Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1322192.1322233acmconferencesArticle/Chapter ViewAbstractPublication Pagesicmi-mlmiConference Proceedingsconference-collections
poster

Password management using doodles

Published: 12 November 2007 Publication History
  • Get Citation Alerts
  • Abstract

    The average computer user needs to remember a large number of text username and password combinations for different applications, which places a large cognitive load on the user. Consequently users tend to write down passwords, use easy to remember (and guess) passwords, or use the same password for multiple applications, leading to security risks. This paper describes the use of personalized hand-drawn "doodles" for recall and management of password information. Since doodles can be easier to remember than text passwords, the cognitive load on the user is reduced. Our method involves recognizing doodles by matching them against stored prototypes using handwritten shape matching techniques. We have built a system which manages passwords for web applications through a web browser. In this system, the user logs into a web application by drawing a doodle using a touchpad or digitizing tablet attached to the computer. The user is automatically logged into the web application if the doodle matches the doodle drawn during enrollment. We also report accuracy results for our doodle recognition system, and conclude with a summary of next steps.

    References

    [1]
    Klein, D. "Foiling the cracker: A survey of, and improvements to, password security". In Proceedings of the 2nd USENIX Security Workshop, August 1990.
    [2]
    Goldberg, J., Hagman, J., and Sazawal, V., "Doodling our way to better authentication", CHI '02 extended abstracts on Human factors in computing systems, ACM Press, Minneapolis, Minnesota, USA, pp.868--869, 2002.
    [3]
    Jermyn, I., Mayer, A., Monrose, F., Reiter, M., & Rubin, A., "The Design and Analysis of Graphical Passwords". Proceedings of the 8th USENIX Security Symposium. The USENIX Association, Washington, D.C., U.S.A, 1999.
    [4]
    Pastor, A. Toselli, and E.Vidal, "Writing Speed Normalization for On-Line Handwritten Text Recognition", Proc. of ICDAR'05, Seoul, 2005, pp. 1131--1136.
    [5]
    R. N. Shepard. Recognition memory for words, sentences, and pictures. Journal of Verbal Learnings and Verbal Behavior, 6: 156--163, 1967.
    [6]
    U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, "Biometric Cryptosystems: Issues and Challenges," Proc. IEEE, vol. 92, no. 6, pp. 948--960, June 2004.
    [7]
    Varenhorst, C. "Passdoodles: A lightweight authentication method" http://oknet.csail.mit.edu/papers/varenhorst.pdf 2004
    [8]
    Isolated Handwritten Tamil Character Dataset hpl-tamil-iso-char, http://www.hpl.hp.com/india/research/penhw/resources/tamil-iso-char.html
    [9]
    H. Sakoe and S. Chiba, "Dynamic Progamming Optimization for Spoken Word Recognition", IEEE Trans. On Acoustics, Speech and Signal Processing, vol. 26, pp. 623--625, 19

    Cited By

    View all
    • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
    • (2017)New Graphic Password Scheme Containing Questions-Background-Pattern and ImplementationProcedia Computer Science10.1016/j.procs.2017.03.071107:C(148-156)Online publication date: 1-Apr-2017
    • (2016)SARComputer Graphics Forum10.1111/cgf.1273335:6(73-86)Online publication date: 1-Sep-2016
    • Show More Cited By

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICMI '07: Proceedings of the 9th international conference on Multimodal interfaces
    November 2007
    402 pages
    ISBN:9781595938176
    DOI:10.1145/1322192
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 November 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. doodles
    2. password management

    Qualifiers

    • Poster

    Conference

    ICMI07
    Sponsor:
    ICMI07: International Conference on Multimodal Interface
    November 12 - 15, 2007
    Aichi, Nagoya, Japan

    Acceptance Rates

    Overall Acceptance Rate 453 of 1,080 submissions, 42%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity ImpairmentsACM Transactions on Accessible Computing10.1145/365252217:2(1-37)Online publication date: 19-Mar-2024
    • (2017)New Graphic Password Scheme Containing Questions-Background-Pattern and ImplementationProcedia Computer Science10.1016/j.procs.2017.03.071107:C(148-156)Online publication date: 1-Apr-2017
    • (2016)SARComputer Graphics Forum10.1111/cgf.1273335:6(73-86)Online publication date: 1-Sep-2016
    • (2016)Graphical Password-Based User Authentication With Free-Form DoodlesIEEE Transactions on Human-Machine Systems10.1109/THMS.2015.250410146:4(607-614)Online publication date: Aug-2016
    • (2016)SUIS: An online graphical Signature-Based User Identification System2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)10.1109/DICTAP.2016.7544006(85-89)Online publication date: Jul-2016
    • (2013)The DooDB Graphical Password Database: Data Analysis and Benchmark ResultsIEEE Access10.1109/ACCESS.2013.22817731(596-605)Online publication date: 2013
    • (2012)Graphical passwordsACM Computing Surveys10.1145/2333112.233311444:4(1-41)Online publication date: 7-Sep-2012
    • (2011)Online Versus Local Password Management Applications: An Analysis of User Training and ReactionsJournal of Applied Security Research10.1080/19361610.2011.6040706:4(449-466)Online publication date: Oct-2011
    • (2011)Exploration and field study of a password manager using icon-based passwordsProceedings of the 2011 international conference on Financial Cryptography and Data Security10.1007/978-3-642-29889-9_9(104-118)Online publication date: 28-Feb-2011
    • (2010)A Comparative Evaluation of Finger-Drawn Graphical Password Verification MethodsProceedings of the 2010 12th International Conference on Frontiers in Handwriting Recognition10.1109/ICFHR.2010.65(375-380)Online publication date: 16-Nov-2010
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media