Research Article
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack
Table 1
Summarizing the proposed defense techniques.
| Defense technique | Keys | Activation | Deactivation |
| Type 1 | Included in the camouflage characters with the same length | Type 2 | Included in the camouflage characters with different lengths | Type 3 | Independent from the camouflage characters, and each has only one digit |
|
|