An investigation into the usability of graphical authentication using AuthentiGraph

Paul Minne, Jason Wells, Damien Hutchinson, Justin Pierce

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)


There is increasing coverage in the literature relating to the different facets surrounding the security service of authentication, but there is a need for further research into the usability of graphical authentication. Specifically, the usability and viability of graphical authentication techniques for providing increased security needs to be further explored. There is a significant amount of evidence relating to traditional authentication techniques which highlight the fact that as technological advances grip modern societies, the requirement for more
advanced authentication and security approaches increases. The exponential growth in the number of people using the Internet carries with it the high potential for increased security threats, suggesting that there are needs
for further techniques to increase security in online environments. This paper presents the findings of how various interface design approaches affect the usability of a previously developed alternative graphical authentication technique called AuthentiGraph. The security design provided by Authentigraph has been
established and justified in previous research by the authors. The primary focus of this paper is the usability of this technique. Using an experimental laboratory based approach, combined with an online survey, 20 university students evaluated a combination of five varying graphical interfaces in three different screen sizes. The outcome provides the interface design criteria best suited for the implementation and use of the AuthentiGraph technique.
Original languageEnglish
Title of host publicationProceedings of The 5th Australian Information Security Management Conference
PublisherAustralian Information Security Management
Publication statusPublished - 2007
Externally publishedYes


Dive into the research topics of 'An investigation into the usability of graphical authentication using AuthentiGraph'. Together they form a unique fingerprint.

Cite this