8,440 research outputs found

    Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems

    Get PDF
    Recognition-based graphical authentication systems rely on the recognition of authenticator images by legitimate users for authentication. This paper presents the results of a study that compared doodle images and Mikon images as authenticators in recognition based graphical authentication systems taking various usability dimensions into account. The results of the usability evaluation, with 20 participants, demonstrated that users preferred Mikon to doodle images as authenticators in recognition based graphical authentication mechanisms. Furthermore, participants found it difficult to recognize doodle images during authentication as well as associate them with something meaningful. Our findings also show the need to consider the security offered by the images, especially their predictability

    An algorithm for automatically choosing distractors for recognition based authentication using minimal image types

    Get PDF
    <p>When a user logs on to a recognition based authentication system, he or she is presented with a number of images, one of which is their pass image and the others are distractors. The user must recognise and select their own image to enter the system. If any of the distractors is too similar to the target, the user is likely to become confused and may well choose a distractor by mistake.</p> <p>It is simple for humans to rule on image similarity but such a labour intensive approach hinders the wider uptake of these mechanisms. Automating image similarity detection is a challenging problem but somewhat easier when the images being used are minimal image types such as hand drawn doodles and Mikons constructed using a computer tool.</p> <p>We have developed an algorithm, which has been reported earlier, to automatically detect if two doodle images are similar. This paper reports a new experiment to discover the amount of similarity in collections of doodles and Mikons, from a human perspective. This information is used to improve the algorithm and confirm that it also works well with Mikons.</p&gt

    Gathering realistic authentication performance data through field trials

    Get PDF
    Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient time between enrolment and testing, the number of authentications is low, and authentication is presented as a primary task, rather then the secondary task as it is “in the wild”. User generated reports of performance on the other hand provide subjective data, so reports on frequency of use, time intervals, and success or failure of authentication are subject to the vagaries of users ’ memories. Studies on authentication that provide objective performance data under real-world conditions are rare. In this paper, we present our experiences with a study method that tries to control frequency and timing of authentication, and collects reliable performance data, while maintaining ecological validity of the authentication context at the same time. We describe the development of an authentication server called APET, which allows us to prompt users enrolled in trial cohorts to authenticate at controlled intervals, and report our initial experiences with trials. We conclude by discussing remaining challenges in obtaining reliable performance data through a field trial method such as this one

    Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11

    Get PDF
    Global e-learning market is projected to reach $107.3 billion by 2015 according to a new report by The Global Industry Analyst (Analyst 2010). The popularity and growth of the online programmes within the School of Computer Science obviously is in line with this projection. However, also on the rise are students’ dishonesty and cheating in the open and virtual environment of e-learning courses (Shepherd 2008). Institutions offering e-learning programmes are facing the challenges of deterring and detecting these misbehaviours by introducing security mechanisms to the current e-learning platforms. In particular, authenticating that a registered student indeed takes an online assessment, e.g., an exam or a coursework, is essential for the institutions to give the credit to the correct candidate. Authenticating a student is to ensure that a student is indeed who he says he is. Authenticating a student’s work goes one step further to ensure that an authenticated student indeed does the submitted work himself. This report is to investigate and compare current possible techniques and solutions for authenticating distance learning student and/or their work remotely for the elearning programmes. The report also aims to recommend some solutions that fit with UH StudyNet platform.Submitted Versio

    Towards an effective recognition graphical password mechanism based on cultural familiarity

    Get PDF
    Text-based passwords for authentication are exposed to the dictionary attack as users tend to create weak passwords for easy memorability. When dealing with user’s authentication, pictures are more likely to be simply remembered in comparison with words. Hence, this study aimed to determine the types of pictures in accordance to users’ cultural background. It also investigated the relationship between the choices of password and the cultural familiarity along with the effect of Graphical Password (GP) on security and usability. A list of guidelines was proposed for the recognition of graphical passwords. This is believed to increase the security as well as usability. A total of 40 students were recruited to build a GP database. Further, an evaluation was conducted to investigate users’ familiarity and recognition of the GP from the database using 30 other respondents. The results showed that the 30 participants positively responded to the familiar pictures in accordance to their cultures. The result of successful login rate was 79.51% which indicates that cultural-based GP has increased the respondents’ familiarity by promoting their memorability. Further, the respondents who chose familiar GP had higher guessing attack rate than the unfamiliar GP. Finally, a total of 8 guidelines were established based on the aspects that correspond to the users’ preferences for choosing and processing GP. These guidelines can be used by graphical password system designers to develop effective GP system

    Journal of Education Innovation and Communication: Redefining Communication: Social Media and the Age of Innovation

    Get PDF
    The publications of the Communication Institute of Greece, such as the “Journal of Education, Innovation, and Communication (JEICOM)”, are open access without any costs for the authors or the readers. JEICOM is a Fully Peer-Reviewed, Open Access journal, publishing articles from all areas of education, innovation and communication, independent of the events organized by the Communication Institute of Greece. JEICOM’s scope is to provide a free and open platform to academics, researchers, professionals, and postgraduate students to communicate and share knowledge in the form of high quality empirical and theoretical research that is of high interest not only for academic readers but also for practitioners and professionals. JEICOM welcomes theoretical, conceptual and empirical original research papers, case studies, book reviews that demonstrate the innovative and dynamic spirit for the education and communication sciences, from researchers, scholars, educators, policy-makers, and practitioners in education, communication, and related fields. Articles that show scholarly depth, breadth or richness of different aspects of social pedagogy are particularly welcome. The numerous papers presented every year during the conferences organized by the Communication Institute of Greece, enables us to have access to a plethora of papers. Following a rigorous peer- review process, only a selection of these papers submitted is published biannually. In addition, to the papers presented in the Institute’s conference, we do encourage independent submissions of papers too. Nevertheless, before you submit, please make sure to respect the guidelines and templates provided. The current special issue of the “Journal of Education, Innovation, and Communication (JEICOM)”, is our First Special Issue (December 2019). We consider that education and fruitful exchange can improve our lives with the view to nurture intercultural communication. Academics can contribute significantly to the quality of the educational experience and help educate, communicate, exchange, meet new cultures, create and collaborate! We wish you an excellent reading and for the year to come soon, 2020, Health, Love, Knowledge, Education, Prosperity, Communication and Exchange
    • 

    corecore