Research Article
Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles
Figure 6
Histograms of the averages of the perimeters of the Delaunay triangles associated with the random graphical passwords in DB.3.1 (a), DB.3.2 (b), and DB.3.3 (c), respectively, and their comparison with the Johnson SB.
(a) |
(b) |
(c) |