IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Play That Funky Password!: Recent Advances in Authentication with Music

Play That Funky Password!: Recent Advances in Authentication with Music
View Sample PDF
Author(s): Marcia Gibson (University of Bedfordshire, UK), Karen Renaud (University of Glasgow, UK), Marc Conrad (University of Bedfordshire, UK)and Carsten Maple (University of Warwick, UK)
Copyright: 2015
Pages: 32
Source title: Handbook of Research on Emerging Developments in Data Privacy
Source Author(s)/Editor(s): Manish Gupta (State University of New York at Buffalo, USA)
DOI: 10.4018/978-1-4666-7381-6.ch006

Purchase

View Play That Funky Password!: Recent Advances in Authentication with Music on the publisher's website for pricing and purchasing information.

Abstract

Over the last few years, there has been emerging interest in authenticating users through the medium of music. Historically, developers of alternate modality systems have focused on image- and haptic-based techniques, instinctively shying away from music. This might be due to the inherently temporal nature of the listening task and the belief that this would be impractical and frustrating for users. In this chapter, the authors discuss and present new research in this field that, to the contrary, indicates that the “enjoyability factor” means users may be more willing to spend additional time authenticating with music than they would with other techniques. Although undeniably not the optimal solution in time-critical contexts, for many other pursuits music-based authentication could feasibly replace passwords, easing the number of secure strings the average user is expected to remember. Music may also offer a better solution for those suffering memory or cognitive impairments. This chapter incorporates discussion on recent advances in the field of authentication research within the context of a changing threat landscape. A prototype musical password system is presented and a summary of results from online user testing and a lab-based controlled experiment are presented which further reinforce the importance of accounting for “enjoyability” in the assessment of recognition-based authentication schemes.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom