학술논문

Doodle-Based Authentication Technique Using Augmented Reality
Document Type
Periodical
Source
IEEE Access Access, IEEE. 8:4022-4034 2020
Subject
Aerospace
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Authentication
Password
Three-dimensional displays
Pins
Gesture recognition
Augmented reality
gesture recognition
password
doodle-based authentication
usable security
Language
ISSN
2169-3536
Abstract
The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the trends in computing devices and modern technologies drastically. With this revolution, there is a need to extend existing architectures of security to serve as the key protective feature in all computing devices. In this experimental study, the aim is to develop a novel authentication technique with a fusion of graphical doodle password approach and AR environments. The mash-up of both doodle passwords and AR in a 3D space gives a promising direction to set off to a modern, more usable, and satisfying authentication techniques. The proposed approach works on real-time size and coordinate matching of doodles in an AR environment for the authentication of users. The creation of doodle passwords in an AR space is carried on by touch-gesture-recognition on a smartphone. The usability and usefulness of the proposed technique is evaluated by conducting an extensive survey, based on tasks and user experience assessments. The randomized-post-test-only study model is used to conduct experimentation that is also followed by the analysis of security parameters with the help of confusion matrix. The obtained results predict the use of AR during the authentication process more satisfying for users, where the proposed technique is useful, usable, and secure in comparison to the existing authentication approaches. This paper also highlights the importance of research needed for the utilization of modern techniques during the creation of security frameworks.