{"id":"https://openalex.org/W2537283563","doi":"https://doi.org/10.1145/2976749.2978417","title":"On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols","display_name":"On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2537283563","doi":"https://doi.org/10.1145/2976749.2978417","mag":"2537283563"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978417","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978417","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978417&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2978417&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100610986","display_name":"Tianhao Wang","orcid":"https://orcid.org/0000-0002-9017-7947"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianhao Wang","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043437180","display_name":"Huangyi Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huangyi Ge","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070136662","display_name":"Omar Chowdhury","orcid":"https://orcid.org/0000-0002-1356-6279"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Chowdhury","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082365034","display_name":"Hemanta K. Maji","orcid":"https://orcid.org/0000-0003-4244-8658"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hemanta K. Maji","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101471208","display_name":"Ninghui Li","orcid":"https://orcid.org/0000-0001-8207-9717"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ninghui Li","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100610986"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.14789383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"603","last_page":"615"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7763713598251343},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7564986944198608},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.7231175899505615},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5357920527458191},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5247252583503723},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5231853127479553},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.49258333444595337},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46477821469306946},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.20137712359428406}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7763713598251343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7564986944198608},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.7231175899505615},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5357920527458191},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5247252583503723},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5231853127479553},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.49258333444595337},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46477821469306946},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.20137712359428406}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978417","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978417","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978417&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2976749.2978417","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2978417","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2978417&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"No poverty","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/1"}],"awards":[{"id":"https://openalex.org/G1769273414","display_name":null,"funder_award_id":"1314688","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8949010610","display_name":"CRII: SaTC: Computational Correlations: A New Tool for Cryptography","funder_award_id":"1566499","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2537283563.pdf","grobid_xml":"https://content.openalex.org/works/W2537283563.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1516390128","https://openalex.org/W1529679142","https://openalex.org/W1540108068","https://openalex.org/W1548691389","https://openalex.org/W1560940245","https://openalex.org/W1561843649","https://openalex.org/W1817409002","https://openalex.org/W1871171570","https://openalex.org/W1969448504","https://openalex.org/W1982820384","https://openalex.org/W1988245022","https://openalex.org/W2001095020","https://openalex.org/W2015393133","https://openalex.org/W2019017059","https://openalex.org/W2022191808","https://openalex.org/W2030112111","https://openalex.org/W2056433828","https://openalex.org/W2062010115","https://openalex.org/W2122975390","https://openalex.org/W2124288692","https://openalex.org/W2128329999","https://openalex.org/W2131529225","https://openalex.org/W2137739383","https://openalex.org/W2160322531","https://openalex.org/W2162610170","https://openalex.org/W2166689265","https://openalex.org/W2398802025","https://openalex.org/W2464421529","https://openalex.org/W2913419753","https://openalex.org/W3101528490","https://openalex.org/W4253746564"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W87530933","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Visual":[0],"cryptography":[1],"has":[2,148],"been":[3],"applied":[4],"to":[5,107,127],"design":[6],"human":[7],"computable":[8],"authentication":[9,73],"protocols.":[10],"In":[11,83],"such":[12,55],"a":[13,21,32,46,80],"protocol,":[14],"the":[15,18,25,36,50,65,85,114,133,141,145,149],"user":[16,37],"and":[17,43,67,90,138],"server":[19],"share":[20],"secret":[22],"key":[23],"in":[24,113],"form":[26],"of":[27,54,69,88,122,135],"an":[28,59],"image":[29,41],"printed":[30],"on":[31,39],"transparent":[33],"medium,":[34],"which":[35,76],"superimposes":[38],"server-generated":[40],"challenges,":[42],"visually":[44],"decodes":[45],"response":[47],"code":[48],"from":[49],"image.":[51],"An":[52],"example":[53],"protocols":[56,74],"is":[57],"PassWindow,":[58],"award-winning":[60],"commercial":[61],"product.":[62],"We":[63,99,129],"study":[64],"security":[66,147],"usability":[68,134],"segment-based":[70],"visual":[71],"cryptographic":[72],"(SVAPs),":[75],"include":[77],"PassWindow":[78],"as":[79],"special":[81],"case.":[82],"SVAP,":[84],"images":[86],"consist":[87],"segments":[89],"are":[91,97,105],"thus":[92],"structured.":[93],"Our":[94],"overall":[95],"findings":[96],"negative.":[98],"introduce":[100],"two":[101],"attacks":[102,118],"that":[103,124,140,143],"together":[104],"able":[106],"break":[108],"all":[109],"SVAPs":[110,123],"we":[111],"considered":[112],"paper.":[115],"Furthermore,":[116],"our":[117],"exploit":[119],"fundamental":[120],"weaknesses":[121],"appear":[125],"difficult":[126],"fix.":[128],"have":[130],"also":[131],"evaluated":[132],"different":[136],"SVAPs,":[137],"found":[139],"protocol":[142],"offers":[144],"best":[146],"poorest":[150],"usability.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
