personal Choice and Challenge Questions: A Security and Usability Assessment, in Proceedings of the 5th ACM Symposium on Usable Privacy and Security (SOUPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kausler, D. H. 1974. Psychology of Verbal Learning and Memory. New York: Academic Press.Google ScholarGoogle Scholar
  30. Miller, G. A. 1956, The Magical Number Seven, Plus or Minus Two: Some Limits on our Capacity for Processing Information. Psychological Review, 63, 81--97.Google ScholarGoogle ScholarCross RefCross Ref
  31. Moncur, W. & LePlââtre, G. 2007. Pictures at the ATM: Exploring the usability of multiple graphical passwords. Human Factors in Computing Systems (CHI). San Jose, California, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Passfaces Corporation, "The science behind PassFaces," http://www.passfaces.com/enterprise/resources/white_papers.htm, accessed December 2010.Google ScholarGoogle Scholar
  33. Renaud, K. 2009. Guidelines for Designing Graphical Authentication Interfaces. International Journal of Computer Security (IJICS). 3(1), 60--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Renaud, K. & De Angeli, A. 2009. Visual Passwords: Cure all or snake oil? Communications of the ACM. 52(12), 135--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Richardson-Klavehn, A., & Bjork, R. A. 1988 Measures of memory. Annual Review of Psychology. 39, 475--543.Google ScholarGoogle ScholarCross RefCross Ref
  36. Sasse, M. A., Brostoff, S. & Weirich, D. 2001. Transforming the 'Weakest Link' -- A Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Schacter, D. L. 1987. Implicit memory: History and current status. Journal of Experimental Psychology: Learning. Memory, and Cognition.13. 501--518.Google ScholarGoogle ScholarCross RefCross Ref
  38. Suo, X. & Zhu, Y. 2005. Graphical Passwords: a survey. Proceedings of the 21st Annual Computer Security Applications Conference. pp. 463--472. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Thorpe, J., & Van Oorschot, P. C. 2007. Human seeded attacks and exploiting hot-spots in graphical passwords, in 16th USENIX Security Symposium, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Tulving, E., & Pearlstone, Z. 1966. Availability vs. accessibility of information in memory for words. Journal of Verbal Learning and Verbal Behavior. 5, 381--391.Google ScholarGoogle ScholarCross RefCross Ref
  41. Tulving, E., & Schacter, D. L. 1990. Priming and human memory systems. Science, 247, 301--396.Google ScholarGoogle ScholarCross RefCross Ref
  42. Watkins, M. & Gardiner, J. M. 1979. An appreciation of the generate-recognize theory of recall. Journal of Verbal Learning and Verbal Behavior, 18, 687--704.Google ScholarGoogle ScholarCross RefCross Ref
  43. Wiedenbeck S., Waters, J., Birget, JC., Brodskiy, A., & Memon, N. 2005 PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies. 63(1-2), 102--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Yan, J., Blackwell, A., Anderson, R., Grant, A. 2005. The Memorability and Security of Passwords. In L. F. Cranor & S. Garfinkel (Eds.), Security and Usability: designing secure systems that people can use (pp. 129--142). Sebastopol, CA: O'Reillly.Google ScholarGoogle Scholar

Index Terms

  1. Do you see your password?: applying recognition to textual passwords

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
      July 2012
      216 pages
      ISBN:9781450315326
      DOI:10.1145/2335356

      Copyright © 2012 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 July 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader