Research Article

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

Figure 12

Distribution of the final “target” picture using the proposed method.
838623.fig.0012