Figure 6From: Understanding user perceptions of transparent authentication on a mobile deviceSecurity provision of transparent authentication compared to owner’s current method. Each category had 10 participants; some declined to provide a specific value, as shown by the shorter bars.Back to article page