{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:29:10Z","timestamp":1759332550022,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493417"},{"type":"electronic","value":"9783030493424"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49342-4_4","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:49:30Z","timestamp":1597405770000},"page":"35-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Visual Password Scheme Using Bag Context Shape Grammars"],"prefix":"10.1007","author":[{"given":"Blessing","family":"Ogbuokiri","sequence":"first","affiliation":[]},{"given":"Mpho","family":"Raborife","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"key":"4_CR1","volume-title":"Human Computer Interaction","author":"D Alan","year":"2004","unstructured":"Alan, D., Finaly, J., Abowd, G.D., Russel, B.: Human Computer Interaction. Pearson Prentice Hall, Upper Saddle River (2004)"},{"key":"4_CR2","unstructured":"Awais, A., Muhammad, A., Kashif, H.M., Ramzan, T.: Secure graphical password techniques against shoulder surfing and camera based attacks. In: International Journal of Computer Network and Information Security, November 2016, pp. 11\u201318. IEEE (2016)"},{"key":"4_CR3","unstructured":"Commission, U.F.T., et al.: Consumer sentinel network data book for January-December 2014 (2015)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Drewes, F., Du\u00a0Toit, C., Ewert, S., Van Der\u00a0Merwe, B., Van Der\u00a0Walt, A.P.: Bag context tree grammars. In: Developments in Language Theory, pp. 226\u2013237. Springer (2006)","DOI":"10.1007\/11779148_21"},{"key":"4_CR5","unstructured":"Haichang, G., Xiyang, L., Sidong, W., Honggang, L., Ruyi, D.: Design and analysis of a graphical password scheme. In: Fourth International Conference on Innovative Computing, Information and Control, pp. 675\u2013678. IEEE (2009)"},{"key":"4_CR6","unstructured":"Haichang, G., Zhongjie, R., Xiuling, C., Liu, X., Uwe, A.: A new graphical password scheme resistant to shoulder-surfing. In: 2010 International Conference on Cyberworlds, pp. 18\u201323. IEEE (2010)"},{"key":"4_CR7","unstructured":"Hassanat, A.B.: Visual passwords using automatic lip reading. arXiv preprint arXiv:1409.0924 (2014)"},{"key":"4_CR8","unstructured":"International-Telecommunication-Union: Series E: overall network operation, telephone service, service operation and human factors. Telecommunication Standardization Sector of ITU, pp. 1\u201314 (2004)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, T., Li, M., Ravikumar, B., Regan, K.W.: Formal grammars and languages. In: Algorithms and Theory of Computation Handbook, pp. 20\u201320. Chapman & Hall\/CRC (2010)","DOI":"10.1201\/9781584888239-c20"},{"key":"4_CR10","unstructured":"Kara, M.: Identity theft in United States of America, Bureau of justice statistics, US (2015). http:\/\/www.ojp.gov\/"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Katsini, C., Fidas, C., Raptis, G.E., Belk, M., Samaras, G., Avouris, N.: Influences of human cognition and visual behavior on password strength during picture password composition. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, pp. 73\u201387. no. 87. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3173661","DOI":"10.1145\/3173574.3173661"},{"key":"4_CR12","volume-title":"The Design of Everyday Things: Revised and Expanded Edition","author":"DA Norman","year":"2013","unstructured":"Norman, D.A.: The Design of Everyday Things: Revised and Expanded Edition. Basic Books, New York (2013)"},{"key":"4_CR13","unstructured":"Okundaye, B., Ewert, S., Sanders, I.: A novel approach to visual password schemes using tree picture grammars. In: Proceedings of the 2014 PRASA, RobMech and AfLaT International Joint Symposium, pp. 247\u2013252 (2014)"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3758\/BF03331011","volume":"11","author":"A Paivio","year":"1968","unstructured":"Paivio, A., Rogers, T.B., Smythe, P.C.: Why are pictures easier to recall than words? Psychon. Sci. 11(4), 137\u2013138 (1968)","journal-title":"Psychon. Sci."},{"issue":"12","key":"4_CR15","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1610252.1610287","volume":"52","author":"K Renaud","year":"2009","unstructured":"Renaud, K., De Angeli, A.: Visual passwords: cure-all or snake-oil? Commun. ACM 52(12), 135\u2013140 (2009)","journal-title":"Commun. ACM"},{"key":"4_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949","volume-title":"Behavioral Biometrics: A Remote Access Approach","author":"K Revett","year":"2008","unstructured":"Revett, K.: Behavioral Biometrics: A Remote Access Approach. Wiley, Hoboken (2008)"},{"key":"4_CR17","unstructured":"Rob, D.: Identity theft victims statistics. Identity theft and scan prevention services official website (2016). http:\/\/www.identitytheft.info\/victims.aspx"},{"key":"4_CR18","unstructured":"Savvas, A.C., Yiannis, S.B., Mathias, L.: Img(rummager): an interactive content based image retrieval system. In: SISAP 2009 Proceedings of the 2009 Second International Workshop on Similarity Search and Applications, Prague, Czech Republic, 29\u201330 August, pp. 151\u2013153. IEEE Computer Society (2009)"},{"key":"4_CR19","unstructured":"Savvas, A.C., Yiannis, S.B., Mathias, L.: SpCD - spatial color distribution descriptor - a fuzzy rule based compact composite descriptor appropriate for hand drawn color sketches retrieval. In: 2nd International Conference on Agents and Artificial Intelligence, pp. 58\u201363, Artificial Intelligence (2010). http:\/\/hdl.handle.net\/11728\/10155 . Accessed 20 Sept 2018"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Sreelaja, N.K., Sreeja, N.K.: An image edge based approach for image password encryption. In: Security Communication Networks 2017, pp. 5733\u20135745. Wiley Online Library (2017)","DOI":"10.1002\/sec.1732"},{"key":"4_CR22","unstructured":"Stander, A., Dunnet, A., Rizzo, J.: A survey of computer crime and security in South Africa. In: ISSA, pp. 217\u2013226 (2009)"},{"key":"4_CR23","unstructured":"Sternberg, R.J., Sternberg, K.: Cognitive Psychology. Wadsworth (2011)"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102\u2013127 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., WatersLeonardo, J., Birget, S.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2006, Venezia, Italy, 23\u201326 May, pp. 177\u2013184. ACM (2006)","DOI":"10.1145\/1133265.1133303"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49342-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T22:46:28Z","timestamp":1667774788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49342-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030493417","9783030493424"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49342-4_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auburn, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}