Fig 4 - uploaded by Manuel Eugenio Morocho-Cayamcela
Content may be subject to copyright.
Source publication
Personal identification number (PIN) passwords are the preferred authentication method for visually impaired users to access digital devices like automated teller machines (ATMs), digital door locks, and cellular phones. The latest PIN input techniques have shown vulnerability to security breaches via shoulder-surfing, screen recording, and smudge...
Context in source publication
Context 1
... within the response time, while touch action "B" corresponded to the second instance. A response time variable was established in IESPIT to extend the actual speaking interval up to 0.5 seconds, which helped reduce not only the error ratio of a PIN input but also the time to complete authorization. The pseudocode of IESPIT can be found in Fig. ...
Similar publications
In recent years, the mobile applications have gained heaps of attention due to the rapid rise of the computational capabilities of mobile devices. The introduction of augmented reality in mobile devices has headed to the evolution of many android applications. The Location based services are gaining attention in different domains. This paper presen...