CueAuth:Comparing Touch, Mid-Air Gestures, and Gaze for Cue-based Authentication on Situated Displays

Khamis, Mohamed and Trotter, Ludwig Korbinian and Mäkelä, Ville and Von Zezschwitz, Emanuel and Le, Jens and Bulling, Andreas and Alt, Florian (2018) CueAuth:Comparing Touch, Mid-Air Gestures, and Gaze for Cue-based Authentication on Situated Displays. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2 (4). ISSN 2474-9567

[thumbnail of cueauth]
Preview
PDF (cueauth)
cueauth.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (3MB)

Abstract

Secure authentication on situated displays (e.g., to access sensitive information or to make purchases) is becoming increasingly important. A promising approach to resist shoulder surfing attacks is to employ cues that users respond to while authenticating; this overwhelms observers by requiring them to observe both the cue itself as well as users’ response to the cue. Although previous work proposed a variety of modalities, such as gaze and mid-air gestures, to further improve security, an understanding of how they compare with regard to usability and security is still missing as of today. In this paper, we rigorously compare modalities for cue-based authentication on situated displays. In particular, we provide the first comparison between touch, mid-air gestures, and calibration-free gaze using a state-of-the-art authentication concept. In two in-depth user studies (N=37) we found that the choice of touch or gaze presents a clear trade-off between usability and security. For example, while gaze input is more secure, it is also more demanding and requires longer authentication times. Mid-air gestures are slightly slower and more secure than touch but users hesitate to use them in public. We conclude with three significant design implications for authentication using touch, mid-air gestures, and gaze and discuss how the choice of modality creates opportunities and challenges for improved authentication in public.

Item Type:
Journal Article
Journal or Publication Title:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Additional Information:
© ACM, YYYY. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies,Volume 2 Issue 4, December 2018 https://dl.acm.org/citation.cfm?doid=3301777.3287052
ID Code:
129063
Deposited By:
Deposited On:
28 Nov 2018 14:54
Refereed?:
Yes
Published?:
Published
Last Modified:
16 Sep 2023 01:49