{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:11:13Z","timestamp":1775067073480,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T00:00:00Z","timestamp":1508284800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11704-016-5472-z","type":"journal-article","created":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T00:07:54Z","timestamp":1508285274000},"page":"1098-1108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Graphical password: prevent shoulder-surfing attack using digraph substitution rules"],"prefix":"10.1007","volume":"11","author":[{"given":"Lip Yee","family":"Por","sequence":"first","affiliation":[]},{"given":"Chin Soon","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Amanul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Tan Fong","family":"Ang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,18]]},"reference":[{"issue":"1","key":"5472_CR1","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/s11704-014-3125-7","volume":"9","author":"P Jiang","year":"2015","unstructured":"Jiang P, Wen Q Y, Li W M, Jin Z P, Zhang H. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers of Computer Science, 2015, 9(1): 142\u2013156","journal-title":"Frontiers of Computer Science"},{"issue":"3","key":"5472_CR2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M A Sasse","year":"2001","unstructured":"Sasse M A, Brostoff S, Weirich D. Transforming the \u201cweakest link\u201d: a human-computer interaction approach for usable and effective security. BT Technology Journal, 2001, 19(3): 122\u2013131","journal-title":"BT Technology Journal"},{"key":"5472_CR3","first-page":"23","volume-title":"Proceedings of the 13th International Conference on Financial Cryptography and Data Security","author":"C Herley","year":"2009","unstructured":"Herley C, Oorschot P C, Patrick A S. Passwords: if we\u2019re so smart, why are we still using them?. In: Proceedings of the 13th International Conference on Financial Cryptography and Data Security. 2009, 23\u201326"},{"issue":"12","key":"5472_CR4","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/1610252.1610287","volume":"52","author":"K Renaud","year":"2009","unstructured":"Renaud K, De-Angeli A. Visual Passwords: cure-all or snake-oil?. Communications of the ACM, 2009, 52(12): 135\u2013140","journal-title":"Communications of the ACM"},{"issue":"1","key":"5472_CR5","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A De-Angeli","year":"2005","unstructured":"De-Angeli A, Coventry L, Johnson G, Renaud K. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 2005, 63(1): 128\u2013152","journal-title":"International Journal of Human-Computer Studies"},{"key":"5472_CR6","first-page":"1107","volume-title":"Proceedings of the 28th Annual CHI Conference on Human Factors in Computing Systems","author":"A Forget","year":"2010","unstructured":"Forget A, Chiasson S, Biddle R. Shoulder-surfing resistance with eyegaze entry in cued-recall graphical passwords. In: Proceedings of the 28th Annual CHI Conference on Human Factors in Computing Systems. 2010, 1107\u20131110"},{"issue":"4","key":"5472_CR7","first-page":"19","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle R, Chiasson S, Van Oorschot P. Graphical passwords: learning from the first twelve years. Journal of ACM Computing Surveys (CSUR), 2012, 44(4): 19\u201341","journal-title":"Journal of ACM Computing Surveys (CSUR)"},{"key":"5472_CR8","first-page":"151","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"D Davis","year":"2004","unstructured":"Davis D, Monrose F, Reiter M. On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium. 2004, 151\u2013164"},{"key":"5472_CR9","first-page":"627","volume-title":"Proceedings of the 7thWSEAS International Conference on Applied Computer & Applied Computational Science","author":"L Y Por","year":"2008","unstructured":"Por L Y, Lim X T. Issues, threats and future trend for GSP. In: Proceedings of the 7thWSEAS International Conference on Applied Computer & Applied Computational Science. 2008, 627\u2013633"},{"issue":"7","key":"5472_CR10","first-page":"1137","volume":"5","author":"L Y Por","year":"2008","unstructured":"Por L Y, Lim X T. Multi-grid background Pass-Go. WSEAS Transactions on Information Science & Applications, 2008, 5(7): 1137\u20131148","journal-title":"WSEAS Transactions on Information Science & Applications"},{"key":"5472_CR11","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1145\/1133265.1133303","volume-title":"Proceedings of the Working Conference on Advanced Visual Interfaces","author":"S Wiedenbeck","year":"2006","unstructured":"Wiedenbeck S, Waters J, Sobrado L, Birget J. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces. 2006, 177\u2013184"},{"key":"5472_CR12","first-page":"675","volume-title":"Proceedings of the 4th International Conference on Innovative Computing, Information and Control","author":"H C Gao","year":"2009","unstructured":"Gao H C, Liu X Y, Wang S D, Liu H G, Dai R Y. Design and analysis of a graphical password scheme. In: Proceedings of the 4th International Conference on Innovative Computing, Information and Control. 2009, 675\u2013678"},{"issue":"2","key":"5472_CR13","first-page":"189","volume":"10","author":"L Y Por","year":"2013","unstructured":"Por L Y. Frequency of occurrence analysis attack and its countermeasure. The International Arab Journal of Information Technology, 2013, 10(2): 189\u2013197","journal-title":"The International Arab Journal of Information Technology"},{"issue":"2","key":"5472_CR14","first-page":"2277","volume":"5","author":"G Manjunath","year":"2014","unstructured":"Manjunath G, Satheesh K, Saranyadevi C, Nithya M. Text-based shoulder surfing resistant graphical password scheme. International Journal of Computer Science and Information Technologies, 2014, 5(2): 2277\u20132280","journal-title":"International Journal of Computer Science and Information Technologies"},{"issue":"3","key":"5472_CR15","first-page":"56","volume":"17","author":"J Shaikh","year":"2015","unstructured":"Shaikh J, Pawar C C, Jadhav V S, Sindhu M R. User authentication using graphical system. Progress in Science and Engineering Research Journal, 2015, 17(3): 56\u201361","journal-title":"Progress in Science and Engineering Research Journal"},{"issue":"7","key":"5472_CR16","first-page":"1678","volume":"8","author":"H C Gao","year":"2013","unstructured":"Gao H C, Wei J, Ye F, Ma L C. A survey on the use of graphical passwords in security. Journal of Software, 2013, 8(7): 1678\u20131698","journal-title":"Journal of Software"},{"key":"5472_CR17","first-page":"4","volume-title":"Graphical passwords. The Ruthgers Scholar","author":"L Sobrado","year":"2002","unstructured":"Sobrado L, Birget J C. Graphical passwords. The Ruthgers Scholar, 2002, 4"},{"key":"5472_CR18","first-page":"327","volume-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS)","author":"I Ion","year":"2015","unstructured":"Ion I, Reeder R, Consolvo S. \u201c\u00b7 \u00b7 \u00b7 no one can hack my mind\u201d: comparing expert and non-expert security practices. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS). 2015, 327\u2013346"},{"issue":"4","key":"5472_CR19","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1007\/s11704-011-0177-9","volume":"5","author":"S Gao","year":"2011","unstructured":"Gao S, Ma W P, Zhuo Z P, Wang F H. On cross-correlation indicators of an S-box. Frontiers of Computer Science in China, 2011, 5(4): 448\u2013453","journal-title":"Frontiers of Computer Science in China"},{"issue":"2","key":"5472_CR20","doi-asserted-by":"crossref","first-page":"121","DOI":"10.22452\/mjcs.vol23no2.5","volume":"23","author":"L Y Por","year":"2010","unstructured":"Por L Y, Kiah M L M. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malaysian Journal of Computer Science, 2010, 23(2): 121\u2013140","journal-title":"Malaysian Journal of Computer Science"},{"key":"5472_CR21","first-page":"689","volume-title":"Proceedings of the 7th WSEAS International Conference on Applied Computer and Applied Computational Science","author":"L Y Por","year":"2008","unstructured":"Por L Y, Delina B. Information hiding: a new approach in text steganography. In: Proceedings of the 7th WSEAS International Conference on Applied Computer and Applied Computational Science. 2008, 689\u2013695"},{"issue":"1","key":"5472_CR22","first-page":"51","volume":"10","author":"L Y Por","year":"2013","unstructured":"Por L Y, Delina B, Ang T F, Ong S Y. An enchanced mechanism for image steganography using sequential colour cycle algorithm. The International Arab Journal of Information Technology, 2013, 10(1): 51\u201360","journal-title":"The International Arab Journal of Information Technology"},{"key":"5472_CR23","first-page":"420","volume-title":"Proceedings of the 12th WSEAS International Conference on Computers","author":"L Y Por","year":"2008","unstructured":"Por L Y, Lai W K, Alireza Z, Delina B. StegCure: an amalgamation of different steganographic methods in GIF image. In: Proceedings of the 12th WSEAS International Conference on Computers. 2008, 420\u2013425"},{"issue":"5","key":"5472_CR24","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.jss.2011.12.023","volume":"85","author":"L Y Por","year":"2012","unstructured":"Por L Y, Wong K, Chee K O. UniSpaCh: a text-based data hiding method using Unicode space characters. Journal of Systems and Software, 2012, 85(5): 1075\u20131082","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"5472_CR25","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s11704-007-0037-9","volume":"1","author":"D Feng","year":"2007","unstructured":"Feng D, Wu C. Advances in cryptography and information security \u2014 introduction of 2002\u20132006 progress of SKLOIS. Frontiers of Computer Science in China, 2007, 1(4): 385\u2013396","journal-title":"Frontiers of Computer Science in China"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-5472-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-5472-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-5472-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T20:36:15Z","timestamp":1570221375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-5472-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,18]]},"references-count":25,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["5472"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-5472-z","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,18]]}}}