{"id":"https://openalex.org/W2011374158","doi":"https://doi.org/10.1145/2420950.2420965","title":"On automated image choice for secure and usable graphical passwords","display_name":"On automated image choice for secure and usable graphical passwords","publication_year":2012,"publication_date":"2012-12-03","ids":{"openalex":"https://openalex.org/W2011374158","doi":"https://doi.org/10.1145/2420950.2420965","mag":"2011374158"},"language":"en","primary_location":{"id":"doi:10.1145/2420950.2420965","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087540543","display_name":"Paul Dunphy","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Paul Dunphy","raw_affiliation_strings":["Newcastle University"],"affiliations":[{"raw_affiliation_string":"Newcastle University","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015840697","display_name":"Patrick Olivier","orcid":"https://orcid.org/0000-0003-2841-7580"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Patrick Olivier","raw_affiliation_strings":["Newcastle University"],"affiliations":[{"raw_affiliation_string":"Newcastle University","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087540543"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":2.8422,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91877205,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"99","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7980544567108154},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7936476469039917},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.7216648459434509},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6523127555847168},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5804495811462402},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5776598453521729},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5714886784553528},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5465344190597534},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47101935744285583},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45440927147865295},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.44865792989730835},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4282614290714264},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3924503028392792},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3879418969154358},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3382566273212433},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32294270396232605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1803443431854248},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13287988305091858},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09514310956001282}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7980544567108154},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7936476469039917},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.7216648459434509},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6523127555847168},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5804495811462402},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5776598453521729},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5714886784553528},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5465344190597534},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47101935744285583},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45440927147865295},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.44865792989730835},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4282614290714264},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3924503028392792},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3879418969154358},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3382566273212433},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32294270396232605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1803443431854248},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13287988305091858},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09514310956001282},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2420950.2420965","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G6567743404","display_name":null,"funder_award_id":"EP/G066019/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W128619364","https://openalex.org/W1484437324","https://openalex.org/W1505010935","https://openalex.org/W1600614774","https://openalex.org/W1921097329","https://openalex.org/W1978075813","https://openalex.org/W1980384741","https://openalex.org/W2001513998","https://openalex.org/W2011798344","https://openalex.org/W2014833947","https://openalex.org/W2018926393","https://openalex.org/W2019017059","https://openalex.org/W2026939551","https://openalex.org/W2028171449","https://openalex.org/W2031362864","https://openalex.org/W2032725100","https://openalex.org/W2041373240","https://openalex.org/W2046378201","https://openalex.org/W2074387480","https://openalex.org/W2080601453","https://openalex.org/W2081484203","https://openalex.org/W2085592842","https://openalex.org/W2100682800","https://openalex.org/W2109325523","https://openalex.org/W2109868644","https://openalex.org/W2112279498","https://openalex.org/W2115218409","https://openalex.org/W2121386924","https://openalex.org/W2122633288","https://openalex.org/W2125101937","https://openalex.org/W2126453598","https://openalex.org/W2131605659","https://openalex.org/W2132201434","https://openalex.org/W2142978433","https://openalex.org/W2143668817","https://openalex.org/W2151401338","https://openalex.org/W2151600711","https://openalex.org/W2157379883","https://openalex.org/W2160828020","https://openalex.org/W2161032904","https://openalex.org/W2168549506","https://openalex.org/W2168969969"],"related_works":["https://openalex.org/W4235220108","https://openalex.org/W4256170434","https://openalex.org/W4233948907","https://openalex.org/W4238894392","https://openalex.org/W4311722428","https://openalex.org/W2357607877","https://openalex.org/W2982321410","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W2146270836"],"abstract_inverted_index":{"The":[0],"usability":[1,64,91],"of":[2,8,27,58,65,102,111,118],"graphical":[3,120],"passwords":[4],"based":[5],"upon":[6],"recognition":[7],"images":[9,73,186],"is":[10,15,22,44],"widely":[11],"explored.":[12],"However,":[13],"it":[14],"likely":[16],"that":[17,179],"their":[18],"observed":[19],"high":[20],"memorability":[21],"contingent":[23],"on":[24],"certain":[25],"attributes":[26],"the":[28,56,63,66,88,100,116,138,166,173,189,196],"image":[29,60,104,134,145,153,170],"sets":[30],"presented":[31],"to":[32,51,70,85,107,129,140,183],"users.":[33],"Characterizing":[34],"this":[35,96],"relationship":[36],"remains":[37],"an":[38,59,142],"open":[39],"problem;":[40],"for":[41],"example,":[42],"there":[43],"no":[45],"systematic":[46],"(and":[47],"empirically":[48],"verified)":[49],"method":[50],"determine":[52],"how":[53],"similarity":[54,132,146,167],"between":[55],"elements":[57],"set":[61],"impacts":[62],"login":[67,113,190,198],"challenge.":[68],"Strategies":[69],"assemble":[71],"suitable":[72],"are":[74],"usually":[75],"carried":[76],"out":[77,125],"by":[78,193,200],"hand,":[79],"which":[80],"represents":[81],"a":[82,126,131,151],"significant":[83,175],"barrier":[84],"uptake":[86],"as":[87],"process":[89],"has":[90],"and":[92,136,195],"security":[93],"implications.":[94],"In":[95,172],"paper,":[97],"we":[98,149,164,177],"explore":[99],"role":[101],"simple":[103],"processing":[105],"techniques":[106],"provide":[108],"automated":[109,181],"assembly":[110],"usable":[112],"challenges":[114],"in":[115,169],"context":[117],"recognition-based":[119],"passwords.":[121],"We":[122],"firstly":[123],"carry":[124],"user":[127],"study":[128],"obtain":[130],"ranked":[133],"set,":[135],"use":[137],"results":[139],"select":[141],"optimal":[143],"per-pixel":[144],"metric.":[147],"Then":[148],"conduct":[150],"short-term":[152],"recall":[154],"test":[155],"using":[156],"Amazon":[157],"Mechanical":[158],"Turk":[159],"with":[160],"343":[161],"subjects":[162],"where":[163],"manipulated":[165],"present":[168],"grids.":[171],"most":[174],"case,":[176],"found":[178],"our":[180],"methods":[182],"choose":[184],"decoy":[185],"could":[187],"impact":[188],"success":[191],"rate":[192],"40%,":[194],"median":[197],"duration":[199],"35":[201],"seconds.":[202]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
