Research Article
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack
Table 1
Summarizing the proposed defense techniques.
| | Defense technique | Keys | | Activation | Deactivation |
| | Type 1 | Included in the camouflage characters with the same length | | Type 2 | Included in the camouflage characters with different lengths | | Type 3 | Independent from the camouflage characters, and each has only one digit |
|
|