Research Article

A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack

Table 1

Summarizing the proposed defense techniques.

Defense techniqueKeys
ActivationDeactivation

Type 1Included in the camouflage characters with the same length
Type 2Included in the camouflage characters with different lengths
Type 3Independent from the camouflage characters, and each has only one digit