A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improvement of Shoulder-Surfing Resistant Authentication Method Using Hybrid Images
2019
International Journal of Technology and Engineering Studies
Although IllusionPIN is known to resist shoulder surfing, the authentication success rates and operation times of this method have not been reported. ...
Evaluation results confirmed that after this improvement, the authentication success rate exceeded 90% without disturbing the shoulder-surfing resistance. ...
Authentication Method using Hybrid Images Authentication methods based on hybrid images have also been reported [15, 16] . ...
doi:10.20469/ijtes.5.10002-4
fatcat:3kd3opo6mjbqpdbcvch7okh3qu
Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication
2019
International Journal of Electrical and Computer Engineering (IJECE)
The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. ...
Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal ...
Recent studies to mitigate shoulder-surfing by [10] employed IllusionPIN which deploys a hybrid-image keyboard that appears one way to the customer and completely different to an observer at a distance ...
doi:10.11591/ijece.v9i3.pp1879-1886
fatcat:2hvp5724bvdqpnvw2ugn52fddi
Shoulder Surfing: From An Experimental Study to a Comparative Framework
2019
International Journal of Human-Computer Studies
resistant. ...
Shoulder surfing is an attack vector widely recognized as a real threat - enough to warrant researchers dedicating a considerable effort toward designing novel authentication methods to be shoulder surfing ...
Illu-
sionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images. ...
doi:10.1016/j.ijhcs.2019.04.003
fatcat:niegkllyifdzxakyu4bjw6or2i
Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
2018
Journal of Network and Computer Applications
, side-channel attacks, and shoulder-surfing attacks. ...
To address these 19 challenges, a novel continuous authentication scheme is presented in this study, which recognizes smartphone 20 users on the basis of their physical activity patterns using accelerometer ...
The authors proposed IllusionPin (IPIN) for user authentication, which 164 utilized hybrid images for blending two keypads for keypad illusion. ...
doi:10.1016/j.jnca.2018.02.020
fatcat:4tu22aitbzaqxjbmpnsbkakhde