1. Mihajlov, M., Borka, J.: On designing usable and secure recognition-based graphical authentication mechanisms. Interact. Comput. 23, 582–593 (2011)
2. Algorithms for Intelligent Systems;S Varshney,2020
3. Xiaoyuan, S., Ying, Z., Scott, G.: Graphical passwords: a survey. In: 21st Annual Computer Security Applications Conference (ACSAC'05), pp. 463–472. Tucson, AZ (2005)
4. Towhidi, F., Masrom, M.: A survey on recognition-based graphical user authentication algorithms. Int. J. Comput. Sci. Inf. Secur. 6(2), 119–127 (2009)
5. Haichang, G., Wei, J., Fei, Y., Licheng, M.: A survey on the use of graphical passwords in security. J. Softw. 8(7), 1678–1698 (2013)