{"id":"https://openalex.org/W4392982190","doi":"https://doi.org/10.1109/cvmi59935.2023.10465031","title":"The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images","display_name":"The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images","publication_year":2023,"publication_date":"2023-12-10","ids":{"openalex":"https://openalex.org/W4392982190","doi":"https://doi.org/10.1109/cvmi59935.2023.10465031"},"language":"en","primary_location":{"id":"doi:10.1109/cvmi59935.2023.10465031","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cvmi59935.2023.10465031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019660208","display_name":"Afrah Nazir","orcid":null},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Afrah Nazir","raw_affiliation_strings":["Zakir Hussain College of Engineering and Technology, Aligarh Muslim University,Department of Computer Engineering,Aligarh,India","Department of Computer Engineering, Zakir Hussain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India"],"affiliations":[{"raw_affiliation_string":"Zakir Hussain College of Engineering and Technology, Aligarh Muslim University,Department of Computer Engineering,Aligarh,India","institution_ids":["https://openalex.org/I171210897"]},{"raw_affiliation_string":"Department of Computer Engineering, Zakir Hussain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103976890","display_name":"M. Sarosh Umar","orcid":null},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Sarosh Umar","raw_affiliation_strings":["Zakir Hussain College of Engineering and Technology, Aligarh Muslim University,Department of Computer Engineering,Aligarh,India","Department of Computer Engineering, Zakir Hussain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India"],"affiliations":[{"raw_affiliation_string":"Zakir Hussain College of Engineering and Technology, Aligarh Muslim University,Department of Computer Engineering,Aligarh,India","institution_ids":["https://openalex.org/I171210897"]},{"raw_affiliation_string":"Department of Computer Engineering, Zakir Hussain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India","institution_ids":["https://openalex.org/I171210897"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019660208"],"corresponding_institution_ids":["https://openalex.org/I171210897"],"apc_list":null,"apc_paid":null,"fwci":0.4595,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74453848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8183963298797607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6982164978981018},{"id":"https://openalex.org/keywords/illusion","display_name":"Illusion","score":0.6190557479858398},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6067405939102173},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5748484134674072},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4108821153640747},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38482770323753357},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38332003355026245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29474103450775146},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.10138210654258728},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07419419288635254},{"id":"https://openalex.org/keywords/cognitive-psychology","display_name":"Cognitive psychology","score":0.06552550196647644}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8183963298797607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6982164978981018},{"id":"https://openalex.org/C184047640","wikidata":"https://www.wikidata.org/wiki/Q182593","display_name":"Illusion","level":2,"score":0.6190557479858398},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6067405939102173},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5748484134674072},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4108821153640747},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38482770323753357},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38332003355026245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29474103450775146},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.10138210654258728},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07419419288635254},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.06552550196647644},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cvmi59935.2023.10465031","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cvmi59935.2023.10465031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1549909148","https://openalex.org/W1692616763","https://openalex.org/W1819166232","https://openalex.org/W1964132625","https://openalex.org/W1980432433","https://openalex.org/W2007567190","https://openalex.org/W2019897613","https://openalex.org/W2087099513","https://openalex.org/W2094908318","https://openalex.org/W2161032904","https://openalex.org/W2604282370","https://openalex.org/W2912624581","https://openalex.org/W2943923510","https://openalex.org/W2981677616","https://openalex.org/W3019238131","https://openalex.org/W6632818402","https://openalex.org/W6638336592","https://openalex.org/W6762007705"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949","https://openalex.org/W2512387791","https://openalex.org/W70044515","https://openalex.org/W2242172122"],"abstract_inverted_index":{"User":[0],"authentication":[1,19,73,78,115],"is":[2,181],"a":[3,54,83,112],"crucial":[4],"component":[5],"of":[6,35,71,76,121,134],"information":[7],"security":[8],"and":[9,26,128,147,163,168,185,197],"can":[10,59,186],"be":[11,40,60],"accomplished":[12],"through":[13],"various":[14],"ways.":[15],"Strong":[16],"text-based":[17,77],"password":[18,189],"techniques":[20],"have":[21,170],"been":[22,80,91,171],"used":[23],"for":[24],"ages,":[25],"they":[27],"are":[28,157],"normally":[29],"expected":[30],"to":[31,42,62,67,85,100],"provide":[32],"some":[33],"level":[34],"security.":[36],"But":[37],"users":[38,156],"may":[39],"forced":[41],"write":[43],"down":[44],"their":[45],"passwords":[46,66],"on":[47,118],"paper":[48],"or":[49],"even":[50],"store":[51],"them":[52],"in":[53,74],"computer":[55],"file":[56],"because":[57],"it":[58],"difficult":[61],"commit":[63],"such":[64,87,191],"strong":[65],"memory.":[68],"The":[69,173],"use":[70],"graphical":[72],"place":[75],"has":[79,90],"suggested":[81,160],"as":[82,192],"way":[84],"combat":[86],"tendencies.":[88],"This":[89],"prompted":[92],"by":[93],"the":[94,159,178],"fact":[95],"that":[96,177],"people":[97],"naturally":[98],"tend":[99],"remember":[101],"visuals":[102],"over":[103],"words":[104],"more":[105],"readily.":[106],"In":[107],"this":[108],"research,":[109],"we":[110],"present":[111],"novel":[113],"challenge-response":[114],"scheme":[116],"based":[117],"three":[119],"types":[120],"illusions.":[122],"i.e.,":[123],"Literal":[124],"Illusion,":[125,140,143],"Cognitive":[126,135,138,141,144,148],"Illusion":[127,136,146],"Physiological":[129],"Illusion.":[130,150],"And":[131],"4":[132],"sub-categories":[133],"i.e.":[137],"Distorting":[139],"Paradox":[142],"Ambiguous":[145],"Fictional":[149],"To":[151],"find":[152],"out":[153],"how":[154],"satisfied":[155],"with":[158],"scheme's":[161],"performance":[162],"usability,":[164],"an":[165],"experimental":[166],"research":[167],"survey":[169],"done.":[172],"study's":[174],"findings":[175],"demonstrate":[176],"proposed":[179],"system":[180],"secure,":[182],"user-":[183],"friendly,":[184],"withstand":[187],"typical":[188],"attacks":[190],"brute":[193],"-":[194],"force":[195],"attempts":[196],"shoulder":[198],"surfing.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
