{"id":"https://openalex.org/W1974850098","doi":"https://doi.org/10.1109/trustcom.2013.93","title":"Exploring the Guessability of Image Passwords Using Verbal Descriptions","display_name":"Exploring the Guessability of Image Passwords Using Verbal Descriptions","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1974850098","doi":"https://doi.org/10.1109/trustcom.2013.93","mag":"1974850098"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.93","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067653484","display_name":"Soumyadeb Chowdhury","orcid":"https://orcid.org/0000-0002-8074-248X"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Soumyadeb Chowdhury","raw_affiliation_strings":["[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]"],"affiliations":[{"raw_affiliation_string":"[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088696600","display_name":"Ron Poet","orcid":null},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ron Poet","raw_affiliation_strings":["[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]"],"affiliations":[{"raw_affiliation_string":"[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026946305","display_name":"Lewis Mackenzie","orcid":"https://orcid.org/0000-0002-0868-0456"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lewis Mackenzie","raw_affiliation_strings":["[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]"],"affiliations":[{"raw_affiliation_string":"[Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK]","institution_ids":["https://openalex.org/I7882870"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.49119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":"400","issue":null,"first_page":"768","last_page":"775"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":0.9858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11707","display_name":"Eye Tracking in Human-Computer Interaction","score":0.9632,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/graphical-passwords","display_name":"Graphical Passwords","score":0.684863},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.63365006},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.59206784},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5847712},{"id":"https://openalex.org/keywords/passwords","display_name":"Passwords","score":0.579969},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.515532},{"id":"https://openalex.org/keywords/face-perception","display_name":"Face Perception","score":0.506047},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication","score":0.50567}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.85266316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75549924},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.63365006},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.59206784},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5847712},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5609191},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.52059364},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49852872},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46530706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43902147},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4143901},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.38873497},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35869873},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.3408277},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.23081902},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.93","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.6}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W128619364","https://openalex.org/W1483155202","https://openalex.org/W1485033854","https://openalex.org/W1503108337","https://openalex.org/W1745458420","https://openalex.org/W1921097329","https://openalex.org/W2042655827","https://openalex.org/W2065688996","https://openalex.org/W2080601453","https://openalex.org/W2093353037","https://openalex.org/W2130242640","https://openalex.org/W2134780997","https://openalex.org/W2144740092","https://openalex.org/W2147256718","https://openalex.org/W2151600711","https://openalex.org/W4244109911"],"related_works":["https://openalex.org/W4385828295","https://openalex.org/W2969720675","https://openalex.org/W2936467198","https://openalex.org/W2596869006","https://openalex.org/W2183044514","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2048203748","https://openalex.org/W1987516957","https://openalex.org/W165936246"],"abstract_inverted_index":{"One":[0],"claimed":[1],"advantage":[2],"of":[3,47,50,75,151],"the":[4,43,48,76,117,152,155,180,187,193,203],"image":[5,53],"passwords":[6,17,68,118],"used":[7,66],"in":[8,69,79,113,190,196,213],"recognition":[9],"based":[10],"graphical":[11],"authentication":[12],"systems":[13],"(RBGSs)":[14],"over":[15,137],"text":[16],"is":[18,30,105,126,199],"that":[19,185],"they":[20],"cannot":[21],"be":[22,159],"written":[23],"down":[24],"or":[25],"verbally":[26,120],"disclosed.":[27],"However,":[28],"there":[29],"no":[31],"empirical":[32],"evidence":[33],"to":[34,62,109,158],"support":[35],"this":[36,39,197],"claim.":[37],"In":[38],"paper,":[40,210],"we":[41],"present":[42],"first":[44],"published":[45],"comparison":[46],"vulnerability":[49],"four":[51],"different":[52],"types":[54],"-Mikon,":[55],"doodle,":[56],"art":[57,176],"and":[58,97,134,162],"everyday":[59],"object":[60,156],"images":[61,157,168],"verbal/spoken":[63],"descriptions,":[64],"when":[65],"as":[67],"RBGS.":[70],"This":[71],"paper":[72,198],"considers":[73],"one":[74,194],"human":[77,188],"factors":[78,189],"security":[80,191],"i.e.":[81],"password":[82,112],"sharing":[83],"through":[84],"spoken":[85],"descriptions.":[86],"The":[87,122,149],"user":[88],"study":[89,153],"conducted":[90],"with":[91],"126":[92],"participants":[93],"(56":[94],"callers/":[95],"describer":[96],"70":[98],"listeners/":[99],"attacker)":[100],"measures":[101,141,144],"how":[102],"easy":[103],"it":[104],"for":[106],"an":[107],"attacker":[108],"guess":[110],"a":[111,114,127,132,135],"RBGS,":[115],"if":[116],"are":[119,169,179],"described.":[121],"experimental":[123],"set":[124],"up":[125],"two":[128],"way":[129],"dialogue":[130],"between":[131],"caller":[133],"listener":[136],"telephone":[138],"using":[139],"repeated":[140],"protocol,":[142],"which":[143,178],"mean":[145],"successful":[146],"login":[147],"percentage.":[148],"results":[150],"show":[154],"most":[160],"guessable,":[161],"doodles":[163],"follow":[164],"close":[165],"behind.":[166],"Mikon":[167],"less":[170],"guessable":[171],"than":[172],"doodle":[173],"followed":[174],"by":[175],"images,":[177],"least":[181],"guessable.":[182],"We":[183],"believe":[184],"unless,":[186],"like":[192],"considered":[195],"taken":[200],"into":[201],"account,":[202],"RBGSs":[204],"will":[205],"always":[206],"look":[207],"secure":[208],"on":[209],"but":[211],"fail":[212],"practice.":[214]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1974850098","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2024-11-26T11:59:11.200126","created_date":"2016-06-24"}