{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:07Z","timestamp":1762005007492,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"DOI":"10.1145\/3173574.3173661","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T15:43:11Z","timestamp":1524238991000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition"],"prefix":"10.1145","author":[{"given":"Christina","family":"Katsini","sequence":"first","affiliation":[{"name":"Human Opsis &amp; University of Patras, Patra, Greece"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"George E.","family":"Raptis","sequence":"additional","affiliation":[{"name":"Human Opsis &amp; University of Patras, Patras, Achaea, Greece"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"Cognitive UX GmbH &amp; University of Cyprus, Heidelberg, Germany"}]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"given":"Nikolaos","family":"Avouris","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.05.010"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Annual Meeting of the Cognitive Science Society.","author":"Aydin Ulku Arslan","year":"2013","unstructured":"Ulku Arslan Aydin, Cengiz Acarturk, and Kursat Cagiltay. 2013. The Role of Visual Coherence in Graphical Passwords. In Proceedings of the Annual Meeting of the Cognitive Science Society."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.07.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Marios Belk Christos Fidas Panagiotis Germanakos and George Samaras. 2017. The Interplay between Humans Technology and User Authentication: A Cognitive Processing Perspective. Computers in Human Behavior. 10.1016\/j.chb.2017.06.042","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 102--113.","volume-title":"Studying the effect of human cognition on user authentication tasks","author":"Belk Marios","unstructured":"Marios Belk, Panagiotis Germanakos, Christos Fidas, and George Samaras. 2013. Studying the effect of human cognition on user authentication tasks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 102--113."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106488"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0080-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393880"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289130"},{"key":"e_1_3_2_1_16_1","volume-title":"On User Choice in Graphical Password Schemes. In In 13th USENIX Security Symposium.","author":"Davis Darren","year":"2004","unstructured":"Darren Davis, Fabian Monrose, and Michael K Reiter. 2004. On User Choice in Graphical Password Schemes. In In 13th USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","volume-title":"Deja VuA User Study: Using Images for Authentication. In USENIX Security Symposium, 4.","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig. 2000. Deja VuA User Study: Using Images for Authentication. In USENIX Security Symposium, 4."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Andrew Duchowski. 2007. Eye tracking methodology: Theory and practice. Eye Tracking Methodology: Theory and Practice: 1--328.","DOI":"10.5555\/1215838"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506639"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIIS.2010.35"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.907464"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_28_1","unstructured":"Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens and Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053217"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172996"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.4304\/jltr.2.3.640-648"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2010.2057429"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0747-5632(94)90038-8"},{"volume-title":"Look into my eyes! In Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09, 1","author":"Luca Alexander De","key":"e_1_3_2_1_34_1","unstructured":"Alexander De Luca, Martin Denzel, and Heinrich Hussmann. 2009. Look into my eyes! In Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09, 1."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858547"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1220103"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Efi A. Nisiforou Eleni Michailidou and Andrew Laghos. 2014. Using Eye Tracking to Understand the Impact of Cognitive Abilities on Search Tasks.. 46-- 57.","DOI":"10.1007\/978-3-319-07509-9_5"},{"volume-title":"Group embedded figures test","author":"Oltman Philip K","key":"e_1_3_2_1_39_1","unstructured":"Philip K Oltman, Evelyn Raskin, and Herman A Witkin. 1971. Group embedded figures test. Consulting Psychologists Press Palo Alto, CA."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011218"},{"key":"e_1_3_2_1_41_1","unstructured":"Zachary Pace. 2011. Signing in with a picture password. Retrieved from https:\/\/blogs.msdn.microsoft.com\/b8\/2011\/12\/16\/si gning-in-with-a-picture-password\/"},{"volume-title":"2012 IEEE Conference on Computer Vision and Pattern Recognition, 733--740","author":"Perazzi F.","key":"e_1_3_2_1_42_1","unstructured":"F. Perazzi, P. Krahenbuhl, Y. Pritch, and A. Hornung. 2012. Saliency filters: Contrast based filtering for salient region detection. In 2012 IEEE Conference on Computer Vision and Pattern Recognition, 733--740."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967934.2968107"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003762"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/0305569800060204"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-008-9093-6"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738916"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.18"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_51_1","volume-title":"Lorrie Faith Cranor, and Michelle L. Mazurek","author":"Segreti Sean M.","year":"2017","unstructured":"Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Michelle L. Mazurek. 2017. Diversify to Survive: Making Passwords Stronger with Adaptive Policies. e Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017): 1-- 12. Retrieved from https:\/\/www.usenix.org\/system\/files\/conference\/sou ps2017\/soups2017-segreti.pdf"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02804"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557212"},{"key":"e_1_3_2_1_55_1","volume-title":"16th USENIX Security Symposium: 8.","author":"Thorpe Julie","year":"2007","unstructured":"Julie Thorpe and P C Van Oorschot. 2007. HumanSeeded Attacks and Exploiting Hot-Spots in Graphical Passwords * 1. 16th USENIX Security Symposium: 8. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362911 %5Cnhttp:\/\/www.usenix.org\/event\/sec07\/tech\/full_papers\/thorpe\/thorpe_html\/"},{"key":"e_1_3_2_1_56_1","unstructured":"Tobii AB. Tobii Pro Glasses Analyzer User's Manual."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2014-1124"},{"key":"e_1_3_2_1_58_1","unstructured":"Seymour Wapner and Jack Demick. 1992. Field Dependence-Independence in Adult Development and Aging. Field Dependence-independence Bio-- psycho-social Factors Across the Life Span: 245-- 268."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2333-8504.1975.tb01065.x"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2333-8504.1976.tb01098.x"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX.2013.6603194"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.26"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701423"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of SS 2013: 383-- 398","author":"Zhao Ziming","year":"2013","unstructured":"Ziming Zhao, Gail-joon Ahn, and G F S Technology. 2013. On the Security of Picture Gesture Authentication On the Security of Picture Gesture Authentication. In Proceedings of SS 2013: 383-- 398."}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Montreal QC Canada","acronym":"CHI '18"},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:20Z","timestamp":1750213580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":67,"alternative-id":["10.1145\/3173574.3173661","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3173661","relation":{},"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"2018-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}