A Review of Literature on Accessibility and Authentication Techniques

Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper, we examine the previous work on accessible authentication techniques for blind/low vision people, deaf/hard-of-hearing people, people with cognitive impairments, and people with motor impairments. We seek to identify gaps in the current research to advocate where future efforts are needed to create authentication techniques that will work for everyone. We found a lot of variability in prior work investigating the accessibility of authentication techniques, including shortfalls and gaps in the literature. We make recommendations on the directions future research should take.

[1]  Richard E. Ladner,et al.  PassChords: secure multi-touch authentication for blind people , 2012, ASSETS '12.

[2]  Samuel B. Williams,et al.  ASSOCIATION FOR COMPUTING MACHINERY , 2000 .

[3]  Yang Wang,et al.  "I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication , 2015, SOUPS.

[4]  Andrew Sears,et al.  Representing users in accessibility research , 2012, TACC.

[5]  Yang Wang,et al.  UniPass: design and evaluation of a smart device-based password manager for visually impaired users , 2016, UbiComp.

[6]  Helena M. Mentis,et al.  Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment , 2019, CHI.

[7]  Yang Wang,et al.  "I Always Have to Think About It First": Authentication Experiences of People with Cognitive Impairments , 2017, ASSETS.

[8]  Fabrizio Leo,et al.  Updated Tactile Feedback with a Pin Array Matrix Helps Blind People to Reduce Self-Location Errors , 2018, Micromachines.

[9]  Ravi Kuber,et al.  Towards Brain-Computer Interface (BCI) and Gestural-Based Authentication for Individuals who are Blind , 2017, ASSETS.

[10]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[11]  David J. Crandall,et al.  Privacy Concerns and Behaviors of People with Visual Impairments , 2015, CHI.

[12]  Carsten Maple,et al.  Musipass: authenticating me softly with "my" song , 2009, NSPW '09.

[13]  Amy Hurst,et al.  Accessibility barriers to online education for young adults with intellectual disabilities , 2016, W4A.

[14]  Shawn Lawton Henry,et al.  The role of accessibility in a universal web , 2014, W4A.

[15]  Kirsi Helkala Disabilities and Authentication Methods: Usability and Security , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[16]  Mario A. Hernández,et al.  Variability among older adults in Internet health information-seeking performance , 2010 .

[17]  Martez E. Mott Accessible Touch Input for People with Motor Impairments , 2017, CHI Extended Abstracts.

[18]  André L. M. Santos,et al.  Full mobile accessibility is a matter of respect: GuAMA update process for motor and hearing disability users , 2019, IHC.

[19]  Yao Ma,et al.  Investigating User Behavior for Authentication Methods: A Comparison between Individuals with Down Syndrome and Neurotypical Users , 2013, TACC.

[20]  Wanda Pratt,et al.  Tenets for Social Accessibility , 2018, ACM Trans. Access. Comput..

[21]  Gonzalo E Perez Analyzing Impaired-User Input Scenarios for Keystroke Biometric Authentication , 2015 .

[22]  Daniel Zappala,et al.  Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications , 2017, SOUPS.

[23]  Shaojian Zhu,et al.  Don't listen! I am dictating my password! , 2009, Assets '09.

[24]  Audrey Girouard,et al.  Understanding Authentication Method Use on Mobile Devices by People with Vision Impairment , 2018, ASSETS.

[25]  David J Rachlin,et al.  Encyclopedia of Behavioral Medicine , 2014 .

[26]  Yao Ma,et al.  Investigating authentication methods used by individuals with down syndrome , 2012, ASSETS '12.

[27]  Kristen Shinohara A new approach for the design of assistive technologies: design for social acceptance , 2012, ASAC.

[28]  Ravi Kuber,et al.  Toward tactile authentication for blind users , 2010, ASSETS '10.

[29]  Nicolas Christin,et al.  Use Your Illusion: secure authentication usable anywhere , 2008, SOUPS '08.

[30]  Yang Wang,et al.  “They should be convenient and strong”: Password perceptions and practices of visually impaired users , 2017 .

[31]  Jonathan Lazar,et al.  Developing usable CAPTCHAs for blind users , 2007, Assets '07.

[32]  K. S. Kuppusamy,et al.  VIBI: A Braille Inspired Password Entry Model to Assist Person with Visual Impairments , 2017 .

[33]  Prakash Ishwar,et al.  Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[34]  Srinivas Sampalli,et al.  BraillePassword: accessible web authentication technique on touchscreen devices , 2018, Journal of Ambient Intelligence and Humanized Computing.

[35]  Audrey Girouard,et al.  Bend Passwords on BendyPass: A User Authentication Method for People with Vision Impairment , 2018, ASSETS.

[36]  John A. Albertini,et al.  Deafness and Hearing Loss , 2010 .

[37]  Tal Garfinkel,et al.  Reducing shoulder-surfing by using gaze-based password entry , 2007, SOUPS '07.

[38]  Jon Froehlich,et al.  Design of an Augmented Reality Magnification Aid for Low Vision Users , 2018, ASSETS.

[39]  Apu Kapadia,et al.  "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications , 2020, USENIX Security Symposium.

[40]  Adam J. Aviv,et al.  Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind , 2017, ASSETS.

[41]  Radu-Daniel Vatavu,et al.  Stroke-Gesture Input for People with Motor Impairments: Empirical Results & Research Roadmap , 2019, CHI.