Beautiful secrets: using aesthetic images to authenticate users

04/12/2022
by   Noam Tractinsky, et al.
0

We propose and evaluate an authentication scheme that improves usability and user experience issues in the authentication process due to its reliance on people's aesthetic tastes and preferences. The scheme uses aesthetic images to verify the identity of computer users. It relies on three major premises regarding visual aesthetics: (i) that an individual has different preferences for different aesthetic stimuli; (ii) that these preferences are relatively consistent; and (iii) that aesthetic tastes are subjective and, therefore, there are considerable individual differences in aesthetic preferences. Following a review of the scientific basis for these premises, we describe the concept of the aesthetic evaluation-based authentication (AEbA) method and illustrate an implementation of it. We address AEbA's advantages and disadvantages relative to other related methods and conclude that it is adequate for low-to-medium security domains. It cannot serve as a compulsory method because we suspect that a certain portion of the user population lacks the degree of aesthetic sensitivity required to use the system effectively. On the plus side, the method offers a positive experience. It alleviates the burden of memorizing passwords to a minimum, and relative to other usability-oriented schemes provides better security in terms of shoulder-surfing, phishing, and password space. Finally, we report on a pilot evaluation of the concept and its feasibility that supports the method's main tenets, provides insights about implementation challenges and suggestions for improvements.

READ FULL TEXT

page 2

page 9

page 16

page 17

page 18

research
09/28/2022

That Depends – Assessing User Perceptions of Authentication Schemes across Contexts of Use

Choosing authentication schemes for a specific purpose is challenging fo...
research
05/20/2021

Combining PIN and Biometric Identifications as Enhancement to User Authentication in Internet Banking

Internet banking (IB) continues to face security concerns arising from i...
research
07/02/2018

Tap-based User Authentication for Smartwatches

This paper presents TapMeIn, an eyes-free, two-factor authentication met...
research
05/05/2023

Multimodal User Authentication in Smart Environments: Survey of User Attitudes

As users shift from interacting actively with devices with screens to in...
research
07/18/2020

A Comprehensive Survey of Aadhar and Security Issues

The concept of Aadhaar came with the need for a unique identity for ever...
research
06/15/2020

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Implicit authentication (IA) is gaining popularity over recent years due...
research
09/24/2017

Changing users' security behaviour towards security questions: A game based learning approach

Fallback authentication is used to retrieve forgotten passwords. Securit...

Please sign up or login with your details

Forgot password? Click here to reset