On the use of image and emojis in graphical password application
This paper explores emojis as graphical password alternative for user authentication. The assumption of emojis is easier to remember and more secure has motivated the researchers to enhance existing graphical password authentication scheme. Most of the graphical authentication schemes provides lon...
| Main Authors: | Zabidi, Nur Syabila, Mohd Norowi, Noris, O. K. Rahmat, Rahmita Wirza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/81539/ http://psasir.upm.edu.my/id/eprint/81539/1/On%20the%20use%20of%20image%20and%20emojis%20in%20graphical%20password%20application.pdf |
Similar Items
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
A review on gesture recognition technology in children's interactive storybook
by: Zabidi, Nur Syabila, et al.
Published: (2016)
by: Zabidi, Nur Syabila, et al.
Published: (2016)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Speech to text with emoji
by: Tong, Kah Pau
Published: (2023)
by: Tong, Kah Pau
Published: (2023)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Can background baroque music help to improve the memorability of graphical passwords?
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Between art and application: Special issues on emoji epistemology
by: Abidin, Crystal, et al.
Published: (2018)
by: Abidin, Crystal, et al.
Published: (2018)
Factors affecting automatic genre classification: an investigation incorporating non-western musical forms
by: Mohd Norowi, Noris, et al.
Published: (2005)
by: Mohd Norowi, Noris, et al.
Published: (2005)
Cultural Interpretation of Emoji in Malaysian Context
by: Amalina, Intan Nadia, et al.
Published: (2019)
by: Amalina, Intan Nadia, et al.
Published: (2019)
Twitter sentiment analysis in the era of emojis
by: Li, Mengdi
Published: (2018)
by: Li, Mengdi
Published: (2018)
Undergraduates' interpretation on WhatsApp smiley emoji
by: Subashini Annamalai,, et al.
Published: (2017)
by: Subashini Annamalai,, et al.
Published: (2017)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Computer integrated system: medical imaging & visualization
by: O. K. Rahmat, Rahmita Wirza
Published: (2018)
by: O. K. Rahmat, Rahmita Wirza
Published: (2018)
Designing a collaborative virtual conference application: challenges, requirements and guidelines
by: Teo, Rhun Ming, et al.
Published: (2021)
by: Teo, Rhun Ming, et al.
Published: (2021)
Traditional Malay musical genre classification: machine versus human / Noris Mohd Norowi ... [et al.]
by: Mohd Norowi, Noris, et al.
Published: (2015)
by: Mohd Norowi, Noris, et al.
Published: (2015)
Trend emoji dalam komunikasi digital: sorotan literatur bersistematik
by: Nur Diyana Zamani,, et al.
Published: (2024)
by: Nur Diyana Zamani,, et al.
Published: (2024)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
The potentials of emoji in visual communication / Noorlida Daud and Ahmad Zamzuri Mohamad Ali
by: Noorlida, Daud, et al.
Published: (2018)
by: Noorlida, Daud, et al.
Published: (2018)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
Estimation of noise in gray-scale and colored images using median absolute deviation (MAD)
by: Khaleel, Hasan Hadi, et al.
Published: (2008)
by: Khaleel, Hasan Hadi, et al.
Published: (2008)
Discovering association rules for mining images datasets: a proposal
by: Hamzah, Azizi, et al.
Published: (2005)
by: Hamzah, Azizi, et al.
Published: (2005)
Improvement of Automatic Genre Classification System for Traditional Malaysian Music Using Beat Features
by: Mohd. Norowi, Noris
Published: (2007)
by: Mohd. Norowi, Noris
Published: (2007)
An algorithm to measure unsymmetrical circle shape of intravascular ultrasound image using image processing techniques
by: Kutty, Suhaili Beeran, et al.
Published: (2021)
by: Kutty, Suhaili Beeran, et al.
Published: (2021)
Pelajar FSKTM ikuti lawatan aktiviti pekerjaan pengkomputeran di Batam
by: O.K. Rahmat, Rahmita Wirza
Published: (2020)
by: O.K. Rahmat, Rahmita Wirza
Published: (2020)
System and method of transforming text into image for information hiding
by: Mahmod, Ramlan, et al.
Published: (2010)
by: Mahmod, Ramlan, et al.
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Similar Items
-
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024) -
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021) -
A review on gesture recognition technology in children's interactive storybook
by: Zabidi, Nur Syabila, et al.
Published: (2016) -
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011) -
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)