Legibility impact factor for shoulder-surfing resistant authentication scheme by visual perception
List of Authors
  • Juliana Mohamed , Muhamad Hanif Jofri

Keyword
  • shoulder surfer, authentication, legibility, algorithm, auto glare/auto hide

Abstract
  • Shoulder surfer one of the causes vulnerable to the authentication. Most vulnerable of shoulder surfer attack to the physical transaction activities at automated teller machine (ATM). This paper investigates factors that affect legibility that can be divided into two categories: environmental factors and display factors. This research studies the legibility impact factor from shoulder-surfer’s viewing angle. The research brings along the algorithm of authentication procedure, enables auto hide or auto glare which shoulder-surfer cannot be seen. The result is according to legibility impact factor and meets the requirement. The results indicate that our method is successful in reducing the legibility for shoulder surfers outside the safe zone to a level that is considered critical.

Reference
  • 1. D. Ragu. (2022, June 26), “Break your silence on millions lost by victims in ‘fraud’, MP tells bank. Freemalaysiatoday,” https://www.freemalaysiatoday.com/category/nation/ 2022/06/26/break-your-silence-on-millions-lost-by-victims-in-fraud-mp-tells-bank/

    2. The Star Online. (2022, June 10). Rise in cases of money transferred unknowingly from accounts. The Star. https://www.thestar.com.my/news/nation/2022/06/10/rise-in-cases-of-money-transferred-unknowingly-from-accounts

    3. Zalani, A. (2022, August 21). I lost my money in a blink of an eye, says CIMB customer. Sinar Daily. https://www.sinardaily.my/article/178696/malaysia/national/i-lost-my-money-in-a-blink-of-an-eye-says-cimb-customer-

    4. C. Wang, Y. Wang, Y. Chen, H. Liu, and J. Liu., “User authentication on mobile devices: Approaches, threats and trends,” Computer Networks, vol. 170, 107118, 2020.

    5. N. H. Zakaria. “Graphical Password Mechanisms: A Case Study,”.

    6. F. Binbeshr, M. M. Kiah, L. Y. Por, and A. A. Zaidan, “A systematic review of PIN-entry methods resistant to shoulder-surfing attacks,” Computers & Security, 101, 102116, 2021

    7. H. Khan, U . Hengartner, and D . Vogel, “ Evaluating attack and defense strategies for smartphone pin shoulder surfing. In Proc. 2018 CHI Conference on Human Factors in Computing Systems, April. 2018, pp. 1-10.

    8. M. J. A. Sabani, and U. M. Rishan, “Effectiveness of ATM security mechanisms: a review analysis,” 2019.

    9. A. Saad, M. Chukwu, and S. Schneegass, “ Communicating shoulder surfing attacks to users,” in Proc. 17th International Conference on Mobile and Ubiquitous Multimedia, Nov. 2018, pp. 147-152.

    10. T. G. Zewdie, “Usable Security Case of Remote Web Access. in International Conference on Human-Computer Interaction, Ju l . 2020, pp. 491-501. Springer, Cham.

    11. P. Coulton, and J. G. Lindley, “More-than human centred design: Considering other things,” The Design Journal, 2019, vol. 22, no. 4, pp. 463-481.

    12. G. Briones-Villafuerte, A Naula-Bone, M. Vaca-Cardenas, and L. Vaca-Cardenas, “User Interfaces Promoting Appropriate HCI: Systematic Literature Review”. Revista Ibérica de Sistemas e Tecnologias de Informação, (E47), 2022, pp. 61-76.

    13. T. Zhang, W. Du, H. Wang, Q. Zeng, and L. Fan, “A Stronger Adaptive Local Dimming Method with Details Preservation,” Applied Sciences, 2020, vol. 10, no.5, 1820.

    14. C. Y. Jang, S. Kim, K. R. Cho, and Y. H. Kim, “Performance analysis of structural similarity-based backlight dimming algorithm modulated by controlling allowable local distortion of output image,” Displays, 2019, vol. 59, pp. 1-8.

    15. T. Kojić, D. Ali, R. Greinacher, S. Möller, and J. N. Voigt-Antons, “ User experience of reading in virtual reality—finding values for text distance, size and contrast,” in 2020 Twelfth IEEE. International Conference on Quality of Multimedia Experience (QoMEX), May 2020, pp. 1-6.

    16. Bâce, Mihai, Alia Saad, Mohamed Khamis, Stefan Schneegass, and Andreas Bulling. "PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices." Proceedings on Privacy Enhancing Technologies 1, 2022, vol. 21.