Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 6

Histograms of the averages of the perimeters of the Delaunay triangles associated with the random graphical passwords in DB.3.1 (a), DB.3.2 (b), and DB.3.3 (c), respectively, and their comparison with the Johnson SB.
(a)
(b)
(c)