Using icon arrangement for fallback authentication on smartphones.
Alina HangAlexander De LucaHeinrich HussmannPublished in: CHI Extended Abstracts (2014)
Keyphrases
- biometric authentication
- mobile devices
- mobile applications
- image authentication
- identity authentication
- semi fragile watermarking
- authentication protocol
- daily life
- security analysis
- digital watermarking
- signature verification
- security mechanisms
- desktop computers
- authentication scheme
- identity management
- keystroke dynamics
- fragile watermarking
- augmented reality
- biometric data
- mobile phone
- tablet computers
- database