Towards accessible mobile pattern authentication for persons with visual impairments

Security in smartphones has become one of the major concerns, with prolific growth in its usage scenario. Many applications are available for Android users to protect their applications and data. But all these security applications are not easily accessible for persons with disabilities. For persons with color blindness, authentication mechanisms pose user interface related issues. Color blind users find the inaccessible and complex design in the interface difficult to access and interpret mobile locks. This paper focuses on a novel method for providing color and touch sensitivity based dot pattern lock. This Model automatically replaces the existing display style of a pattern lock with a new user preferred color combination. In addition Pressure Gradient Input (PGI) has been incorporated to enhance authentication strength. The feedback collected from users shows that this accessible security application is easy to use without any major access barrier.

[1]  S. Jamieson Likert scales: how to (ab)use them , 2004, Medical education.

[2]  Sebastian Szlósarczyk,et al.  Voice Encrypted Recognition Authentication - VERA , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[3]  Volker Roth,et al.  Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices , 2009, CHI.

[4]  Tobias Stockinger Implicit Authentication On Mobile Devices , 2011 .

[5]  Jong Hyuk Park,et al.  Design and Implementation of Improved Authentication System for Android Smartphone Users , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Fuling Li,et al.  Implementation of mobile learning platform with Android , 2015 .

[7]  Adam J. Aviv,et al.  Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.

[8]  Joaquim A. Jorge,et al.  Blind people and mobile touch-based text-entry: acknowledging the need for different flavors , 2011, ASSETS.

[9]  Philippe A. Palanque,et al.  Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2014, International Conference on Human Factors in Computing Systems.

[10]  Ragib Hasan,et al.  Secure techniques and methods for authenticating visually impaired mobile phone users , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[11]  Johannes Sametinger,et al.  Secure and usable authentication on mobile devices , 2012, MoMM '12.

[12]  Theodore Tryfonas,et al.  A pilot study on the security of pattern screen-lock methods and soft side channel attacks , 2013, WiSec '13.

[13]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[14]  Michael Rohs,et al.  Characteristics of pressure-based input for mobile devices , 2010, CHI.

[15]  Ravin Balakrishnan,et al.  Pressure widgets , 2004, CHI.

[16]  Yang Zhang,et al.  Fingerprint attack against touch-enabled devices , 2012, SPSM '12.

[17]  K. Nivetha,et al.  Authentication Mechanisim For Session Passwords By Imposing Color With Text , 2012 .