Comments
Transcript
อิทธิพลของประเภทรูปภาพที่มีผลตnอการจดจํารูป
ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) °··¡¨ °¦³Á£¦¼ £µ¡¸É¤¸¨n °µ¦Îµ¦¼ £µ¡ ¦´µª¨¸ Á¦º °ª´·1Í ´r ®rª¦· ·Í2 ´¥n ° ´ »´ µ¦¡·¼ rª´ ¦®´nµ´ª°´¬¦ÁÈ ¸É·¥¤¤µ Á¡ºÉ°ªµ¤¨°£´¥ ° o °¤¼¨µµ¦ 榦¤ Ân¤¸ o°Îµ´¸Éε´ º°´ ®µµ¦¨º¤¦®´nµ ¹¤¸o «¼ ¹¬µª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡ Ã¥°o µ°·µª·¥´ µo µ·ª·¥µ¸É¨nµªªnµ ¤»¬¥rµ¤µ¦ÎµÂ¨³¦³¨¹¹¦¼£µ¡Åo ¸ªnµ´ª°´¬¦ Ân¥´ Ťn ¤¸ o°¦»ªnµ¦¼£µ¡¦³Á£ÄÁ®¤µ³¤¸É» µª·¥´ ¸ ʹ¤¸ª´ »¦³rÁ¡ºÉ°«¹¬µ´ ´¥¦³Á£ °¦¼ £µ¡ Ã¥ 嵦¨°´¦³µ¦Â¨³¨»¤n ´ª°¥nµÎµª şŚ ¹É µ¦¨°¤¸¦¼ÂÁÈ Á¤Îµ¦¼£µ¡Â¨³ÎµÂ®n Á¡ºÉ°Á¦¸ ¥Á¸¥¦³®ªnµ¦¼£µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥, Ä®o µ»¨´ªÉ Å, ¨Å¤o ¨³µ¤¦¦¤ ¨µ¦¨° ¡ªnµ ¦³Á£ °¦¼ £µ¡Å¤n¤¸¨n°Áª¨µ¸ÉÄo ĵ¦Îµ Ânn¨n°Áª¨µ¸ÉÄo ĵ¦¦³¨¹Â¨³Îµª¦¼ £µ¡¸É ¦³¨¹Åo °¥nµ¤¸¥´ ε´¸É¦³´ªµ¤ÁºÉ°¤´É šŝ Ã¥¦¼£µ¡¸ÉÄo Áª¨µÄµ¦¦³¨¹o °¥¸É» ¨³Îµª¦¼ £µ¡ ¸É¦³µ¦Â¨³¨»¤n ´ª°¥nµ¦³¨¹Åo ¤µ¸É» º° ¦¼£µ¡¨Å¤o εε´ µ¦¡·¼ rª´ ¦®´nµ¦¼£µ¡ ¦³Á£ °¦¼£µ¡ µ¦¦³¨¹¦¼£µ¡ 1, ´«¹¬µÂ¨³°µµ¦¥r£µª·µª·¥µµ¦°¤¡·ªÁ°¦r ³ª·¥µ«µ¦r ¨³ÁÃ襸¤®µª·¥µ¨´¥¦¦¤«µ¦r «¼¥r¦´· E-PDLO [email protected], [email protected] 197 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Abstract Nowadays, traditional alphanumeric password is the most widely used authentication for protecting private or secret data from attack. However, forgetting password is one of the main problems. Therefore, the graphical password was proposed for alternative. Psychological studies have shown that people can remember images better than text. However, there has been no research that aims to study which type of images are suitable to be used as a graphical password. Therefore, the objective of this research was to investigate the effects of image types, including fruit, abstraction, famous people s face and ordinary people s face, on usability. $ total of 72 participants were invited to play game in remembering images and its position. The experimental results showed that the type of images did not affect the average time to remember image and its position, but it affected the average time to recognize and the number of recognized images and its position significantly at 95% confident level. The image in fruit category gained the highest number of recognition while utilized the lowest recognition time. Keyword: $uthentication *raphical Password Type of image 5ecognize image ε ´ »´ µ¦¡·¼ r ª´ Á¡ºÉ°Á o µÄo µ¦³nµÇ ¸É¤¸µ¦Îµ´··Í ĵ¦Á o µÄo µ ¤¸ªµ¤Îµ´ °¥nµ¤µ Á¡ºÉ°o°´ o °¤¼¨µµ¦Ã¦¦¦¤ °¨»¤n ¼oŤn¦³r¸ µ¦¡·¼ rª´ ¦®´nµ´ª°´¬¦ÁÈ ¸É ·¥ ¤¤µ ¨³µµ¦«¹ ¬µµª· ´¥ ¸É nµ ¤µ¡ªnµ ¼oÄ o nª Ä®n · ¥ ¤´Ê ¦®´ nµ Á¡ºÉ ° Ä®o Î µ n µ ¥ Adams &Sasse, 1999, ŜŘ-ŜŞ Án µ¦´¦®´ Ê nµ´Ç Ê nµ¥Ç ¹É¦®´nµÁ®¨nµ¸ Ê nµ¥n°µ¦µÁµ °¼o¸Éo°µ¦ 榦¤ o °¤¼¨ µ¦³¹¤¸µ¦´Ár Ê Îµ®¦´µ¦´¦®´ Ê nµ Á¡ºÉ°Ä®o o ļ o ¦o µ¦®´nµ¸É¥µn°µ¦µ Áµ®¦º °µ¦Ã¦¦¦¤¤µ ¹ Ê Ä ³Á¸¥ª´¦®´nµÁ®¨nµ´Ê È¥µn°µ¦Îµ®¦º °µ¦¦³¨¹¦®´nµ´ ° Ê ¼oÄo µÁn Á¸¥ª´ ¼oÄo µnª Ä®n ¹ Âo ´ ®µµ¦¨º¤¦®´nµ o ª¥ª·¸µ¦´¹ ®¦º °Äo ¦®´ nµ» Á¸¥ª´´»´¸ °¼oÄo µ Dhamija & Perrig, 2000, 4; Kotadia, 2005) ¹Éª·¸µ¦¸ Ê¥·ÉÁÈ µ¦Á¡·É¤ªµ¤ Á¸¥É n°µ¦¼Ã¦¦¦¤ n°¤µ¹Á¦·É ¤¤¸o ¼ 嵦«¹¬µ Ã¥°o µ°·µª·¥´ µo µ·ª·¥µ¸É¨nµªªnµ ¤»¬¥rµ¤µ¦ÎµÂ¨³ ¦³¨¹¹¦¼ £µ¡Åo ¸ªnµ´ª°´¬¦ Shepard, 197, 15-163) ¹Á¦·É ¤¤¸o ¼ ·o ¨³°°Âª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡ Á¡ºÉ°Âo ´®µÁ¦ºÉ °µ¦Îµ¦®´nµ °¼oÄo µ ¤¸µª·´¥®¨µ¥µ¸É¸ ÊÄ®o Á®Èªnµ ¦®´nµ ¦¼ £µ¡´¤¸ Ê ¦³··£µ¡¤µªnµ¦®´nµ´ª°´¬¦´µo Ê µµ¦Äo µ 8sability) ¨³o µªµ¤¨°£´¥ Security) ¹É º°ÁÈ ·É ε´Îµ®¦´µ¦¡·¼ rª´ Ê µª·¥´ ¸Éµn ¤µ¤¸µ¦«¹¬µÁ¸É¥ª´µ¦°°Â¦®´nµ¦¼£µ¡Ä®o ¤¸¦³··£µ¡¤µ¥·É ¹ Ê´ µ °¦· , 媦¼£µ¡¸ÉÁ®¤µ³¤Îµ®¦´µ¦ÎµÅ¦o µÁÈ ¦®´nµ¦¼£µ¡ ¨³ ¦³Á£ °¦¼ £µ¡¸É夵Äo ĵ¦¦o µ¦®´nµ Åo Ân ¦¼ £µ¡Ä®o µ»¨ ¦¼ £µ¡µ¤¦¦¤ ¦¼ £µ¡·ª´«r ¦¼ £µ¡´ªr ¦¼ £µ¡µ¦r ¼ ¦¼ £µ¡¨Å¤o ¦¼ £µ¡ªµ°ºÉÇ ²¨² Ân¥´ Ťn¤¸ o°¦» ªnµ¦³Á£ °¦¼ £µ¡¸É¼Îµ¤µÄo ĵ¦¦o µ¦®´nµ ¦¼£µ¡¸ÉÁ®¤µ³¤¸É» º°¦¼£µ¡¦³Á£Ä 198 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) ª´»¦³r Á¡ºÉ°Îµµ¦«¹¬µ¹´ ´¥¦³Á£ °¦¼£µ¡¸ÉεĮo ¦®´nµ¦¼£µ¡¤¸¦³··£µ¡µ¦Äo µ¼» ªª¦¦¦¦¤ µ¦¡·¼ r´ªÂ¦®´nµ¦¼ £µ¡Åo ¼ÎµÂ¦³Á£µ¤¨´¬³µ¦Î µ£µ¡ °¤»¬¥rÁÈ 2 ¦³Á£º° µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡Ã¥°µ«´¥ª·¸µ¦¦¼o εÅo 5ecognition based techniTue) ¨³ µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡Ã¥°µ«´¥ª·¸µ¦¦³¨¹Åo 5ecall based technique)Dhamija& Perrig, 2000,4; Suo et al., 2005; van 2orschot & Thorpe, 2005; :iedenbeck, :aters, %irget, %rodskiy, & Memon, 2005a,102-127) µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡Ã¥°µ«´¥ª·¸µ¦¦¼o εÅo 5ecognition based technique) ÁÈ ª·¸µ¦¡·¼ rª´ ¸ÉÄ®o o ļ o ¦o ¼Îµ¦¼£µ¡¸ÉÁÈ ¦®´nµ¸ÉÁ¨º°Åªo Ân ´ Ê °µ¦¨³Á¸ ´Ê ¥ Á¤ºÉ°¼oÄo o°µ¦¡·¼ r ´ªÁ¡ºÉ°Á o µ¼¦n ³ ¼oÄo ³o °¦³»®¦º °Á¨º°¦¼ £µ¡¸ÉÁÈ ¦®´nµ¹³¡·¼ rª´ εÁ¦È ¨³Á o µÄo µ¦³ Åo ª´ °¥nµµª·¥´ µ¦¡·¼ rª´ ¦®´nµ¦¼£µ¡Ã¥°µ«´¥ª·¸µ¦¦¼oεÅo 5ecognition based technique) Åo Ân Hash Visualization Perrig & Song, 1999,131-138) ¨³ Deja Vu Dhamija & Perrig, 2000,4)ÁÈ ª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼£µ¡ Ã¥Äo ¦¼£µ¡µ¤¦¦¤¸É¼ ¦o µ ¹ ʤµµ Hash function ÁÈ ¦¼ £µ¡ µ¤¦¦¤¸ÉŤn¤¸ªµ¤®¤µ¥ ¹É°o µ°·µª·¥´ µo µ·ª·¥µ¸É¨nµªªnµ ¤»¬¥rµ¤µ¦¦³»®¦º °ÎµÂ¦¼ ¦n µ Á¦ µ· ¦¼  ¨³¸Åo Boynton & Boss, 1971,173; 5eynolds, :hite, & Hilgendorf, 1972,227-236; :illiams, 1966,315-318) ¨³µ¦Á¨º°Äo ¦¼£µ¡µ¤¦¦¤¸ÉŤn¤¸ªµ¤®¤µ¥Â¨³¤¸µ¦¨´¬³ °¦¼ £µ¡ ¦¼ ¦n µ ¨³¸¸É°·µ¥Åo ¥µ´Ê εĮo o ļ o ¸ÉÁÈ Áo µ °¦®´nµ Ťnµ¤µ¦nµ¥°¦¼ ¦n µ¨´¬³ °¦¼ £µ¡ Á¡ºÉ°°Ä®o o ¼°ºÉ¦µÅo °¥nµ´Á ®¦º °Å¤nµ¤µ¦´¹¦®´nµÅo oª¥ µ¦Î µ¦¼ £µ¡µ¤¦¦¤Án¸ Ê ÎµÁÈ ³o °Äo µ¦Îµ£µ¡ ¹ÉÁÈ ªµ¤¦ÎµÁ¡µ³´ª ¥µ¸É³nµ¥°Å¥´¼o°ºÉÅo ¦¼ £µ¡¦³Á£¸ ʹ¤¸ ªµ¤¨°£´¥¼ªnµ¦¼£µ¡¦³Á£°ºÉÇ ª·¸µ¦¡·¼ rª´ ° Picture Password -ansen, *avrila, Korolev, Ayers, & Swanstrom, 2003) ¼oÄo ³o °Á¨º°¸¤Theme) °¦¼£µ¡ Án ³Á¨, ¤ª ²¨² ¹É Ân¨³¸¤¦³°Åo ª¥¦¼ £µ¡Á¨ÈÇεª 30 ¦¼ ¼oÄo ³o °¨·¸É¦¼£µ¡Á¨ÈÇ Á®¨nµ´Ê Á¡ºÉ°Îµ®ÁÈ ¦®´nµ ª·¸µ¦¡·¼ rª´ ° Sobrado¨³ Birget Sobrado & Birget, 2002; :iedenbeck, :aters, Sobrado, & Birget, 2006) ¤¸®¤ ´Ê 3¦¼ Â:iedenbeck et al., 2006)Åo ÂnConvex Hull Click Scheme, Movable frame scheme ¨³Intersection scheme Ã¥´Ê 3 ¦¼ ¸ ÊÄo ª·¸µ¦Â¦¼ £µ¡ µÁ¨È εª ®¨µ¥¦o °¥¦¼£µ¡®o µ°¸É¤¸ µÎµ´ÎµÄ®o Á·ªµ¤Â°°´Â¨³Äo ¦³¥³Áª¨µµÄµ¦¤°®µ¦¼£µ¡ Passface 5eal8ser, 2005) ¨³ S-PassfaceTowhidi et al., 2013) ÁÈ ª·¸µ¦¡·¼ rª´  ¦®´nµ¦¼£µ¡ Ã¥Äo ¦¼£µ¡Ä®o µ»¨´ªÉ Šå¤¸Âª·¤µµµª·¥´ ° Valentine Valentine, 1998) ¸É¦»Åo ªµn ¤»¬¥rµ¤µ¦ÎµÂ¨³¦³¨¹¹Ä®o µ °¤»¬¥roª¥´Åo ¸ªnµ¦¼£µ¡¦³Á£°ºÉÇ ¹É µª·¥´ ° Towhidi ¨³ Masrom Towhidi & Masrom, 2009) Åo 嵦«¹¬µÂ¨³Åo o°¦»ªnµ Passface Äo nµ¥ Á o µÄnµ¥ ¨³Îµ¦®´nµÅo nµ¥ Ä ³Á¸¥ª´È¤¸µª·¥´ ° Hayashi, Dhamija, Christin¨³ Perrig Hayashi, Dhamija, Christin, & Perrig, 2008) ¨³ Hafiz, Abdullah, Ithnin¨³ Mammi Hafiz, Abdullah, Ithnin, & 199 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Mammi, 2008) ¡ªnµ ¼oÄo µnªÄ®n¤´ Á¨º°¦¼£µ¡Ä®o µ»¨¸É¤¸Áº Ê°µ·Á¸¥ª´®¦º °Ä¨o Á¸¥´Á° ®¦º °Á¨º°¦¼£µ¡Ä®o µ»¨¸É¦o ¼¹ ªnµ¤¸Án®r¹ ¼Ä µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡Ã¥°µ«´¥ª·¸µ¦¦³¨¹Åo 5ecall based technique) ÁÈ µ¦ ¡·¼ rª´ ¸ÉÄ®o o ļ o µ¦o µ®¦º °Á¨º°¦®´nµo ª¥Á° Ã¥ ´°Äµ¦¡· Ê ¼ rª´ Á¡ºÉ°Á o µ¼¦n ³ ¼oÄo ³o °Îµµ¤ª·¸µ¦Â¨³ ´Ê °µ¦¦o µ¦®´nµÄ®o Á®¤º°´¸É¦o µÅªo Ä ´Ê °µ¦¨³Á¸¥ ´ª°¥nµ µª·¥´ µ¦¡·¼ rª´ ¦®´nµ¦¼£µ¡Ã¥°µ«´¥ª·¸µ¦¦³¨¹Åo Recall based technique) Åo Ân Blonder Blonder, 1996), PassPoints Birget, Hong, & Memon, 2003,168; :iedenbeck, :aters, Birget, Brodskiy, & Memon, 2005b,102-127) ¨³ VisKey Sfr, 2005) ÁÈ ª·¸µ¦¡·¼ rª´ Ã¥Äo Á· µ¦Îµ®»¦¼ £µ¡ÄÇ Án ¦¼ £µ¡ªµ ®¦º °¦¼ £µ¡ª·ª Á¡ºÉ°Äo ÁÈ ¦®´nµ Ã¥¼oÄo ³o °¨·¸É» ¦¼£µ¡µ¤¨Îµ´Ä®o ¼ o °¹³¡·¼ rª´ εÁ¦È V-*2 Passlogix, 2005) ÁÈ ª·¸µ¦¡·¼ rª´ ¸ÉÄ®o o ļ o ´ µ¦´ª´»¦¼ £µ¡ Ã¥ª·¸µ¦¨·®¦º ° ¨µªµ Drag and drop) Á¡ºÉ°¦o µÁ¦ºÉ °¦µª®¦º °¨Îµ´Îµ®¦´Äo ÁÈ ¦®´nµ Án µ¦Á¨º°·É °µ¼oÁ¥ÈÅ ªµÁµ° ®¦º °µ¦»n¤´¨ÄΠʵ ÁÈ o ª´¦· ¦r ¤»¦¡«r¡´ r ¨³´r ®rª¦· ·Í¦ª´¦· ¦r ¤»¦¡«r¡´ r & ´r ®rª¦· ·Í¦, 2556,24-33)Åo Á°ª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡ Ã¥Äo ¦¼£µ¡µ¦r ¼ Ã¥Äo ª·µµª·´¥ ToonPasswords Hinds & Ekwueme, 2007) ¹É¨nµªªnµ ¤»¬¥r »Á¡«»ª´¥¥n°¤¦¼o ´´ªµ¦r ¼Â¨³¤¸ ªµ¤»oÁ¥ ®¦º °¤¸µ¦r ¼ ¸É¦³´Ä ´ r ¨³´r ®rª¦· ·Í¦ °»¡«r °·ª«rª·ª ´ r & ´r ®rª¦· ·Í¦, °»¡«r °·ª«rª·ª 2556,462-471 )Åo 嵦«¹¬µÁ·Îµ¦ªÁ¸É¥ª´´ ´¥Äµ¦°°Âª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼ £µ¡ ÂÄo µ¦µ¦· Ã¥¨µ¦Îµ¦ª¦» Åo ªnµ ¦³Á£ °¦¼ £µ¡ ¨µ¦Îµ¦ª¡ªnµ Åo Ân ¦¼ £µ¡·É¤¸¸ª· Åo ¦´µ¦Ã®ªÁÈ °´´®¹É ¨³¦¼£µ¡ª´»Åo ¦´µ¦Ã®ªÁÈ °´´¸É° ÂÄ®o Á®Èªnµ ¼oÄo ¤¸ªµ¤¡¹¡°Ä ĵ¦Äo ¦¼£µ¡¦¼¦¦¤¤µªnµ¦¼£µ¡µ¤¦¦¤Äµ¦¦o µ¦®´nµ¦¼£µ¡ Á¦¸ ¥Å¦ ¤³ÃÄ Â¨³´r ®rª¦· ·Í¦ Á¦¸ ¥Å¦ ¤³ÃÄ &´r ®rª¦· ·Í¦, 2556,453461) Åo 嵦¨°Á¡ºÉ°«¹¬µ°·· ¡¨ °¦¼ µ¦µ¦· ¨³¦¼ ¦¼ £µ¡¸É¤¸¨n°µ¦Îµ¦®´nµ ¦¼ £µ¡ Ã¥´ ´¥o µ¦¼ £µ¡Åo 嵦«¹¬µÁ¦¸ ¥Á¸¥ ¦¼ £µ¡Ä®o µ»¨Â¨³¦¼ £µ¡°ºÉǨµ¦¨° ¡ªnµ ¦³µ¦Â¨³¨»¤n ´ª°¥nµÄo Áª¨µÄµ¦Îµ¦¼£µ¡Ä®o µ»¨¤µªnµ¦¼£µ¡°ºÉǨ³µ¨µ¦Îµ¦ª ªµ¤¡¹¡°Ä ¡ªnµ¼oÄo ªn Ä®n¤¸ªµ¤¡¹¡°Än°¦¼ £µ¡Ä®o µ»¨¤µ¸É» ¨³¦¼ £µ¡¨Å¤o ÁÈ °´´ ° µµ¦«¹¬µµª·´¥¸ÉÁ¸É ¥ª o ° ¡ªnµ ¦³Á£ °¦¼ £µ¡¸Éε ¤µÄo ĵ¦¦o µ¦®´nµ Åo  n ¦¼£µ¡Ä®o µ»¨, ¦¼£µ¡µ¤¦¦¤, ¦¼£µ¡·ª´«r, ¦¼£µ¡´ªr, ¦¼£µ¡µ¦r ¼ , ¦¼ £µ¡¨Å¤o , ¦¼ £µ¡ªµ °ºÉÇ ²¨² Ťn¤¸µª·¥´ Ĩnµªªnµ¦³Á£ °¦¼£µ¡¸É¼ 夵Äo ĵ¦¦o µ¦®´nµ¦¼£µ¡¸ÉÁ®¤µ³¤¸É» º° ¦¼£µ¡¦³Á£Ä ¼oª·¥´ ¹Åo 嵦¨°Á¡ºÉ°®µ¦¼£µ¡¸ÉÁ®¤µ³¤Îµ®¦´µ¦Îµ¤µ¦o µÁÈ ¦®´nµ ª·¸µ¦ª·´¥ ¤¤·µ µª·´¥¸ Ê嵦¨°Á¡ºÉ°«¹¬µ¦³Á£ °¦¼ £µ¡¸É¤¸°··¨n°µ¦Äo µ °ª·¸µ¦¡·¼ rª´ ¦®´nµ¦¼£µ¡ Ã¥¤¸¤¤·µªnµ ¼oÄo µµ¤µ¦¦³¨¹¦¼£µ¡Ä®o µ»¨Åo ¸ªnµ¦¼£µ¡¦³Á£°ºÉÇ 200 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) ´ ´¥¸Éo°µ¦«¹¬µ ´ªÂ¦o º° ¦³Á£ °¦¼£µ¡ Åo Ân ¦¼£µ¡Ä®o µ»¨¸É¤¸ ºÉ°Á¸¥ ¦¼£µ¡Ä®o µ»¨´ªÉ Å ¦¼£µ¡¨Å¤o ¨³¦¼£µ¡µ¤¦¦¤ ´ªÂ¦µ¤ Åo ÂnÁª¨µ¸ÉÄo ĵ¦Îµ¦¼£µ¡Â¨³ÎµÂ®n °¦¼£µ¡µ¦µ¦· Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼£µ¡ ¨³ÎµÂ®n 媦¼£µ¡¸Éo ļ o µ¤µ¦¦³¨¹Åo ¨³ªµ¤¡¹¡°Ä °¼oÄo Á¦ºÉ°¤º°¸ÉÄo ĵ¦¨° 榤¸ÉÄo ĵ¦¨°¸ ʤ¸¨´ ¬³ÁÈ Á¤Îµ¦¼ £µ¡ ¼¡´µo ª¥£µ¬µ ASP.NET C) ¨³ ´¹ o °¤¼¨¨µ o °¤¼¨ MS SQL SERVER2008R2 å榤Á¤Îµ£µ¡¸ ʳ¼·´¨ Ê Server ¨³Îµ µ¦¨°nµ :eb Browser ¦³µ¦Â¨³¨»n¤´ª°¥n µ µ¦¨°¸ Ê ¤¸¦³µ¦Â¨³¨»¤n ´ª°¥nµ 72 ÁÈ µ¥ 37 ¨³®· 35 °µ¥»Îɵªnµ 20 ¸ εª 18 °µ¥»¦³®ªnµ 20-30 ¸ εª 50 °µ¥»¦³®ªnµ 31-40 ¸ εª 3 ¨³°µ¥»¦³®ªnµ 41-50 ¸ εª 1 ¦³´µ¦«¹¬µÎɵªnµ¦· µ¦¸ 16 ¦· µ¦¸ 44 ¨³¼ªnµ¦· µ¦¸ 12 ÁÈ ´Á¦¸ ¥´«¹¬µ 35 o µ¦µµ¦ 4 ¡´µ¦· ¬´Á° 22 »¦·nª´ª 4 ¦´o µ°·¦³ 5 ¨³°µ¸¡°ºÉÇ 2 µ¦°°Âµ¦¨° µ¦¨°¸ ʤ¸¨´ ¬³ÁÈ µ¦ª·¥´ Á·¨°Â :ithin Subject Design å嵦«¹¬µ´ ´¥ ¦³Á£ °¦¼£µ¡ Ã¥µ¦¨°¸ ʤ¸¨´ ¬³ÁÈ Á¤Îµ¦¼ £µ¡Â¨³ÎµÂ®n¸É¦µµ¦µ¦· µ 4x4 Á¦¸ ¥Å¦ ¤³ÃÄ &´r ®rª¦· ·Í¦, 2556,453-461; °»¡«r °·ª«rª·ª ´ r &´r ®rª¦· ·Í¦, 2556, 462-471) εª 6 ¦¼ Á¦· »¨¥r¦µ´´¥ &´r ®rª¦· ·Í¦, 2556,472-480) ¨³¦¼ £µ¡¸ÉÁÈ ´ªÁ¨º°¤¸Îµª 30 ¦¼ µ¦µ¦· µ 5x6 °»¡«r °·ª«rª·ª ´ r &´r ®rª¦· ·Í¦, 2556, 462-471) 嵦´¹¨Áª¨µ¸ÉÄo ĵ¦Îµ¦¼£µ¡Â¨³ÎµÂ®n °¦¼£µ¡µ¦µ¦· Áª¨µ¸ÉÄo ĵ¦¦³¨¹ ¦¼£µ¡Â¨³ÎµÂ®n 媦¼£µ¡¸Éo ļ o µ¤µ¦¦³¨¹Åo ¨³ª´¨ªµ¤¡¹¡°Äo ª¥Â°µ¤ ª·¸µ¦¨° ÄÂn¨³Á¤¨»¤n ´ª°¥nµ³o °Îµ¦¼£µ¡Â¨³ÎµÂ®n´Ê 6 £µ¡ ¨³Ä®o µ°Îµ®¦´Änε° ¨»¤n ´ª°¥nµ³o °¨·Á¨º°¦¼Â¨o ª¨µ¤µªµÄµ¦µ¦· ¸ÉÁÈ Îµ°Ä®o ¼ o °´¦¼Ê £µ¡Â¨³ÎµÂ®n Á¤Îµ£µ¡´Ê 4 Á¤´Ê Ân¨³Á¤³¤¸¦³Á£ °¦¼ £µ¡¸ÉÂnµ´º° ¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥ ¦¼ £µ¡Ä®o µ»¨´ªÉ Å ¦¼ £µ¡¨Å¤o ¨³¦¼ £µ¡µ¤¦¦¤ Ã¥¨Îµ´ °Á¤¦³®ªnµ¨»¤n ´ª°¥nµ´³¼ Ê »¤n ¨³Á¤ºÉ°Á¨nÁ¤Îµ£µ¡¦´Ê 4 £µ¡Â¨o ª¦³³Â®o µ°Â°µ¤ªµ¤¡¹¡°Ä 201 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) £µ¡¸É 1 ®o µ°Îµ£µ¡Â¨³ÎµÂ®n £µ¡¸É 2 ®o µ°Îµ®¦´Än µÎ ° ¨µ¦ª·´¥ µª·¥´ ¸ ʤ¸ª´ »¦³rÁ¡ºÉ°Îµµ¦«¹¬µ¹´ ´¥¦³Á£ °¦¼£µ¡¸ÉεĮo ¦®´nµ¦¼£µ¡¤¸ ¦³··£µ¡µ¦Äo µ¼» Ã¥ª´¨µ 1. Áª¨µ¸ÄÉ o ĵ¦Îµ¦¼£µ¡Â¨³ÎµÂ®n °¦¼£µ¡µ¦µ¦· µµ¦ª·Á¦µ³®rnµ·· Mauchlyus : 0.900 ®¦º °nµ··Åª¦r 7.315) ¨³¤¸nµ Sig. = 0.198 ¹É¤µªnµ Į= 0.05 ¹¦» Åo ªnµnµªµ¤Â¦¦ª °Áª¨µ¸ÉÄo ĵ¦Îµ¦¼ £µ¡Â¨³ÎµÂ®n °¦¼ £µ¡ µ¦µ¦· ŤnÂnµ´ ¨³µ¨µ¦ª·Á¦µ³®rnµ·· ) Sphericity Assumed) = 1.795, df. = 3, Mean Square = 74.314 ¨³¤¸µn Sig. = 0.149 ¹É ¤µªnµ Į= 0.05 ¹¦»Åo ªµn ´Ê 4 ¨»¤n µ¦¨°¤¸Áª¨µÁ¨¸¥É ¸ÉÄo ĵ¦Îµ¦¼£µ¡Â¨³ÎµÂ®n °¦¼£µ¡µ¦µ¦· ŤnÂnµ´ 2. Áª¨µ¸ÄÉ o ĵ¦¦³¨¹¦¼£µ¡Â¨³ÎµÂ®n µµ¦ª·Á¦µ³®rnµ·· Mauchlyus : = 0.696 ®¦º °nµ··Åª¦r 25.310) ¨³¤¸nµ Sig. = 0.000 ¹Éo °¥ªnµ Į= 0.05 ¹¦» Åo ªnµnµªµ¤Â¦¦ª °Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼ £µ¡Â¨³ÎµÂ®n Ânµ´ °¥nµ¤¸¥´ ε´¸É¦³´ªµ¤ÁºÉ°¤´É 95 Á°¦r ÁÈr¨³µ¨µ¦ª·Á¦µ³®rnµ·· F Sphericity Assumed) = 16.839, df. = 3, Mean Square = 4416.517 ¨³¤¸nµ Sig. = 0.000 ¹Éo °¥ªnµ Į= 0.05 ¹¦» Åo ªnµ¸É¦³´ ªµ¤ÁºÉ°¤´É 95 Á°¦r ÁÈr´ Ê 4 ¨»¤n µ¦¨°¤¸Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼ £µ¡Â¨³ÎµÂ®nÂnµ´°¥nµ¤¸ ´¥Îµ´µ·· εª 4 ¼n º° ¨»¤n µ¦¨°¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥Ânµ´¨»¤n µ¦¨° ¦¼ £µ¡¨Å¤o Mean Difference = 13.088, Sig. = 0.000), ¨»¤n µ¦¨°¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥ Ânµ´¨»¤n µ¦¨°¦¼ £µ¡µ¤¦¦¤ Mean Difference = 9.623, Sig. = 0.004), ¨»¤n µ¦¨° ¦¼£µ¡Ä®o µ»¨´ªÉ ÅÂnµ´¨»¤n µ¦¨°¦¼ £µ¡¨Å¤o Mean Difference = 16.596, Sig. = 0.000) ¨³¨»¤n µ¦¨°¦¼£µ¡Ä®o µ»¨´ªÉ ÅÂnµ´¨»¤n µ¦¨°¦¼£µ¡µ¤¦¦¤ Mean Difference = 13.131, Sig. = 0.000) 3. 媦¼£µ¡¸Éo ļ o µ¤µ¦¦³¨¹Åo µµ¦ª·Á¦µ³®rnµ·· Mauchlyus : = 0.975 ®¦º °nµ··Åª¦r 1.756) ¨³¤¸nµ Sig. = 0.882 ¹É ¤µªnµ Į= 0.05 ¹¦»Åo ªµn nµªµ¤Â¦¦ª °Îµª¦¼£µ¡¸Éo ļ o µ¤µ¦¦³¨¹Åo ŤnÂnµ´Â¨³ µ¨µ¦ª·Á¦µ³®rnµ·· F Sphericity Assumed) = 10.549, df. = 3, Mean Square = 17.528 ¨³¤¸nµ Sig. = 0.000 ¹É o °¥ªnµ Į= 0.05 ¹¦»Åo ªµn ¸É¦³´ªµ¤ÁºÉ°¤´É 95 Á°¦r ÁÈr´ Ê 4 ¨»¤n µ¦¨°¤¸Îµª ¦¼ £µ¡¸Éo ļ o µ¤µ¦¦³¨¹Åo Ânµ´°¥nµ¤¸¥´ ε´µ·· εª 4 ¼n º° ¨»¤n µ¦¨°¦¼ £µ¡ Ä®o µ»¨¸É¤¸ºÉ°Á¸¥Ânµ´¨»¤n µ¦¨°¦¼ £µ¡Ä®o µ»¨´ªÉ ÅMean Difference = 0.903, Sig. = 0.000), ¨»¤n µ¦¨°¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥Ânµ´¨»¤n µ¦¨°¦¼ £µ¡µ¤¦¦¤ Mean 202 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Difference = 0.750, Sig. = 0.010), ¨»¤n µ¦¨°¦¼ £µ¡Ä®o µ»¨´ªÉ ÅÂnµ´¨»¤n µ¦¨° ¦¼ £µ¡¨Å¤o Mean Difference = 0.944, Sig. = 0.000) ¨³¨»¤n µ¦¨°¦¼ £µ¡¨Å¤o Ânµ´¨»¤n µ¦ ¨°¦¼£µ¡µ¤¦¦¤ Mean Difference = 0.792, Sig. = 0.002) 4. ªµ¤¡¹¡°Ä °¼oÄo ¦³µ¦Â¨³¨»¤n ´ª°¥nµ¤¸ªµ¤¡¹¡°Än°¦¼ £µ¡¨Å¤o Mean = 3.444, S.D. = 0.767), ¦¼ £µ¡ Ä®o µ»¨¸É¤¸ºÉ°Á¸¥ Mean = 3.236, S.D. = 0.999), ¦¼£µ¡µ¤¦¦¤ Mean = 2.236, S.D. = 0.986) ¨³ ¦¼ £µ¡Ä®o µ»¨´ªÉ ÅMean = 1.847, S.D. = 0.767) µ¤¨Îµ´°µ¸ ʨµ¦Îµ¦ª¥´¡ªnµ εª ¦¼£µ¡¸Éo ļ o µ¤¸ªµ¤¡¹¡°Ä¤µ¸É» ¤¸µn Á¨¸¥É 3.611 ¦¼ µ¦µ¸É 1¦» ¨µ¦¨° ¦¼£µ¡ ¦¼ £µ¡ ¦¼ £µ¡ Ä®o µ»¨ Ä®o µ ¨Å¤o ¸É¤¸É °º Á¸¥ »¨´ÉªÅ 15.665 16.719 15.861 14.268 nªÁ¸É¥Á ¤µ¦µ S.D.) 7.555 9.401 8.856 7.378 Áª¨µÁ¨¸É¥ 42.912 46.419 29.823 33.288 nªÁ¸É¥Á ¤µ¦µ S.D.) 21.727 23.627 13.416 15.367 ³ÂÁ¨¸É¥ ) ݔ 4.75 3.85 4.79 4 Á°¦r ÁÈrªµ¤ ¼o ° 79.17 64.17 79.83 66.67 nªÁ¸É¥Á ¤µ¦µ S.D.) 1.766 2.18 1.883 1.993 ªµ¤¡¹¡°ÄÁ¨¸É¥ 3.236 1.847 3.444 2.236 0.999 0.898 0.767 0.986 ¦³Á£ °¦¼ £µ¡ Áª¨µ¸ÉÄo ĵ¦Îµ¦¼£µ¡Â¨³ ε®n °¦¼£µ¡µ¦µ¦· Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼£µ¡Â¨³ ε®n 媦¼£µ¡¸Éo ļ o µ¤µ¦ ¦³¨¹Åo ªµ¤¡¹¡°Ä °¼oÄo Áª¨µÁ¨¸É¥ ¦¼£µ¡ µ¤¦¦¤ ª·µ¸)) ݔ ª·µ¸)) ݔ ) ݔ nªÁ¸É¥Á ¤µ¦µ S.D.) 203 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) °£·¦µ¥Â¨³¦» ¨µ¦ª·´¥ ¦³Á£ °¦¼ £µ¡´Ê 4 ¦³Á£ Ťn¤¸¨n°Áª¨µ¸ÉÄo ĵ¦Îµ¦¼ £µ¡Â¨³ÎµÂ®n °¦¼ £µ¡ µ¦µ¦· Ânn ¨n°Îµª¦¼£µ¡Â¨³Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼£µ¡Â¨³ÎµÂ®nÃ¥¼oÄo µ¤µ¦¦³¨¹¦¼ £µ¡ ¨Å¤o Åo ¼o °¤µ¸É» ¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥ ¦¼ £µ¡µ¤¦¦¤ ¨³¦¼ £µ¡Ä®o µ»¨´ªÉ Å ¦°¨¤µµ¤¨Îµ´ ¨³Áª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼ £µ¡Â¨³ÎµÂ®n¸É¸¸É» º° ¦¼ £µ¡¨Å¤o ¦¼ £µ¡µ¤¦¦¤ ¦¼ £µ¡Ä®o µ»¨¸É¤¸ºÉ°Á¸¥Â¨³¦¼ £µ¡Ä®o µ»¨´ªÉ Å µ¤¨Îµ´ ¹¦» Åo ªnµ¦¼ £µ¡¸É¤¸¦³··£µ¡ µ¦Äo µ¼»º°¦¼ £µ¡¨Å¤o ¹É ´Â¥o ´µª·´¥ ° Valentine Valentine, 1998) ¸É¦» Åo ªnµ¤»¬¥r µ¤µ¦ÎµÂ¨³¦³¨¹¹Ä®o µ °¤»¬¥roª¥´ Åo ¸ªnµ¦¼£µ¡¦³Á£°ºÉÇ Ânµ¨µ¦¨°¥´¡ªnµ ¦¼£µ¡¨Å¤o ¨³¦¼£µ¡µ¤¦¦¤Å¤n¤¸ªµ¤Ânµ´Äo µÁª¨µ¸ÉÄo ĵ¦¦³¨¹¦¼ £µ¡Â¨³ÎµÂ®n ¨³¥´ ¤¸µª·¥´ ¸É´»ªnµ¦¼ £µ¡µ¤¦¦¤¤¸¦³··£µ¡o µªµ¤¨°£´¥¼¤µ Perrig & Song, 1999) ¹É µ¦¡·¼ rª´ ³o °Îµ¹¹´¦³· Ê ·£µ¡µ¦Äo µÂ¨³¦³··£µ¡o µªµ¤¨°£´¥¼ ¹ÁÈ Á¦ºÉ °¸É ª¦«¹¬µn°ÅÄ°µªnµ ¦¼ £µ¡¦³Á£Ä¤¸ ªµ¤Á®¤µ³¤Îµ®¦´ µ¦Îµ Ŧo µ¦®´nµ¦¼ £µ¡¸É ¤¸ ¦³··£µ¡µ¦Äo µÂ¨³¦³··£µ¡o µªµ¤¨°£´¥¼» ¦¦µ»¦¤ Á¦¸ ¥Å¦ ¤³ÃÄ, &´r ®rª¦· ·Í¦. 2556). °··¡¨ °¦¼ ¦· ¨³¦¼ £µ¡¸É¤¸n°µ¦Îµ ¦¼£µ¡.Paper presented at the µ¦¦³»¤ª·µµ¦Á°¨µª·¥´ ¦³´´·«¹¬µÂ®nµ·¦´Ê ¸É 29 ¤®µª·¥µ¨´¥Â¤n¢oµ®¨ª¦³®ªnµª´¸É 24-25 »¨µ¤ 2556, ®o µ 453-461. Á¦· »¨¥r¦µ´´¥, &´r ®rª¦· ·Í¦. 2556). µ¦«¹¬µÎµª£µ¡¸É¦³¨¹Åo ¸É¤¸µ¦Â£µ¡ÂÁ¦¸ ¥ ª¨³Âµ¦µ.Paper presented at the µ¦¦³»¤ª·µµ¦Á°¨µª·¥´ ¦³´´·«¹¬µ ®nµ·¦´Ê ¸É 29 ¤®µª·¥µ¨´¥Â¤n¢oµ®¨ª¦³®ªnµª´¸É 24-25 »¨µ¤ 2556, ®o µ 472-480. ª´¦· ¦r ¤»¦¡«r¡´ r, &´r ®rª¦· ·Í¦. 2556). µ¦«¹¬µ´ ´¥¸É¤¸°··¡¨n°µ¦Äo µÅo ¨³ªµ¤ ¨°£´¥ °¦®´nµÂµ¦r ¼. ªµ¦µ¦ÁÃ襸µ¦Á«¸ ¸É 9¤¦µ¤ - ¤·»µ¥,´¸É 1, ®o µ 24-33, 1, 24-33. °»¡«r °·ª«rª·ª ´ r, &´r ®rª¦· ·Í¦. 2556). Á·Îµ¦ª¹´ ´¥Äµ¦°°Â¦®´nµ¦¼ £µ¡ ¦· .Paper presented at the µ¦¦³»¤ª·µµ¦Á°¨µª·¥´ ¦³´´·«¹¬µÂ®nµ·¦´Ê ¸É 29 ¤®µª·¥µ¨´¥Â¤n¢oµ®¨ª¦³®ªnµª´¸É 24-25 »¨µ¤ 2556, ®o µ 462-471. Adams, A., & Sasse, M. A. 1999). 8sers are not the enemy. Communications of the ACM, 4212), 4046. Akula, S., & Devisetty, V. 2004). Image based registration and authentication system. Paper presented at the Proceedings of Midwest Instruction and Computing Symposium. Birget, J.-C., Hong, D., & Memon, N. D. 2003). Robust discretization, with an application to graphical passwords. IACR Cryptology ePrint Archive, 2003, 168. Blonder, *. E. 1996). *raphical password *oogle Patents. Boynton, R., & Boss, D. 1971). The effect of background luminance and contrast upon visual search performance. Illuminating Engineering, 664), 173. 204 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Brostoff, S., & Sasse, M. A. 2000). Are Passfaces more usable than passwords" A field trial investigation People and Computers XIV—Usability or Else! pp. 405-424) Springer. Davis, D., Monrose, F., & Reiter, M. K. 2004). On User Choice in Graphical Password Schemes. Paper presented at the USENIX Security Symposium. Dhamija, R., & Perrig, A. 2000). Deja Vu-A User Study: Using Images for Authentication. Paper presented at the USENIX Security Symposium. Dirik, A. E., Memon, N., & Birget, J.-C. 2007). Modeling user choice in the PassPoints graphical password scheme. Paper presented at the Proceedings of the 3rd symposium on Usable privacy and security. Dunphy, P., Nicholson, J., & 2livier, P. 2008). Securing passfaces for description. Paper presented at the Proceedings of the 4th symposium on Usable privacy and security. Dunphy, P., & <an, J. 2007). Do background images improve Draw a Secret graphical passwords? Paper presented at the Proceedings of the 14th ACM conference on Computer and communications security. Hafiz, M. D., Abdullah, A. H., Ithnin, N., & Mammi, H. K. 2008). Towards identifying usability and security features of graphical password in knowledge based authentication technique. Paper presented at the Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on. Hayashi, E., Dhamija, R., Christin, N., & Perrig, A. 2008). Use your illusion: secure authentication usable anywhere. Paper presented at the Proceedings of the 4th symposium on Usable privacy and security. Hinds, C., & Ekwueme, C. 2007). Increasing security and usability of computer systems with graphical passwords. Paper presented at the Proceedings of the 45th annual southeast regional conference. Hong, D., Man, S., Hawes, B., & Matthews, M. M. 2004). A Graphical Password Scheme Strongly Resistant to Spyware. Paper presented at the Security and Management. Jansen, :. A., *avrila, S., Korolev, V., Ayers, R., & Swanstrom, R. 2003). Picture password: a visual login technique for mobile devices US Department of Commerce, National Institute of Standards and Technology. Jermyn, I., Mayer, A. J., Monrose, F., Reiter, M. K., & Rubin, A. D. 1999). The Design and Analysis of Graphical Passwords. Paper presented at the Usenix Security. Kotadia, M. 2005). Microsoft :rite down your passwords. ZDNet Australia, May, 23. Kumar, V., *upta, M., Chaturvedi, A., Bhardwaj, A., & Singh, M. P. 2009). Click to Zoom-Inside Graphical Authentication. Paper presented at the Digital Image Processing, 2009 International Conference on. 205 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Kumari, S., & 2beroi, R. K. 2014). Defense against Shoulder Surfing Attack for Recognition Based *raphical Password. International Journal of Engineering And Computer Science, 37), 73847387. Man, Hong, D., & Mathews, M. 2003). A shoulder- surfing resistant graphical password scheme . . Paper presented at the International conference on security and management, Las Vegas, NV. mbH, S. *. f. D. 2005). User Manual visKey. Cologne, *ermany. Passlogix. 2005). Retrieved August 1, 2013, httpwww.passlogix.com Patrick, A., Long, A. C., & Flinn, S. 2003). HCI and security systems. Perrig, A., & Song, D. 1999). Hash Visualization a New Technique to improve Real-:orld Security. Proceedings of the 1999 International Workshop on Cryptographic Techniques and ECommerce, 131-138. RealUser. 2005). Retrieved March 7, 2012, httpwww.realuser.com Reynolds, R. E., :hite, R. M., & Hilgendorf, R. L. 1972). Detection and recognition of colored signal lights. Human Factors: The Journal of the Human Factors and Ergonomics Society, 143), 227-236. Sfr. 2005). Retrieved March 7, 2012. httpwww.viskey.comtech.html Shepard, R. N. 1967). Recognition memory for words, sentences, and pictures. Journal of verbal Learning and verbal Behavior, 61), 156-163. Sobrado, L., & Birget, J.-C. 2002). *raphical passwords. The Rutgers Scholar, an electronic Bulletin for undergraduate research, 4, 2002. Stobert, E., Forget, A., Chiasson, S., van 2orschot, P. C., & Biddle, R. 2010). Exploring usability effects of increasing security in click-based graphical passwords. Paper presented at the Proceedings of the 26th Annual Computer Security Applications Conference. Suo, X., =hu, <., & 2wen, *. S. 2005). Graphical passwords: A survey. Paper presented at the Computer security applications conference, 21st annual. Syukri, A. F., 2kamoto, E., & Mambo, M. 1998). A user identification system using signature written with mouse. Paper presented at the Information Security and Privacy. Takada, T., & Koike, H. 2003). Awase-E Image-based authentication for mobile phones using user’s favorite images Human-computer interaction with mobile devices and services pp. 347-351) Springer. Tao, H., & Adams, C. 2008). Pass-*o A Proposal to Improve the Usability of *raphical Passwords. IJ Network Security, 72), 273-292. Thorpe, J., & Van 2orschot, P. 2004). Towards secure design choices for implementing graphical passwords. Paper presented at the Computer Security Applications Conference, 2004. 20th Annual. Towhidi, F., & Masrom, M. 2009). A Survey on Recognition Based *raphical User Authentication Algorithms. arXiv preprint arXiv:0912.0942. 206 ICMSIT 2015: International Conference on Management Science, Innovation, and Technology 2015 Faculty of Management Science, Suan Sunandha Rajabhat University (http://www.icmsit.ssru.ac.th) Towhidi, F., Masrom, M., & Manaf, A. A. 2013). An enhancement on passface graphical password authentication. TextRoad Publication. Valentine, T. 1998). An evaluation of the Passface personal authentication system Technical Report, *oldsmiths College, University of London. van Oorschot, P. C., & Thorpe, J. 2005). On the security of graphical password schemes Technical Report TR-05-11. Integration and extension of USENIX Security 2004 and ACSAC 2004 papers. :einshall, D., & Kirkpatrick, S. 2004). Passwords you'll never forget, but can't recall. Paper presented at the CHI 04 extended abstracts on Human factors in computing systems. :iedenbeck, S., :aters, J., Birget, J.-c., Brodskiy, A., & Memon, N. 2005a). PassPoints Design and longitudinal evaluation of a graphical password system. International Journal of Human Computer Studies, (Special Issue on HCI Research in Privacy and Security)63), 102-127. :iedenbeck, S., :aters, J., Birget, J.-C., Brodskiy, A., & Memon, N. 2005b). PassPoints Design and longitudinal evaluation of a graphical password system. International Journal of HumanComputer Studies, 631), 102-127. :iedenbeck, S., :aters, J., Sobrado, L., & Birget, J.-C. 2006). Design and evaluation of a shouldersurfing resistant graphical password scheme. Paper presented at the Proceedings of the working conference on Advanced visual interfaces. :illiams, L. 1966). The effect of target specification on objects fixated during visual search. Perception & Psychophysics, 19), 315-318. 207