Loading

On the Use of Image and Emojis in Graphical Password Application
Nur Syabila Zabidi1, Noris Mohd Norowi2, Rahmita Wirza O.K. Rahmat3

1Nur Syabila Zabidi, Department of Computer Science and Information Technology, University Putra Malaysia, Serdang, Malaysia.

2Noris Mohd Norowi, Department of Computer Science and Information Technology, University Putra Malaysia, Serdang, Malaysia.

3Rahmita Wirza O.K. Rahmat, Department of Computer Science and Information Technology, University Putra Malaysia, Serdang, Malaysia.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript Published on 19 June 2019 | PP: 379-385 | Volume-8 Issue-8S June 2019 | Retrieval Number: H10650688S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper explores emojis as graphical password alternative for user authentication. The assumption of emojis is easier to remember and more secure has motivated the researchers to enhance existing graphical password authentication scheme. Most of the graphical authentication schemes provides longer authentication times and therefore emojis were chosen to be the alternative to reduce login times and exhibit picture superiority effect. The usability and security evaluation have been conducted to explore the differences among efficiency, effectiveness, memorability, user satisfaction, and password space and entropy of the prototype. The findings showed an acceptable level of efficiency, effectiveness and user satisfaction of the proposed system while further research should focus on the tolerance field of the images. Based on findings, this study provides recommendations for designing more usable and secure authentication schemes.

Keywords: Emojis; Authentication; Graphical Password; Usability.
Scope of the Article: Computer Science and Its Applications