Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes