Research Article
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack
Figure 2
(a) A screenshot from the first interface of the developed application that shows the three techniques: types 1, 2, and 3. (b) Type 1’s interface. (c) Type 2’s interface. (d) Type 3’s interface.
(a) |
(b) |
(c) |
(d) |