This document proposes a new technique called hash visualization to improve security systems by addressing human factors. It summarizes two key human limitations in security - difficulty comparing meaningless strings and remembering strong passwords. The document then introduces hash visualization as an approach to generate structured images from hashes or passwords to leverage human image recognition abilities. It outlines requirements for hash visualization algorithms, such as producing regular images that are perceptually indistinguishable for near-identical inputs. The document proposes "Random Art" as a prototype hash visualization system and discusses applying the approach to improve security of root key validation and user authentication.