Research Article

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

Figure 8

Scenario 2: cued picture on the half-line and not the last picture.
838623.fig.008