{"id":"https://openalex.org/W3141783068","doi":"https://doi.org/10.1109/access.2021.3069164","title":"A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability","display_name":"A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3141783068","doi":"https://doi.org/10.1109/access.2021.3069164","mag":"3141783068"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3069164","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3069164","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09387325.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09387325.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007096099","display_name":"Shah Zaman Nizamani","orcid":"https://orcid.org/0000-0002-0012-341X"},"institutions":[{"id":"https://openalex.org/I65146876","display_name":"Quaid-e-Awam University of Engineering, Science and Technology","ror":"https://ror.org/01t34b131","country_code":"PK","type":"education","lineage":["https://openalex.org/I65146876"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Shah Zaman Nizamani","raw_affiliation_strings":["Information Technology Department, Quaid-e-Awam University of Engineering, Science and Technology, Nawabshah, Pakistan"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, Quaid-e-Awam University of Engineering, Science and Technology, Nawabshah, Pakistan","institution_ids":["https://openalex.org/I65146876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046516476","display_name":"Syed Raheel Hassan","orcid":"https://orcid.org/0000-0003-4027-3903"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Syed Raheel Hassan","raw_affiliation_strings":["Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015773218","display_name":"Riaz Ahmed Shaikh","orcid":"https://orcid.org/0000-0001-6666-0253"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Riaz Ahmed Shaikh","raw_affiliation_strings":["Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077270706","display_name":"Ehab Abozinadah","orcid":"https://orcid.org/0000-0002-0363-5912"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ehab Atif Abozinadah","raw_affiliation_strings":["Information Systems Department, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Systems Department, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077619272","display_name":"Rashid Mehmood","orcid":"https://orcid.org/0000-0002-4997-5322"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Rashid Mehmood","raw_affiliation_strings":["High Performance Computing Center, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"High Performance Computing Center, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007096099"],"corresponding_institution_ids":["https://openalex.org/I65146876"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.5267,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.96619165,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"9","issue":null,"first_page":"51294","last_page":"51312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9466000199317932,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8560572862625122},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8033413887023926},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6566345691680908},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6400278806686401},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.5277389287948608},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.5083054900169373},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.45405298471450806},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4436296224594116},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.4416426718235016},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2167968451976776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8560572862625122},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8033413887023926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6566345691680908},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6400278806686401},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.5277389287948608},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.5083054900169373},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.45405298471450806},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4436296224594116},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.4416426718235016},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2167968451976776}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2021.3069164","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3069164","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09387325.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:ueaeprints.uea.ac.uk:85251","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400384","display_name":"UEA Digital Repository (University of East Anglia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1118541","host_organization_name":"University of East Anglia","host_organization_lineage":["https://openalex.org/I1118541"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:3251c9fb034248a8afcc801b62cfa1a6","is_oa":true,"landing_page_url":"https://doaj.org/article/3251c9fb034248a8afcc801b62cfa1a6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 51294-51312 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3069164","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3069164","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09387325.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3141783068.pdf","grobid_xml":"https://content.openalex.org/works/W3141783068.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W815870392","https://openalex.org/W857649965","https://openalex.org/W1485033854","https://openalex.org/W1503108337","https://openalex.org/W1921097329","https://openalex.org/W1990935444","https://openalex.org/W2019017059","https://openalex.org/W2041539968","https://openalex.org/W2044208461","https://openalex.org/W2077643526","https://openalex.org/W2094000393","https://openalex.org/W2096630046","https://openalex.org/W2114853176","https://openalex.org/W2115218409","https://openalex.org/W2123774469","https://openalex.org/W2131857702","https://openalex.org/W2151600711","https://openalex.org/W2152337449","https://openalex.org/W2157007820","https://openalex.org/W2159335031","https://openalex.org/W2171133282","https://openalex.org/W2171392757","https://openalex.org/W2238866705","https://openalex.org/W2291544156","https://openalex.org/W2335110595","https://openalex.org/W2394947871","https://openalex.org/W2560568356","https://openalex.org/W2588670181","https://openalex.org/W2592416275","https://openalex.org/W2617378240","https://openalex.org/W2739692078","https://openalex.org/W2784017372","https://openalex.org/W2800024979","https://openalex.org/W2801114931","https://openalex.org/W2801698264","https://openalex.org/W2929988668","https://openalex.org/W2936231184","https://openalex.org/W2975048949","https://openalex.org/W3000612894","https://openalex.org/W3013201560","https://openalex.org/W3016047511","https://openalex.org/W3034298130","https://openalex.org/W3037022017","https://openalex.org/W3119938721","https://openalex.org/W6628932435","https://openalex.org/W6630133823","https://openalex.org/W6684764570","https://openalex.org/W6696730327","https://openalex.org/W6775661657"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2021087413","https://openalex.org/W2156083280","https://openalex.org/W2557836603","https://openalex.org/W4385828295","https://openalex.org/W2359085393","https://openalex.org/W2181536702","https://openalex.org/W2936467198","https://openalex.org/W1982308847","https://openalex.org/W1639969416"],"abstract_inverted_index":{"Despite":[0],"numerous":[1],"efforts,":[2],"developing":[3],"an":[4],"authentication":[5,28,40,232,245,253],"scheme":[6,29,193,240,278],"that":[7,30,268],"offers":[8],"strong":[9],"security":[10,63,101,196,285],"while":[11],"offering":[12],"memorability":[13,34],"and":[14,35,75,83,178,189,210,220,229,252,257],"usability":[15,36,82,219],"remains":[16],"a":[17,25,48,54,79,122,129,145,154,269],"grand":[18],"challenge.":[19],"In":[20],"this":[21,276],"paper,":[22],"we":[23,235],"propose":[24],"textual-graphical":[26],"hybrid":[27],"improves":[31],"the":[32,61,86,100,103,115,118,133,138,172,191,230,238,260,263],"security,":[33,84,177],"inadequacies":[37],"of":[38,50,60,70,93,102,117,132,148,157,162,180,225,249,262,271],"existing":[39,62],"schemes.":[41,64],"This":[42],"has":[43],"been":[44],"achieved":[45],"by":[46],"combining":[47],"range":[49,270],"mechanisms":[51,127],"together,":[52],"in":[53,96,165,247,275,284],"novel":[55,130,146,272],"manner,":[56],"to":[57,88,91,140,171,175,183],"address":[58],"weaknesses":[59],"Firstly,":[65],"two":[66],"dynamically":[67,89],"selectable":[68],"modes":[69],"password":[71,139,150,158,163,173,226],"entry":[72],"(Easy":[73],"Login,":[74],"Secure":[76],"Login)":[77],"provide":[78],"trade-off":[80],"between":[81],"allowing":[85],"user":[87,119],"switch":[90],"any":[92],"these":[94],"methods":[95,273],"real-time":[97],"based":[98],"on":[99],"surrounding":[104],"environment":[105,109],"(e.g.,":[106,121],"secure":[107],"home":[108],"versus":[110],"insecure":[111],"public":[112],"places)":[113],"or":[114,206],"criticality":[116],"account":[120],"bank":[123],"account).":[124],"The":[125,255],"other":[126,243],"included":[128],"use":[131,179],"drawmetric":[134],"mechanism":[135],"for":[136,194,282],"setting":[137],"improve":[141,184],"memorability,":[142,221],"multistep":[143],"authentication,":[144],"adaptation":[147],"one-time":[149],"(OTP)":[151],"concept":[152],"using":[153],"random":[155,160,169,203],"selection":[156],"elements,":[159],"placement":[161],"elements":[164,174,227],"different":[166],"steps,":[167],"assigning":[168],"numbers":[170],"increase":[176],"simple":[181],"addition":[182],"security.":[185],"We":[186,214,266],"have":[187,215,236],"implemented":[188],"analysed":[190],"proposed":[192,239,264,277],"its":[195,218,250],"against":[197],"brute-force":[198],"attacks,":[199],"dictionary,":[200],"shoulder":[201],"surfing,":[202],"guessing,":[204],"phishing":[205],"forming,":[207],"keystroke/mouse":[208],"logger,":[209],"multiple":[211],"recording":[212],"attacks.":[213],"also":[216],"investigated":[217],"reporting":[222],"various":[223],"trends":[224],"used":[228],"respective":[231],"times.":[233],"Moreover,":[234],"compared":[237],"with":[241],"eight":[242],"well-known":[244],"schemes":[246],"terms":[248],"resilience":[251],"time.":[254],"results":[256],"analyses":[258],"demonstrate":[259],"effectiveness":[261],"scheme.":[265],"believe":[267],"introduced":[274],"opens":[279],"several":[280],"doors":[281],"innovation":[283],"techniques.":[286]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
