2022
DOI: 10.1109/access.2021.3138093
|View full text |Cite
|
Sign up to set email alerts
|

EYEDi: Graphical Authentication Scheme of Estimating Your Encodable Distorted Images to Prevent Screenshot Attacks

Abstract: under Application No. 2020R445, and performed in line with the Helsinki.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Among these, [37] had the fastest login time, followed by [27], whereas the method in [49] had the slowest login time. The method in [39] had the longest maximum login time. Regarding the mean login time, [33] outperformed most of the other methods.…”
Section: Rq4: How Effective Are the Selected Recognition-based Method...mentioning
confidence: 99%
See 1 more Smart Citation
“…Among these, [37] had the fastest login time, followed by [27], whereas the method in [49] had the slowest login time. The method in [39] had the longest maximum login time. Regarding the mean login time, [33] outperformed most of the other methods.…”
Section: Rq4: How Effective Are the Selected Recognition-based Method...mentioning
confidence: 99%
“…An overview of the pass-objects used in the selected schemes is presented in Table 3 below. As indicated in Table 4, the authentication schemes proposed in [28,29,31,34,[38][39][40][41][42][43]47,[49][50][51] require the users to login with only the registered objects as the pass-objects during the authentication process. The schemes developed by Por et al [27] and Othman et al [30] are the two methods that permit the use of only decoy objects.…”
Section: Rq2 What Pass-objects Are Used For Authentication In These M...mentioning
confidence: 99%
“…In a video-recording attack, a hacker only requires a device with a camera to record the user while they enter their password [25]. The hacker can then replay the video to retrieve the password.…”
Section: Rq1: What Are the Existing Security Attacks On Graphical Pas...mentioning
confidence: 99%