{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:40:05Z","timestamp":1750506005942,"version":"3.41.0"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01065-5","type":"journal-article","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T20:20:10Z","timestamp":1747945210000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones"],"prefix":"10.1007","volume":"24","author":[{"given":"Palash","family":"Ray","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Giri","sequence":"additional","affiliation":[]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[]},{"given":"Manasi","family":"Jana","sequence":"additional","affiliation":[]},{"given":"Mahuya","family":"Sasmal","sequence":"additional","affiliation":[]},{"given":"Mohammed J. F.","family":"Alenazi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,22]]},"reference":[{"key":"1065_CR1","doi-asserted-by":"crossref","unstructured":"Eljetlawi, A.\u00a0M., Ithnin, N.: \u201cGraphical password: Comprehensive study of the usability features of the recognition base graphical password methods,\u201d in 2008 Third International Conference on Convergence and Hybrid Information Technology, 2, 1137\u20131143 (2008) IEEE","DOI":"10.1109\/ICCIT.2008.20"},{"issue":"2","key":"1065_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10207-022-00642-2","volume":"22","author":"P Andriotis","year":"2023","unstructured":"Andriotis, P., Kirby, M., Takasu, A.: Bu-dash: a universal and dynamic graphical password scheme (extended version). International Journal of Information Security 22(2), 381\u2013401 (2023)","journal-title":"International Journal of Information Security"},{"key":"1065_CR3","doi-asserted-by":"crossref","unstructured":"Gao, H., Liu, X., Wang, S., Liu, H., Dai, R.: \u201cDesign and analysis of a graphical password scheme,\u201d in 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), pp.\u00a0675\u2013678, IEEE, (2009)","DOI":"10.1109\/ICICIC.2009.158"},{"issue":"1\u20132","key":"1065_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: Design and longitudinal evaluation of a graphical password system. International journal of human-computer studies 63(1\u20132), 102\u2013127 (2005)","journal-title":"International journal of human-computer studies"},{"key":"1065_CR5","unstructured":"Suo, X., Zhu, Y., Owen, G.\u00a0S.: \u201cGraphical passwords: A survey,\u201d in 21st Annual computer security applications conference (ACSAC\u201905), pp.\u00a010\u2013pp, IEEE, (2005)"},{"issue":"6","key":"1065_CR6","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1007\/s10207-023-00722-x","volume":"22","author":"N Ibrahim","year":"2023","unstructured":"Ibrahim, N., Sellahewa, H.: A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android pattern unlock. International Journal of Information Security 22(6), 1849\u20131863 (2023)","journal-title":"International Journal of Information Security"},{"key":"1065_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10207-013-0216-7","volume":"13","author":"T-S Wu","year":"2014","unstructured":"Wu, T.-S., Lee, M.-L., Lin, H.-Y., Wang, C.-Y.: Shoulder-surfing-proof graphical password authentication scheme. International journal of information security 13, 245\u2013254 (2014)","journal-title":"International journal of information security"},{"key":"1065_CR8","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE access 7, 5994\u20136009 (2018)","journal-title":"IEEE access"},{"issue":"3","key":"1065_CR9","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2014","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials 17(3), 1268\u20131293 (2014)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"1065_CR10","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TIM.2009.2028773","volume":"59","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Zhang, D.: Improving biometric authentication performance from the user quality. IEEE transactions on instrumentation and measurement 59(3), 730\u2013735 (2009)","journal-title":"IEEE transactions on instrumentation and measurement"},{"issue":"11","key":"1065_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"AK Jain","year":"2012","unstructured":"Jain, A.K., Nandakumar, K.: Biometric authentication: System security and user privacy. Computer 45(11), 87\u201392 (2012)","journal-title":"Computer"},{"issue":"4","key":"1065_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.5626\/JCSE.2020.14.4.163","volume":"14","author":"TI Shammee","year":"2020","unstructured":"Shammee, T.I., Akter, T., Mou, M., Chowdhury, F., Ferdous, M.S.: A systematic literature review of graphical password schemes. Journal of Computing Science and Engineering 14(4), 163\u2013185 (2020)","journal-title":"Journal of Computing Science and Engineering"},{"issue":"4","key":"1065_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR) 44(4), 1\u201341 (2012)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1065_CR14","doi-asserted-by":"crossref","unstructured":"Ray, P., Bera, A., Giri, D., Bhattacharjee, D.: \u201cStyle matching captcha: match neural transferred styles to thwart intelligent attacks,\u201d Multimedia Systems, pp.\u00a01\u201331, (2023)","DOI":"10.21203\/rs.3.rs-2769420\/v1"},{"issue":"4","key":"1065_CR15","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/THMS.2015.2504101","volume":"46","author":"M Martinez-Diaz","year":"2015","unstructured":"Martinez-Diaz, M., Fierrez, J., Galbally, J.: Graphical password-based user authentication with free-form doodles. IEEE Transactions on Human-Machine Systems 46(4), 607\u2013614 (2015)","journal-title":"IEEE Transactions on Human-Machine Systems"},{"issue":"4","key":"1065_CR16","first-page":"744","volume":"3","author":"EA Kumar","year":"2014","unstructured":"Kumar, E.A., Bilandi, E.N.: A graphical password based authentication based system for mobile devices. International Journal of Computer Science and Mobile Computing 3(4), 744\u2013754 (2014)","journal-title":"International Journal of Computer Science and Mobile Computing"},{"issue":"1","key":"1065_CR17","first-page":"508","volume":"11","author":"M Sasmal","year":"2020","unstructured":"Sasmal, M., Ray, P., Sen, M., Mukherjee, R., Bandyopadhyay, S.: A brief review on text and image captcha. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11(1), 508\u2013526 (2020)","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"1065_CR18","doi-asserted-by":"crossref","unstructured":"Khan, W.\u00a0Z., Aalsalem, M.\u00a0Y., Xiang, Y.: \u201cA graphical password based system for small mobile devices,\u201d arXiv preprint arXiv:1110.3844, (2011)","DOI":"10.1007\/978-3-642-24669-2_15"},{"key":"1065_CR19","doi-asserted-by":"crossref","unstructured":"Ray, P., Mukherjee, R., Giri, D., Sasmal, M.: \u201cSmartgp: A framework for a two-factor graphical password authentication using smart devices,\u201d in International Conference on Frontiers in Computing and Systems, pp.\u00a0231\u2013240, Springer, (2022)","DOI":"10.1007\/978-981-99-2680-0_21"},{"key":"1065_CR20","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.\u00a0A.: \u201cAre passfaces more usable than passwords? a field trial investigation,\u201d in People and computers XIV-usability or else! Proceedings of HCI 2000, pp.\u00a0405\u2013424, Springer, (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"1065_CR21","unstructured":"Lashkari, A.\u00a0H., Farmand, S., Zakaria, D.\u00a0O.\u00a0B., Saleh, D.\u00a0R.: \u201cShoulder surfing attack in graphical password authentication,\u201d arXiv preprint arXiv:0912.0951, (2009)"},{"issue":"2 Part 1","key":"1065_CR22","first-page":"437","volume":"10","author":"HK Sarohi","year":"2013","unstructured":"Sarohi, H.K., Khan, F.U.: Graphical password authentication schemes: current status and key issues. International Journal of Computer Science Issues (IJCSI) 10(2 Part 1), 437 (2013)","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"1065_CR23","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s10207-019-00429-y","volume":"18","author":"M Y\u0131ld\u0131r\u0131m","year":"2019","unstructured":"Y\u0131ld\u0131r\u0131m, M., Mackie, I.: Encouraging users to improve password security and memorability. International Journal of Information Security 18, 741\u2013759 (2019)","journal-title":"International Journal of Information Security"},{"key":"1065_CR24","doi-asserted-by":"crossref","unstructured":"Ray, P., Giri, D., Meng, W., Hore, S.: \u201cGpod: An efficient and secure graphical password authentication system by fast object detection,\u201d Multimedia Tools and Applications, pp.\u00a01\u201350, (2023)","DOI":"10.1007\/s11042-023-17571-4"},{"key":"1065_CR25","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10207-011-0147-0","volume":"10","author":"JC Gyorffy","year":"2011","unstructured":"Gyorffy, J.C., Tappenden, A.F., Miller, J.: Token-based graphical password authentication. International Journal of Information Security 10, 321\u2013336 (2011)","journal-title":"International Journal of Information Security"},{"key":"1065_CR26","unstructured":"Dhamija, R., Perrig, A.: \u201cDeja $$\\{$$Vu\u2013A$$\\}$$ user study: Using images for authentication,\u201d in 9th USENIX Security Symposium (USENIX Security 00), (2000)"},{"issue":"1","key":"1065_CR27","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2003.1186723","volume":"2","author":"T Pering","year":"2003","unstructured":"Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. IEEE Pervasive Computing 2(1), 30\u201336 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"1065_CR28","first-page":"11","volume":"13","author":"D Davis","year":"2004","unstructured":"Davis, D., Monrose, F., Reiter, M.K., et al.: On user choice in graphical password schemes. USENIX security symposium 13, 11\u201311 (2004)","journal-title":"USENIX security symposium"},{"key":"1065_CR29","unstructured":"Sobrado, L. Birget, J.-C.: \u201cGraphical passwords,\u201d The Rutger Scholar, vol.\u00a04, (2002)"},{"key":"1065_CR30","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: \u201cS3pas: A scalable shoulder-surfing resistant textual-graphical password authentication scheme,\u201d in 21st international conference on advanced information networking and applications workshops (AINAW\u201907), 2, 467\u2013472, IEEE, (2007)","DOI":"10.1109\/AINAW.2007.317"},{"issue":"1\u20132","key":"1065_CR31","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A De Angeli","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. International journal of human-computer studies 63(1\u20132), 128\u2013152 (2005)","journal-title":"International journal of human-computer studies"},{"key":"1065_CR32","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.-C.: \u201cDesign and evaluation of a shoulder-surfing resistant graphical password scheme,\u201d in Proceedings of the working conference on Advanced visual interfaces, pp.\u00a0177\u2013184, (2006)","DOI":"10.1145\/1133265.1133303"},{"key":"1065_CR33","doi-asserted-by":"crossref","unstructured":"Weinshall, D.: \u201cCognitive authentication schemes safe against spyware,\u201d in 2006 IEEE Symposium on Security and Privacy (S &P\u201906), pp.\u00a06\u2013pp, IEEE, (2006)","DOI":"10.1109\/SP.2006.10"},{"key":"1065_CR34","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: \u201cUse your illusion: secure authentication usable anywhere,\u201d in Proceedings of the 4th Symposium on Usable Privacy and Security, pp.\u00a035\u201345, (2008)","DOI":"10.1145\/1408664.1408670"},{"key":"1065_CR35","doi-asserted-by":"crossref","unstructured":"Gao, H., Liu, X., Dai, R., Wang, S., Chang, X.: \u201cAnalysis and evaluation of the colorlogin graphical password scheme,\u201d in 2009 Fifth International Conference on Image and Graphics, pp.\u00a0722\u2013727, IEEE, (2009)","DOI":"10.1109\/ICIG.2009.62"},{"key":"1065_CR36","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.\u00a0K., Rubin, A.: \u201cThe design and analysis of graphical passwords,\u201d in 8th USENIX Security Symposium (USENIX Security 99), (1999)"},{"key":"1065_CR37","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: \u201cDo background images improve\u201d draw a secret\u201d graphical passwords?,\u201d in Proceedings of the 14th ACM conference on Computer and communications security, pp.\u00a036\u201347, (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"1065_CR38","unstructured":"Varenhorst, C., Kleek, M., Rudolph, L.: \u201cPassdoodles: A lightweight authentication method,\u201d Research Science Institute, pp.\u00a01\u201311, (2004)"},{"key":"1065_CR39","doi-asserted-by":"crossref","unstructured":"Goldberg, J., Hagman, J., Sazawal, V.: \u201cDoodling our way to better authentication,\u201d in CHI\u201902 extended abstracts on Human factors in computing systems, pp.\u00a0868\u2013869, (2002)","DOI":"10.1145\/506443.506639"},{"key":"1065_CR40","doi-asserted-by":"crossref","unstructured":"Weiss, R. De\u00a0Luca, A.: \u201cPassshapes: utilizing stroke based authentication to increase password memorability,\u201d in Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, pp.\u00a0383\u2013392, (2008)","DOI":"10.1145\/1463160.1463202"},{"issue":"2","key":"1065_CR41","first-page":"273","volume":"7","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-go: A proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 7(2), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"1065_CR42","doi-asserted-by":"crossref","unstructured":"Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: \u201cYagp: Yet another graphical password strategy,\u201d in 2008 Annual computer security applications conference (ACSAC), pp.\u00a0121\u2013129, IEEE, (2008)","DOI":"10.1109\/ACSAC.2008.19"},{"key":"1065_CR43","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2017.01.008","volume":"66","author":"T Van Nguyen","year":"2017","unstructured":"Van Nguyen, T., Sae-Bae, N., Memon, N.: Draw-a-pin: Authentication using finger-drawn pin on touch devices. computers & security 66, 115\u2013128 (2017)","journal-title":"computers & security"},{"key":"1065_CR44","doi-asserted-by":"crossref","unstructured":"Meng, W.: \u201cRoutemap: a route and map based graphical password scheme for better multiple password memory,\u201d in Network and System Security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings 9, pp.\u00a0147\u2013161, Springer, (2015)","DOI":"10.1007\/978-3-319-25645-0_10"},{"key":"1065_CR45","unstructured":"Blonder, G.\u00a0E.: \u201cGraphical password, us patent 5559961,\u201d (1996)"},{"key":"1065_CR46","unstructured":"Renaud, K., Smith, E.: \u201cJiminy: helping users to remember their passwords,\u201d in Annual Conference of the South African Institute of Computer Scientists and Information Technologists, vol.\u00a0117, (2001)"},{"issue":"7","key":"1065_CR47","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.4304\/jsw.8.7.1678-1698","volume":"8","author":"H Gao","year":"2013","unstructured":"Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), 1678\u20131698 (2013)","journal-title":"J. Softw."},{"key":"1065_CR48","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Van\u00a0Oorschot, P.\u00a0C., Biddle, R.: \u201cGraphical password authentication using cued click points,\u201d in Computer Security\u2013ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007. Proceedings 12, pp.\u00a0359\u2013374, Springer, (2007)","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"1065_CR49","volume-title":"\u201cInfluencing users towards better passwords: persuasive cued click-points,\u201d in People and Computers XXII Culture, Creativity","author":"S Chiasson","year":"2008","unstructured":"Chiasson, S., Forget, A., Biddle, R., Van Oorschot, P.C.: \u201cInfluencing users towards better passwords: persuasive cued click-points,\u2019\u2019 in People and Computers XXII Culture, Creativity. BCS Learning & Development, Interaction (2008)"},{"key":"1065_CR50","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.procs.2016.03.071","volume":"79","author":"K Patra","year":"2016","unstructured":"Patra, K., Nemade, B., Mishra, D.P., Satapathy, P.P.: Cued-click point graphical password using circular tolerance to increase password space and persuasive features. Procedia Computer Science 79, 561\u2013568 (2016)","journal-title":"Procedia Computer Science"},{"key":"1065_CR51","doi-asserted-by":"crossref","unstructured":"Ratchasan, T., Wiangsripanawan, R.: \u201cHapticpoints: the extended passpoints graphical password,\u201d in Information Security Applications: 19th International Conference, WISA 2018, Jeju Island, Korea, August 23\u201325, 2018, Revised Selected Papers 19, pp.\u00a016\u201328, Springer, (2019)","DOI":"10.1007\/978-3-030-17982-3_2"},{"key":"1065_CR52","doi-asserted-by":"crossref","unstructured":"Sun, H.-M., Chen, Y.-H., Fang, C.-C., Chang, S.-Y.: \u201cPassmap: a map based graphical-password authentication system,\u201d in Proceedings of the 7th ACM symposium on information, computer and communications security, pp.\u00a099\u2013100, (2012)","DOI":"10.1145\/2414456.2414513"},{"issue":"2","key":"1065_CR53","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2011","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R., Van Oorschot, P.C.: Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE transactions on dependable and secure computing 9(2), 222\u2013235 (2011)","journal-title":"IEEE transactions on dependable and secure computing"},{"key":"1065_CR54","doi-asserted-by":"crossref","unstructured":"Yan, J. El\u00a0Ahmad, A.\u00a0S.: \u201cA low-cost attack on a microsoft captcha,\u201d in Proceedings of the 15th ACM conference on Computer and communications security, pp.\u00a0543\u2013554, (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"1065_CR55","doi-asserted-by":"crossref","unstructured":"Chen, Y.-L., Ku, W.-C., Yeh, Y.-C., Liao, D.-M.: \u201cA simple text-based shoulder surfing resistant graphical password scheme,\u201d in 2013 International Symposium on Next-Generation Electronics, pp.\u00a0161\u2013164, IEEE, (2013)","DOI":"10.1109\/ISNE.2013.6512317"},{"key":"1065_CR56","unstructured":"Man, S., Hong, D., Matthews, M.\u00a0M.: \u201cA shoulder-surfing resistant graphical password scheme-wiw.,\u201d in Security and Management, pp.\u00a0105\u2013111, (2003)"},{"key":"1065_CR57","doi-asserted-by":"crossref","unstructured":"Wang, L., Chang, X., Ren, Z., Gao, H., Liu, X., Aickelin, U.: \u201cAgainst spyware using captcha in graphical password scheme,\u201d in 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.\u00a0760\u2013767, IEEE, (2010)","DOI":"10.1109\/AINA.2010.46"},{"key":"1065_CR58","doi-asserted-by":"publisher","first-page":"166043","DOI":"10.1109\/ACCESS.2019.2948977","volume":"7","author":"S Azad","year":"2019","unstructured":"Azad, S., Nordin, N.E.A.C., Ab Rasul, N.N., Mahmud, M., Zamli, K.Z.: A secure hybrid authentication scheme using passpoints and press touch code. IEEE Access 7, 166043\u2013166053 (2019)","journal-title":"IEEE Access"},{"key":"1065_CR59","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G.: \u201cComplexity metrics and user strength perceptions of the pattern-lock graphical authentication method,\u201d in Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2, pp.\u00a0115\u2013126, Springer, (2014)","DOI":"10.1007\/978-3-319-07620-1_11"},{"key":"1065_CR60","doi-asserted-by":"crossref","unstructured":"Dirik, A.\u00a0E., Memon, N., Birget, J.-C.: \u201cModeling user choice in the passpoints graphical password scheme,\u201d in Proceedings of the 3rd symposium on Usable privacy and security, pp.\u00a020\u201328, (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"1065_CR61","doi-asserted-by":"crossref","unstructured":"De\u00a0Luca, A., Weiss, R., Drewes, H.: \u201cEvaluation of eye-gaze interaction methods for security enhanced pin-entry,\u201d in Proceedings of the 19th australasian conference on computer-human interaction: Entertaining user interfaces, pp.\u00a0199\u2013202, (2007)","DOI":"10.1145\/1324892.1324932"},{"key":"1065_CR62","first-page":"1","volume":"15","author":"S Chiasson","year":"2006","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: A usability study and critique of two password managers. USENIX Security Symposium 15, 1\u201316 (2006)","journal-title":"USENIX Security Symposium"},{"issue":"5","key":"1065_CR63","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"T-Y Chang","year":"2012","unstructured":"Chang, T.-Y., Tsai, C.-J., Lin, J.-H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. Journal of Systems and Software 85(5), 1157\u20131165 (2012)","journal-title":"Journal of Systems and Software"},{"key":"1065_CR64","doi-asserted-by":"crossref","unstructured":"Yu, Z., Olade, I., Liang, H.-N., Fleming, C.: \u201cUsable authentication mechanisms for mobile devices: An exploration of 3d graphical passwords,\u201d in 2016 International Conference on Platform Technology and Service (PlatCon), pp.\u00a01\u20133, IEEE, (2016)","DOI":"10.1109\/PlatCon.2016.7456837"},{"key":"1065_CR65","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.cose.2017.05.006","volume":"70","author":"X Yu","year":"2017","unstructured":"Yu, X., Wang, Z., Li, Y., Li, L., Zhu, W.T., Song, L.: Evopass: Evolvable graphical password against shoulder-surfing attacks. Computers & Security 70, 179\u2013198 (2017)","journal-title":"Computers & Security"},{"key":"1065_CR66","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.compeleceng.2016.12.007","volume":"59","author":"S Azad","year":"2017","unstructured":"Azad, S., Rahman, M., Ranak, M.N., Ruhee, B.K., Nisa, N.N., Kabir, N., Rahman, A., Zain, J.M.: Vap code: A secure graphical password for smart devices. Computers & Electrical Engineering 59, 99\u2013109 (2017)","journal-title":"Computers & Electrical Engineering"},{"issue":"4.31","key":"1065_CR67","doi-asserted-by":"publisher","first-page":"400","DOI":"10.14419\/ijet.v7i4.31.23719","volume":"7","author":"NS Zabidi","year":"2018","unstructured":"Zabidi, N.S., Norowi, N.M., Rahmat, R.W.O.: A usability evaluation of image and emojis in graphical password. International Journal of Engineering & Technology 7(4.31), 400\u2013407 (2018)","journal-title":"International Journal of Engineering & Technology"},{"issue":"1","key":"1065_CR68","first-page":"23","volume":"13","author":"S Ahmad","year":"2018","unstructured":"Ahmad, S., Boukari, S., Dogo, S.H., Mohammed, A.: An improved map based graphical android authentication system. Science World Journal 13(1), 23\u201327 (2018)","journal-title":"Science World Journal"},{"key":"1065_CR69","doi-asserted-by":"crossref","unstructured":"Chithra, P., Sathya, K.: \u201cPristine pixcaptcha as graphical password for secure ebanking using gaussian elimination and cleaves algorithm,\u201d in 2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP), pp.\u00a01\u20136, IEEE, (2018)","DOI":"10.1109\/ICCCSP.2018.8452829"},{"key":"1065_CR70","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ijcci.2018.06.003","volume":"18","author":"H Assal","year":"2018","unstructured":"Assal, H., Imran, A., Chiasson, S.: An exploration of graphical password authentication for children. International Journal of Child-Computer Interaction 18, 37\u201346 (2018)","journal-title":"International Journal of Child-Computer Interaction"},{"key":"1065_CR71","doi-asserted-by":"crossref","unstructured":"Meng, W., Fei, F., Jiang, L., Liu, Z., Su, C., Han, J.: \u201cCpmap: design of click-points map-based graphical password authentication,\u201d in ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings 33, pp.\u00a018\u201332, Springer, (2018)","DOI":"10.1007\/978-3-319-99828-2_2"},{"issue":"2","key":"1065_CR72","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TCE.2019.2895715","volume":"65","author":"MA Khan","year":"2019","unstructured":"Khan, M.A., Din, I.U., Jadoon, S.U., Khan, M.K., Guizani, M., Awan, K.A.: G-rat| a novel graphical randomized authentication technique for consumer smart devices. IEEE Transactions on Consumer Electronics 65(2), 215\u2013223 (2019)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"1065_CR73","doi-asserted-by":"crossref","unstructured":"joo Fong, T., Abdullah, A., Jhanjhi, N., Supramaniam, M.: \u201cThe coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices,\u201d International Journal of Advanced Computer Science and Applications, 10(1), (2019)","DOI":"10.14569\/IJACSA.2019.0100140"},{"issue":"1","key":"1065_CR74","first-page":"68","volume":"13","author":"KH Al-Shqeerat","year":"2021","unstructured":"Al-Shqeerat, K.H., Abuzanouneh, K.I.: A hybrid graphical user authentication scheme in mobile cloud computing environments. International Journal of Communication Networks and Information Security 13(1), 68\u201375 (2021)","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"1065_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102591","volume":"55","author":"W Li","year":"2020","unstructured":"Li, W., Wang, Y., Li, J., Xiang, Y.: Toward supervised shape-based behavioral authentication on smartphones. Journal of Information Security and Applications 55, 102591 (2020)","journal-title":"Journal of Information Security and Applications"},{"key":"1065_CR76","doi-asserted-by":"crossref","unstructured":"Gugenheimer, J., De\u00a0Luca, A., Hess, H., Karg, S., Wolf, D., Rukzio, E.: \u201cColorsnakes: Using colored decoys to secure authentication in sensitive contexts,\u201d in Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, pp.\u00a0274\u2013283, (2015)","DOI":"10.1145\/2785830.2785834"},{"key":"1065_CR77","doi-asserted-by":"crossref","unstructured":"De\u00a0Luca, A., Harbach, M., von Zezschwitz, E., Maurer, M.-E., Slawik, B.\u00a0E., Hussmann, H., Smith, M.: \u201cNow you see me, now you don\u2019t: protecting smartphone authentication from shoulder surfers,\u201d in Proceedings of the sigchi conference on human factors in computing systems, pp.\u00a02937\u20132946, (2014)","DOI":"10.1145\/2556288.2557097"},{"key":"1065_CR78","doi-asserted-by":"crossref","unstructured":"Von\u00a0Zezschwitz, E., De\u00a0Luca, A., Brunkow, B., Hussmann, H.: \u201cSwipin: Fast and secure pin-entry on smartphones,\u201d in Proceedings of the 33rd annual acm conference on human factors in computing systems, pp.\u00a01403\u20131406, (2015)","DOI":"10.1145\/2702123.2702212"},{"key":"1065_CR79","doi-asserted-by":"crossref","unstructured":"Titcomb, A.\u00a0L., Reyna, V.\u00a0F.: \u201cMemory interference and misinformation effects,\u201d Interference and inhibition in cognition, pp.\u00a0263\u2013294, (1995)","DOI":"10.1016\/B978-012208930-5\/50009-X"},{"key":"1065_CR80","doi-asserted-by":"crossref","unstructured":"Everitt, K.\u00a0M., Bragin, T., Fogarty, J., Kohno, T.: \u201cA comprehensive study of frequency, interference, and training of multiple graphical passwords,\u201d in Proceedings of the SIGCHI conference on Human factors in computing systems, pp.\u00a0889\u2013898, (2009)","DOI":"10.1145\/1518701.1518837"},{"issue":"4","key":"1065_CR81","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1006\/ijhc.1996.0101","volume":"46","author":"JM Carroll","year":"1997","unstructured":"Carroll, J.M.: Human-computer interaction: Psychology as a science of design. International journal of human-computer studies 46(4), 501\u2013522 (1997)","journal-title":"International journal of human-computer studies"},{"key":"1065_CR82","doi-asserted-by":"crossref","unstructured":"Menezes, A.\u00a0J., Van\u00a0Oorschot, P.\u00a0C., Vanstone, S.\u00a0A.: Handbook of applied cryptography. CRC press, (2018)","DOI":"10.1201\/9781439821916"},{"key":"1065_CR83","unstructured":"Aviv, A.\u00a0J., Gibson, K., Mossop, E., Blaze, M., Smith, J.\u00a0M.: \u201cSmudge attacks on smartphone touch screens,\u201d in 4th USENIX workshop on offensive technologies (WOOT 10), (2010)"},{"issue":"3","key":"1065_CR84","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSECP.2003.1203228","volume":"1","author":"SW Smith","year":"2003","unstructured":"Smith, S.W.: Humans in the loop: Human-computer interaction and security. IEEE Security & privacy 1(3), 75\u201379 (2003)","journal-title":"IEEE Security & privacy"},{"key":"1065_CR85","doi-asserted-by":"crossref","unstructured":"Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: \u201cA new graphical password scheme resistant to shoulder-surfing,\u201d in 2010 International Conference on Cyberworlds, pp.\u00a0194\u2013199, IEEE, (2010)","DOI":"10.1109\/CW.2010.34"},{"issue":"4","key":"1065_CR86","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3233\/JCS-2010-0411","volume":"19","author":"PC van Oorschot","year":"2011","unstructured":"van Oorschot, P.C., Thorpe, J.: Exploiting predictability in click-based graphical passwords. Journal of Computer Security 19(4), 669\u2013702 (2011)","journal-title":"Journal of Computer Security"},{"key":"1065_CR87","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio, D., Herley, C.: \u201cWhere do security policies come from?,\u201d in Proceedings of the Sixth Symposium on Usable Privacy and Security, pp.\u00a01\u201314, (2010)","DOI":"10.1145\/1837110.1837124"},{"issue":"12","key":"1065_CR88","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40\u201346 (1999)","journal-title":"Communications of the ACM"},{"key":"1065_CR89","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van\u00a0Oorschot, P.\u00a0C., Stajano, F.: \u201cThe quest to replace passwords: A framework for comparative evaluation of web authentication schemes,\u201d in 2012 IEEE symposium on security and privacy, pp.\u00a0553\u2013567, IEEE, (2012)","DOI":"10.1109\/SP.2012.44"},{"issue":"10","key":"1065_CR90","doi-asserted-by":"publisher","first-page":"168","DOI":"10.3390\/fi12100168","volume":"12","author":"R Alabdan","year":"2020","unstructured":"Alabdan, R.: Phishing attacks survey: Types, vectors, and technical approaches. Future internet 12(10), 168 (2020)","journal-title":"Future internet"},{"key":"1065_CR91","unstructured":"Godi, M., Joppi, C., Giachetti, A., Pellacini, F., Cristani, M.: \u201cTexel-att: Representing and classifying element-based textures by attributes,\u201d arXiv preprint arXiv:1908.11127, (2019)"},{"key":"1065_CR92","doi-asserted-by":"crossref","unstructured":"Zhu, J.-Y., Park, T., Isola, P., Efros, A.\u00a0A.: \u201cUnpaired image-to-image translation using cycle-consistent adversarial networks,\u201d in Proceedings of the IEEE international conference on computer vision, pp.\u00a02223\u20132232, (2017)","DOI":"10.1109\/ICCV.2017.244"},{"key":"1065_CR93","doi-asserted-by":"crossref","unstructured":"Gatys, L.\u00a0A., Ecker, A.\u00a0S., Bethge, M.: \u201cImage style transfer using convolutional neural networks,\u201d in Proceedings of the IEEE conference on computer vision and pattern recognition, pp.\u00a02414\u20132423, (2016)","DOI":"10.1109\/CVPR.2016.265"},{"key":"1065_CR94","doi-asserted-by":"publisher","first-page":"131583","DOI":"10.1109\/ACCESS.2021.3112996","volume":"9","author":"A Singh","year":"2021","unstructured":"Singh, A., Jaiswal, V., Joshi, G., Sanjeeve, A., Gite, S., Kotecha, K.: Neural style transfer: A critical review. IEEE Access 9, 131583\u2013131613 (2021)","journal-title":"IEEE Access"},{"issue":"8","key":"1065_CR95","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE transactions on circuits and systems for video technology 13(8), 890\u2013896 (2003)","journal-title":"IEEE transactions on circuits and systems for video technology"},{"issue":"3","key":"1065_CR96","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Transactions on circuits and systems for video technology 16(3), 354\u2013362 (2006)","journal-title":"IEEE Transactions on circuits and systems for video technology"},{"issue":"12","key":"1065_CR97","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.-Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Transactions on image processing 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Transactions on image processing"},{"key":"1065_CR98","doi-asserted-by":"publisher","first-page":"27290","DOI":"10.1109\/ACCESS.2023.3258461","volume":"11","author":"M Fan","year":"2023","unstructured":"Fan, M., Zhong, S., Xiong, X.: Reversible data hiding method for interpolated images based on modulo operation and prediction-error expansion. IEEE Access 11, 27290\u201327302 (2023)","journal-title":"IEEE Access"},{"issue":"2","key":"1065_CR99","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K-H Jung","year":"2009","unstructured":"Jung, K.-H., Yoo, K.-Y.: Data hiding method using image interpolation. Computer Standards & Interfaces 31(2), 465\u2013470 (2009)","journal-title":"Computer Standards & Interfaces"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01065-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01065-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01065-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:02:48Z","timestamp":1750503768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01065-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,22]]},"references-count":99,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1065"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01065-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,5,22]]},"assertion":[{"value":"22 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"138"}}