A gaze gesture-based user authentication system to counter shoulder-surfing attacks

V Rajanna, S Polsley, P Taele… - Proceedings of the 2017 …, 2017 - dl.acm.org
Shoulder-surfing is the act of spying on an authorized user of a computer system with the
malicious intent of gaining unauthorized access. Current solutions to address shoulder …

Multi-input user authentication on display device

M Scavezze, J Scott, J Steed, I McIntyre… - US Patent …, 2018 - Google Patents
Embodiments are disclosed that relate to authenticating a user of a display device. For
example, one disclosed embodiment includes displaying one or more virtual images on the …

Comparing video based shoulder surfing with live simulation

AJ Aviv, F Wolf, R Kuber - Proceedings of the 34th annual computer …, 2018 - dl.acm.org
We analyze the claims that video recreations of shoulder surfing attacks offer a suitable
alternative and a baseline, as compared to evaluation in a live setting. We recreated a …

EyeDecrypt—Private interactions in plain sight

AG Forte, JA Garay, T Jim, Y Vahlis - … SCN 2014, Amalfi, Italy, September 3 …, 2014 - Springer
We introduce EyeDecrypt, a novel technology for privacy-preserving human-computer
interaction. EyeDecrypt allows only authorized users to decipher data shown on a display …

Private reader: Using eye tracking to improve reading privacy in public spaces

K Ragozin, YS Pai, O Augereau, K Kise… - Proceedings of the 21st …, 2019 - dl.acm.org
Reading in public spaces can often be tricky if we wish to keep the contents away from the
prying eye. We propose Private Reader, an eye-tracking approach towards maintaining …

[PDF][PDF] Novel shoulder-surfing resistant authentication schemes using text-graphical passwords

K Rao, S Yalamanchili - International Journal of Information and …, 2012 - researchgate.net
There are many applications which require the user to be authenticated before being
permitted to perform certain tasks. Text password-based authentication is a popularly used …

The presentation effect on graphical passwords

J Thorpe, M Al-Badawi, B MacRae… - proceedings of the …, 2014 - dl.acm.org
We provide a simple yet powerful demonstration of how an unobtrusive change to a
graphical password interface can modify the distribution of user chosen passwords, and thus …

Safe: Secure authentication with face and eyes

A Boehm, D Chen, M Frank, L Huang… - … on privacy and …, 2013 - ieeexplore.ieee.org
Face authentication is commonly offered as an alternative to passwords for device unlock.
However, available face authentication systems are vulnerable to simple spoofing attacks …

Gazemeter: Exploring the usage of gaze behaviour to enhance password assessments

Y Abdrabou, A Shams, MO Mantawy… - ACM Symposium on …, 2021 - dl.acm.org
We investigate the use of gaze behaviour as a means to assess password strength as
perceived by users. We contribute to the effort of making users choose passwords that are …

Emerging NUI-based methods for user authentication: A new taxonomy and survey

N Sae-Bae, J Wu, N Memon, J Konrad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …