{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:26:39Z","timestamp":1774365999272,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Univ Access Inf Soc"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10209-022-00928-1","type":"journal-article","created":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T16:04:16Z","timestamp":1665504256000},"page":"179-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Picture superiority effect in authentication systems for the blind and visually impaired on a smartphone platform"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4105-1037","authenticated-orcid":false,"given":"Yean Li","family":"Ho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1816-513X","authenticated-orcid":false,"given":"Siong Hoe","family":"Lau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Afizan","family":"Azman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,10,11]]},"reference":[{"issue":"3","key":"928_CR1","first-page":"1","volume":"19","author":"A Khan","year":"2021","unstructured":"Khan, A., Khusro, S.: An insight into smartphone-based assistive solutions for visually impaired and blind people \u2013 issues, challenges and opportunities. Univ. Access Inf. Soc. 19(3), 1\u201325 (2021)","journal-title":"Univ. Access Inf. Soc."},{"key":"928_CR2","unstructured":"Azenkot, S.: Eyes-free input on mobile devices. ProQuest Dissertations and Theses, 148. (2014). https:\/\/digital.lib.washington.edu\/researchworks\/bitstream\/handle\/1773\/27220\/Azenkot_washington_0250E_13766.pdf?sequence=1"},{"issue":"1","key":"928_CR3","doi-asserted-by":"publisher","first-page":"341","DOI":"10.32604\/CSSE.2022.018563","volume":"40","author":"SA Alsuhibany","year":"2022","unstructured":"Alsuhibany, S.A.: Vibration-based pattern password approach for visually impaired people. Comput. Syst. Sci. Eng. 40(1), 341\u2013356 (2022). https:\/\/doi.org\/10.32604\/CSSE.2022.018563","journal-title":"Comput. Syst. Sci. Eng."},{"key":"928_CR4","doi-asserted-by":"publisher","first-page":"e771","DOI":"10.7717\/PEERJ-CS.771","volume":"7","author":"M Al-Razgan","year":"2021","unstructured":"Al-Razgan, M., Almoaiqel, S., Alrajhi, N., Alhumegani, A., Alshehri, A., Alnefaie, B., AlKhamiss, R., Rushdi, S.: A systematic literature review on the usability of mobile applications for visually impaired users. PeerJ Comput. Sci. 7, e771 (2021). https:\/\/doi.org\/10.7717\/PEERJ-CS.771","journal-title":"PeerJ Comput. Sci."},{"key":"928_CR5","unstructured":"Dosono, B., Hayes, J., Wang, Y.: \u201c I\u2019m stuck\u202f!\u201d: A contextual inquiry of people with visual impairments in authentication. 151\u2013168 (2015)"},{"issue":"2","key":"928_CR6","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.48084\/etasr.1895","volume":"8","author":"A Khan","year":"2018","unstructured":"Khan, A., Khusro, S., Alam, I.: BlindSense: an accessibility-inclusive universal user interface for blind people engineering. Technol Appl Sci Res 8(2), 2775\u20132784 (2018). https:\/\/doi.org\/10.48084\/etasr.1895","journal-title":"Technol Appl Sci Res"},{"key":"928_CR7","unstructured":"Belanger, K:. Type in Braille with the TalkBack Braille Keyboard for your android Device (2020) https:\/\/nfb.org\/blog\/type-braille-talkback-braille-keyboard-your-android-device"},{"key":"928_CR8","unstructured":"Olofsson, S.: Designing interfaces for the visually impaired: contextual information and analysis of user needs. Master\u2019s Thesis, Ume\u02daa University (2017)"},{"key":"928_CR9","unstructured":"Alnfiai, M. Accessible Tools on Touchscreen Devices FOR. June (2018)"},{"key":"928_CR10","doi-asserted-by":"publisher","first-page":"0960","DOI":"10.1016\/j.cub.2007.05.060","volume":"1129\u20131133","author":"N Raz","year":"2007","unstructured":"Raz, N., Striem, E., Pundak, G., Orlov, T., Zohary, E.: superior serial memory in the blind: a case of cognitive compensatory adjustment, current biology, 17(13). ISSN 1129\u20131133, 0960\u20139822 (2007). https:\/\/doi.org\/10.1016\/j.cub.2007.05.060","journal-title":"ISSN"},{"key":"928_CR11","doi-asserted-by":"publisher","unstructured":"Kamel, H.M., Landay, J.A.: A study of blind drawing practice. In: Proceedings of the Fourth International ACM Conference on Assistive Technologies - Assets \u201900, 34\u201341 (2002). https:\/\/doi.org\/10.1145\/354324.354334","DOI":"10.1145\/354324.354334"},{"key":"928_CR12","doi-asserted-by":"publisher","unstructured":"Davis, D., Monrose, F., & Reiter, M.: On user choice in graphical password schemes. In Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13, 11. (2004). https:\/\/doi.org\/10.1016\/j.apenergy.2011.11.075","DOI":"10.1016\/j.apenergy.2011.11.075"},{"key":"928_CR13","doi-asserted-by":"publisher","unstructured":"Gloede, M.E., Paulauskas, E.E., Gregg, M.K.: Experience and information loss in auditory and visual memory. 70(7), 1344\u20131352 (2017). https:\/\/doi.org\/10.1080\/17470218.2016. 1183686","DOI":"10.1080\/17470218.2016"},{"issue":"6","key":"928_CR14","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1068\/p3360","volume":"31","author":"D Kaski","year":"2002","unstructured":"Kaski, D.: Revision:is visual perception a requisite for visual imagery? Perception 31(6), 717\u2013731 (2002)","journal-title":"Perception"},{"issue":"22","key":"928_CR15","doi-asserted-by":"publisher","first-page":"4501","DOI":"10.1073\/pnas.1612862114","volume":"114","author":"J van den Hurk","year":"2017","unstructured":"van den Hurk, J., Van Baelen, M., Op de Beeck, H.P.: Development of visual category selectivity in ventral visual cortex does not require visual experience. Proc. Natl Acad. Sci. 114(22), 4501\u20134510 (2017). https:\/\/doi.org\/10.1073\/pnas.1612862114","journal-title":"Proc. Natl Acad. Sci."},{"key":"928_CR16","unstructured":"B\u00e9rtolo, H. Visual imagery without visual perception? 173\u2013188 (2005)"},{"issue":"3","key":"928_CR17","doi-asserted-by":"publisher","first-page":"256","DOI":"10.3758\/BF03213172","volume":"4","author":"RE Gehring","year":"1976","unstructured":"Gehring, R.E., Toglia, M.P., Kimble, G.A.: Recognition memory for words and pictures at short and long retention intervals. Mem. Cognit. 4(3), 256\u2013260 (1976). https:\/\/doi.org\/10.3758\/BF03213172","journal-title":"Mem. Cognit."},{"issue":"1\u20132","key":"928_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A De Angeli","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1\u20132), 128\u2013152 (2005). https:\/\/doi.org\/10.1016\/j.ijhcs.2005.04.020","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2009","key":"928_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cogdev.2009.05.002","volume":"24","author":"M Anne","year":"2014","unstructured":"Anne, M., Russo, R., Louise, P.: The picture superiority effect in recognition memory: a developmental study using the response signal procedure. Cognit. Dev. 24(2009), 265\u2013273 (2014). https:\/\/doi.org\/10.1016\/j.cogdev.2009.05.002","journal-title":"Cognit. Dev."},{"key":"928_CR20","doi-asserted-by":"publisher","DOI":"10.3758\/s13421-010-0015-6","author":"RJ Crutcher","year":"2011","unstructured":"Crutcher, R.J., Beer, J.M.: An auditory analog of the picture superiority effect. Mem. Cognit. (2011). https:\/\/doi.org\/10.3758\/s13421-010-0015-6","journal-title":"Mem. Cognit."},{"issue":"3","key":"928_CR21","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cogdev.2009.05.002","volume":"24","author":"MA Defeyter","year":"2009","unstructured":"Defeyter, M.A., Russo, R., McPartlin, P.L.: The picture superiority effect in recognition memory: a developmental study using the response signal procedure. Cognit. Dev. 24(3), 265\u2013273 (2009). https:\/\/doi.org\/10.1016\/j.cogdev.2009.05.002","journal-title":"Cognit. Dev."},{"key":"928_CR22","doi-asserted-by":"publisher","unstructured":"Oates, J. M.,  Reder, L. M. (2011). Memory for pictures: sometimes a picture is not worth a single word. Successful Remembering and Successful Forgetting: A Festschrift in Honor of Robert A. Bjork, 447\u2013462. https:\/\/doi.org\/10.4324\/9780203842539","DOI":"10.4324\/9780203842539"},{"issue":"8","key":"928_CR23","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/S1364-6613(03)00163-3","volume":"7","author":"FH Lopes da Silva","year":"2003","unstructured":"Lopes da Silva, F.H.: Visual dreams in the congenitally blind\u202f? Trends Cognit. Sci. 7(8), 328\u2013330 (2003). https:\/\/doi.org\/10.1016\/S1364-6613(03)00163-3","journal-title":"Trends Cognit. Sci."},{"issue":"4","key":"928_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3758\/BF03331011","volume":"11","author":"A Paivio","year":"1968","unstructured":"Paivio, A., Rogers, T.B., Smythe, P.C.: Why are pictures easier to recall than words? Psychon. Sci. 11(4), 137\u2013138 (1968). https:\/\/doi.org\/10.3758\/BF03331011","journal-title":"Psychon. Sci."},{"key":"928_CR25","doi-asserted-by":"publisher","unstructured":"Thorpe, J., Van Oorschot, P.C.: (2004). Towards secure design choices for implementing graphical passwords. In: Proceedings\u2014Annual Computer Security Applications Conference, ACSAC, 50\u201360. https:\/\/doi.org\/10.1109\/CSAC.2004.44","DOI":"10.1109\/CSAC.2004.44"},{"key":"928_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2009.158","author":"X Suo","year":"2006","unstructured":"Suo, X.: A design and analysis of graphical password. Inf. Control (2006). https:\/\/doi.org\/10.1109\/ICICIC.2009.158","journal-title":"Inf. Control"},{"key":"928_CR27","doi-asserted-by":"publisher","unstructured":"Lin, P.L., Weng, L.T., Huang, P.W.: Graphical passwords using images with random tracks of geometric shapes. In: Proceedings\u20141st International Congress on Image and Signal Processing, CISP, 3, 27\u201331. (2008). https:\/\/doi.org\/10.1109\/CISP.2008.603","DOI":"10.1109\/CISP.2008.603"},{"issue":"5","key":"928_CR28","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/2078827.2078835","volume":"8","author":"WZ Khan","year":"2011","unstructured":"Khan, W.Z., Aalsalem, M.Y., Xiang, Y.: A graphical password based system for small mobile devices. Int. J. Comput. Sci. Issues 8(5), 145\u2013154 (2011). https:\/\/doi.org\/10.1145\/2078827.2078835","journal-title":"Int. J. Comput. Sci. Issues"},{"issue":"2","key":"928_CR29","first-page":"1","volume":"2","author":"PP Ray","year":"2012","unstructured":"Ray, P.P.: Ray\u2019s scheme: graphical password based hybrid authentication system for smart hand held devices. J. Inf. Eng. Appl. 2(2), 1\u201312 (2012)","journal-title":"J. Inf. Eng. Appl."},{"key":"928_CR30","doi-asserted-by":"publisher","unstructured":"Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS \u201913, 1. (2013). https:\/\/doi.org\/10.1145\/2501604.2501619","DOI":"10.1145\/2501604.2501619"},{"key":"928_CR31","doi-asserted-by":"publisher","unstructured":"B\u00e9rtolo, H.: Visual imagery without visual perception?: Lessons from blind subjects. Second International Conference on Applications of Optics and Photonic, 9286l (2014). https:\/\/doi.org\/10.1117\/12.2066101","DOI":"10.1117\/12.2066101"},{"issue":"4","key":"928_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.4018\/IJMHCI.2015100102","volume":"7","author":"K Said","year":"2015","unstructured":"Said, K., Kuber, R., Murphy, E.: AudioAuth: exploring the design and usability of a sound-based authentication system. Int. J. Mobile Hum. Comput. Interact. 7(4), 16\u201334 (2015)","journal-title":"Int. J. Mobile Hum. Comput. Interact."},{"key":"928_CR33","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume-title":"International Workshop on Recent Advances in Intrusion Detection (RAID 2009)","author":"S Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identification on smart phones. In: International Workshop on Recent Advances in Intrusion Detection (RAID 2009), pp. 224\u2013243. Springer, Heidelberg (2009)"},{"issue":"1","key":"928_CR34","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.procs.2010.04.051","volume":"1","author":"J Kang","year":"2012","unstructured":"Kang, J.: Procedia computer science mobile iris recognition systems\u202f: an emerging biometric technology. Procedia Comput. Sci. 1(1), 475\u2013484 (2012). https:\/\/doi.org\/10.1016\/j.procs.2010.04.051","journal-title":"Procedia Comput. Sci."},{"key":"928_CR35","doi-asserted-by":"publisher","unstructured":"Haque, M. M., Zawoad, S., Hasan, R. Secure techniques and methods for authenticating visually impaired mobile phone users. In: IEEE International Conference on Technologies for Homeland Security, HST 2013, 735\u2013740 (2013). https:\/\/doi.org\/10.1109\/THS.2013.6699095","DOI":"10.1109\/THS.2013.6699095"},{"issue":"9","key":"928_CR36","first-page":"6","volume":"5","author":"RD Esther","year":"2016","unstructured":"Esther, R.D., Jose, J.J.R.: Fingerprint based biometric authentication. IJCSMC 5(9), 6\u201315 (2016)","journal-title":"IJCSMC"},{"key":"928_CR37","unstructured":"von Graevenitz, G.A.: About speaker recognition techology. Bergdata Biometrics GmbH, Bonn, Germany. (2008)"},{"issue":"1","key":"928_CR38","doi-asserted-by":"publisher","first-page":"012125","DOI":"10.1088\/1742-6596\/1827\/1\/012125","volume":"1827","author":"X Yuan","year":"2021","unstructured":"Yuan, X., Li, G., Han, J., Wang, D., Tiankai, Z.: Overview of the development of speaker recognition. J. Phys. Conf. Ser. 1827(1), 012125 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1827\/1\/012125","journal-title":"J. Phys. Conf. Ser."},{"key":"928_CR39","unstructured":"Brunet, K., Taam, K., Cherrier, E., Faye, N., Rosenberger, C.: Speaker recognition for mobile user authentication: an android solution. In: 8\u00e8me Conf\u00e9rence Sur La S\u00e9curit\u00e9 Des Architectures R\u00e9seaux et Syst\u00e8mes d\u2019Information (SAR SSI), September, 10 (2013)"},{"key":"928_CR40","doi-asserted-by":"crossref","unstructured":"Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R., Zhang, Y.: Your face your heart : secure mobile face authentication with photoplethysmograms. In: IEEE Conference on Computer Communications (INFOCOM 2017). 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8057220"},{"key":"928_CR41","unstructured":"Chiasson, S., Forget, A., Biddle, R.: Accessibility and graphical passwords. symposium on accessible privacy and security (SOAPS). (2008)"},{"key":"928_CR42","doi-asserted-by":"crossref","unstructured":"Wobbrock, J.O.: TapSongs\u202f: tapping rhythm-based passwords on a single binary sensor. UIST\u201909, 93\u201396 (2009)","DOI":"10.1145\/1622176.1622194"},{"issue":"1","key":"928_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18535\/ijecs\/v6i1.41","volume":"6","author":"V Rathanavel","year":"2017","unstructured":"Rathanavel, V., Mali, S.: Graphical password as an OTP. Int. J. Eng. Comput. Sci. 6(1), 1\u20136 (2017). https:\/\/doi.org\/10.18535\/ijecs\/v6i1.41","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"928_CR44","doi-asserted-by":"crossref","unstructured":"Kuber, R., Sharma, S.: Toward tactile authentication for blind users. In: International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS\u201910), 289-290 (2010)","DOI":"10.1145\/1878803.1878875"},{"key":"928_CR45","doi-asserted-by":"crossref","unstructured":"Kuber, R. , Sharma, S Developing an extension to an existing tactile authentication mechanism to support non-visual interaction. In: IASTED Conference on Human-Computer Interaction, 190\u2013198 (2012).","DOI":"10.2316\/P.2012.772-009"},{"key":"928_CR46","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhang, R., Zhang, J., and Zhang, Y.: TouchIn\u202f: sightless two-factor authentication on multi-touch mobile devices. In: IEEE Conference on Communications and Network Security, 436\u2013444 (2014)","DOI":"10.1109\/CNS.2014.6997513"},{"key":"928_CR47","doi-asserted-by":"publisher","DOI":"10.14236\/EWIC\/HCI2013.42","author":"D Marques","year":"2013","unstructured":"Marques, D., Guerreiro, T., Duarte, L., Carrico, L.: Under the table: tap authentication for smartphones. BCS HCI (2013). https:\/\/doi.org\/10.14236\/EWIC\/HCI2013.42","journal-title":"BCS HCI"},{"key":"928_CR48","doi-asserted-by":"crossref","unstructured":"Chen, Y., Sun, J., Zhang, R., Zhang, Y.: Your song your way\u202f: rhythm-based two-factor authentication for multi-touch mobile devices. 2686\u20132694 (2015)","DOI":"10.1109\/INFOCOM.2015.7218660"},{"key":"928_CR49","unstructured":"Gurary, J.: Multi-dimensional and analog authentication (2018)"},{"issue":"12","key":"928_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2014.12.01","volume":"6","author":"G Qinghai","year":"2014","unstructured":"Qinghai, G.: A Preliminary study of fake fingerprints. Int. J. Comput. Netw. Inf. Secur. 6(12), 1\u20138 (2014). https:\/\/doi.org\/10.5815\/ijcnis.2014.12.01","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"928_CR51","unstructured":"Vaughan, C.E., Schroeder, F.K.: Social and cultural perspectives on blindness: barriers to community integration (2nd Ed.). Charles C Thomas, 93 (2018)"},{"key":"928_CR52","doi-asserted-by":"crossref","unstructured":"Mcgookin, D., Brewster, S., Jiang, W.: Investigating touchscreen accessibility for people with visual impairments. NordiCHI, 298\u2013307 (2008)","DOI":"10.1145\/1463160.1463193"},{"key":"928_CR53","doi-asserted-by":"crossref","unstructured":"Ahmed, T. Privacy concerns and behaviors of people with visual impairments (2015)","DOI":"10.1145\/2702123.2702334"},{"key":"928_CR54","doi-asserted-by":"publisher","unstructured":"Wobbrock, J.O., Findlater, L., Gergle, D., Higgins, J.J.: The aligned rank transform for nonparametric factorial analyses using only anova procedures. In: Conference on Human Factors in Computing Systems\u2014Proceedings, May 2018, 143\u2013146 (2011). https:\/\/doi.org\/10.1145\/1978942.1978963","DOI":"10.1145\/1978942.1978963"},{"key":"928_CR55","unstructured":"Oh, U.: Accessible on-body interaction for people with visual impairments. PhD Thesis. University of Maryland, College Park. (2016)"},{"key":"928_CR56","doi-asserted-by":"crossref","unstructured":"Bonner, M., Brudvik, J., Abowd, G., Keith Edwards, W.: No-look notes: accessible eyes-free multi-touch text entry. (2010). http:\/\/matt-bonner.net\/pdf\/papers\/pervasive2010-nolooknotes.pdf","DOI":"10.1007\/978-3-642-12654-3_24"},{"key":"928_CR57","unstructured":"Maetz, Y., Heen, O., Irisa, I. Story graphical password system. 15\u201316 (2009)"},{"key":"928_CR58","doi-asserted-by":"crossref","unstructured":"Cowan, N. The magical number 4 in short-term memory\u202f: a reconsideration of mental storage capacity. 4, 87\u2013185 (2000)","DOI":"10.1017\/S0140525X01003922"},{"key":"928_CR59","doi-asserted-by":"crossref","unstructured":"Mandler, G.: Organization and memory. In: The psychology of learning and motivation, vol. 1, ed. K. W. Spence & J. T. Spence. Academic Press. (1967)","DOI":"10.1016\/S0079-7421(08)60516-2"},{"key":"928_CR60","doi-asserted-by":"crossref","unstructured":"Dubey, R., Peterson, J., Khosla, A., Yang, M., Ghanem, B. What makes an object memorable\u202f? (2015)","DOI":"10.1109\/ICCV.2015.130"},{"issue":"3","key":"928_CR61","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1038\/nn.3655","volume":"17","author":"WJ Ma","year":"2014","unstructured":"Ma, W.J., Husain, M., Bays, P.M.: Review changing concepts of working memory. Nat. Publ. Group 17(3), 347\u2013356 (2014). https:\/\/doi.org\/10.1038\/nn.3655","journal-title":"Nat. Publ. Group"},{"key":"928_CR62","doi-asserted-by":"crossref","unstructured":"Bouchacourt, F.: A flexible model of working memory. 1\u201341 (2018)","DOI":"10.1101\/407700"},{"key":"928_CR63","doi-asserted-by":"crossref","unstructured":"Daniels A.: The memory after-image and attention. The American Journal of Psychology, 6(4) 558\u2013564 (1895). https:\/\/www.jstor.org\/stable\/141119","DOI":"10.2307\/1411192"},{"issue":"1","key":"928_CR64","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1080\/17470215808416249","volume":"10","author":"J Brown","year":"1958","unstructured":"Brown, J.: Some tests of the decay theory of immediate memory. Quarterly J. Exp. Psychol 10(1), 12\u201321 (1958)","journal-title":"Quarterly J. Exp. Psychol"},{"issue":"3","key":"928_CR65","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1037\/h0049234","volume":"58","author":"LR Peterson","year":"1959","unstructured":"Peterson, L.R., Peterson, M.J.: Short-term retention of individual verbal items. J. Exp. Psychol. 58(3), 193 (1959)","journal-title":"J. Exp. Psychol."},{"issue":"2","key":"928_CR66","doi-asserted-by":"publisher","first-page":"174","DOI":"10.3758\/BF03213420","volume":"8","author":"P Muter","year":"1980","unstructured":"Muter, P.: Very rapid forgetting. Mem. Cognit. 8(2), 174\u2013179 (1980)","journal-title":"Mem. Cognit."},{"key":"928_CR67","volume-title":"Cognitive psychology","author":"RL Solso","year":"1995","unstructured":"Solso, R.L.: Cognitive psychology, 4th edn. Allyn and Bacon (1995)","edition":"4"},{"issue":"2","key":"928_CR68","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3758\/BF03201110","volume":"25","author":"RL Marsh","year":"1997","unstructured":"Marsh, R.L., Sebrechts, M.M., Hicks, J.L., Landau, J.D.: Processing strategies and secondary memory in very rapid forgetting. Mem. Cognit. 25(2), 173\u2013181 (1997)","journal-title":"Mem. Cognit."},{"key":"928_CR69","doi-asserted-by":"publisher","unstructured":"Alt, F., Mikusz, M., Schneegass, S., Bulling, A.: Memorability of cued-recall graphical passwords with saliency masks. In: ACM International Conference Proceeding Series, December, 191\u2013200 (2016). https:\/\/doi.org\/10.1145\/3012709.3012730t","DOI":"10.1145\/3012709.3012730t"},{"key":"928_CR70","unstructured":"Baddeley, A.: Your memory: a user\u2019s guide. Firefly Books. (2004)"},{"key":"928_CR71","unstructured":"Tanviruzzaman, M.: Towards usable end-user authentication. PhD Dissertation. (2014). http:\/\/gradworks.umi.com\/36\/23\/3623762.html"},{"key":"928_CR72","unstructured":"Kalayev, E.: Logon Duration \u2013 What Can Be Learned from 2 Million Logons?. Control Up. https:\/\/www.controlup.com\/resources\/blog\/entry\/logon-duration- what-can-be-learned-from-2-million-logons\/. (2016)"},{"issue":"5-A","key":"928_CR73","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3758\/BF03334350","volume":"1","author":"DM Lawrence","year":"1973","unstructured":"Lawrence, D.M., Banks, W.P.: Accuracy of recognition memory for common sounds. Bull. Psychon. Soc. 1(5-A), 298\u2013300 (1973)","journal-title":"Bull. Psychon. Soc."},{"key":"928_CR74","unstructured":"Grudzinska, A.: An auditory analog of the picture superiority effect in typically developing children. University of West London. (Unpublished). (2018)"},{"key":"928_CR75","unstructured":"National federation of the blind (2019). Blindness statistics. https:\/\/www.nfb.org\/resources\/blindness-statistics"},{"issue":"2","key":"928_CR76","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/0010-0285(73)90032-7","volume":"5","author":"A Paivio","year":"1973","unstructured":"Paivio, A., Csapo, K.: Picture superiority in free recall: imagery or dual coding? Cogn. Psychol. 5(2), 176\u2013206 (1973). https:\/\/doi.org\/10.1016\/0010-0285(73)90032-7","journal-title":"Cogn. Psychol."},{"issue":"4","key":"928_CR77","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/00221309.1996.9921280","volume":"123","author":"MT Huss","year":"1996","unstructured":"Huss, M.T., Weaver, K.A.: Effect of modality in earwitness identification: memory for verbal and nonverbal auditory stimuli presented in two contexts. J. Gen. Psychol. 123(4), 277\u2013287 (1996)","journal-title":"J. Gen. Psychol."},{"key":"928_CR78","first-page":"89","volume-title":"The Psychology of Learning and Motivation","author":"RC Atkinson","year":"1968","unstructured":"Atkinson, R.C., Shiffrin, R.M.: Human memory: a proposed system and its control processes. In: Spence, K., Spence, J. (eds.) The Psychology of Learning and Motivation, pp. 89\u2013195. Elseiver, Armsertdam (1968)"},{"key":"928_CR79","unstructured":"Braz, C.: Integrating a usable security protocol for user authentication into the requirements and design process. Dissertation (2011)"},{"issue":"9","key":"928_CR80","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1037\/bul0000108","volume":"143","author":"D Norris","year":"2017","unstructured":"Norris, D.: Short-term memory and long-term memory are still different. Psychol. Bull. 143(9), 992\u20131009 (2017)","journal-title":"Psychol. Bull."}],"container-title":["Universal Access in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-022-00928-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10209-022-00928-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-022-00928-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:02:36Z","timestamp":1710363756000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10209-022-00928-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":80,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["928"],"URL":"https:\/\/doi.org\/10.1007\/s10209-022-00928-1","relation":{},"ISSN":["1615-5289","1615-5297"],"issn-type":[{"value":"1615-5289","type":"print"},{"value":"1615-5297","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,11]]},"assertion":[{"value":"27 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}