Research Article

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

Figure 3

Relationship between starting, cued, and “target” pictures.
838623.fig.003