Research Article

A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack

Figure 2

(a) A screenshot from the first interface of the developed application that shows the three techniques: types 1, 2, and 3. (b) Type 1’s interface. (c) Type 2’s interface. (d) Type 3’s interface.
(a)
(b)
(c)
(d)