SlideShare une entreprise Scribd logo
1  sur  23
   What you are (biometric)

   What you have (token)

   What you know (password)
   Finger attacks

   Word of mouth transfer

   Dictionary attacks

   Image Based Authentication (IBA) can solve all of
    these
IBA is based on a user’s successful
identification of his image password set. After the
username is sent to the authentication module, it
responds by displaying an image set, which consists
of images from the user’s password set mixed with
other images. The user is authenticated by correctly
identifying the password images.
   Image Space(IS): the set of all images used by IBA
    system.

   Individual Image Set (IIS) – the set of images that a
    user (u) chooses to authenticate himself.

   Key Image – any image in a user's IIS.

   Presentation Set (PS) – the set of images
    presented to a user from which the key images
    must be selected for a given authentication attempt.
 Authentication User Agent (AUA)
 Authentication Server (AS)



       The communication between them is encrypted
    using authenticated Diffie-Hellman.


      The AS is assumed to be a part of the Trusted
    Computing Base.
 Image     Set Selection
     Alice selects ‘n’ images (n is set by the
    administrator, Bob)
     Bob stores the image set at the AS


 Presentation      Subsets
     Bob picks one image from IISa and some other
    images from IS-IISa for each PS_i.
     Alice picks the IISa image from each PS_i.
 A→B: Username= Alice
 B→A: Presentation set for Round 1, PS1.

 A→B: Identified image.

 B→A: Presentation set for Round 2, PS2.

 A→B: Identified image.

 …...

 B→A: Presentation set for Round R, PSR.

 A→B: Identified image.

 If all R steps are successful, Bob authenticates
  Alice.
    Image Based Authentication is not foolproof.

    There are four points of vulnerability:
1.    Information stored on the AS.
2.    Information Sent between the AS and AUA.
3.    The output at the AUA.
4.    The input at the AUA.
   Eve can observe or log Alice’s Key stroke and later
    authenticate herself as Alice.




 Display the images in random order.
      Keystrokes are only meaningful for this PS in
this display order.
   Eve can observe Alice’s screen ( during the
    authentication process) and later authenticate
    herself as Alice.


    Counter:
 Display the image when the mouse is over it.
 Otherwise gray out the image.

 If input is hidden, then which image is selected is
  not known- Only get PS_i’s.
   Brute Force Attack

   Frequency Correlation Attack
   Intersection Attack
   Logic Attack

   Countering Frequency Correlation Attack
   Decoy Screen
   Image Buckets
   Fixed PS per Key Image
   Image Set Storage :
     Password schemes normally store only the hash of a
user’s password. By compromising the server, the attacker
cannot recover the password. In our scheme, the server
cannot merely store the hash. The server needs to know
the image set itself in order to present the authentication
screens. If a server is compromised, it will be possible to
retrieve the image set of every user. However, many
authentication schemes depend heavily on the
impenetrability of the Trusted Computing Base and they
have been widely deployed.
 CAPTCHA stands for Completely Automated
  Public Turing Test to tell Computers and
  Humans Apart.
 CAPTCHA is an automated test that can
  distinguish between machines and humans
  alike.
 It differentiates between humans and bot by
  setting some task that is easy for most humans
  to perform but is more difficult and time
  consuming for current bots to complete.
 Preventing Comment Spam in Blogs.
 Protecting Website Registration.

 Protecting Email Addresses From Scrapers.

 Online Polls.

 Preventing Dictionary Attacks.

 Worms and Spam.
1.   PIX:
 Create a large Database of labeled images.
 Pick a concrete object.

 Pick more random images of the object from the
  image database.
 Distort the images

 Ask user to pick the object for a list of words.
2. BONGO

   Visual Puzzle

   Computer can generate and display, but not solve

   Bongo is based on a visual pattern recognition
    problem.
   As Figure below shows, a Bongo CAPTCHA uses
    two sets of images; each set has some specific
    characteristic. One set might be boldface, for
    example, while the other is not. The system then
    presents a single image to the user who then must
    specify the set to which the image belongs.
3. Pessimal Print

   Pessimal Print works by pseudo randomly
    combining a word, font, and a set of image
    degradations to generate images like the ones in
    Figure.
Image-based authentication techniques, although currently
in their infancy, might have a wider applicability in future.
We perceive it be a more user-friendly technique that
helps to increase the password quality tremendously
compared to a text-based approach. In this seminar we have
proposed a simple yet secure authentication technique.
We have also identified various issues related with such a
system and proposed a novel concept of Image Buckets in
overcoming some shortcomings.
        Its better to be safe than sorry!!
Image based authentication

Contenu connexe

Tendances

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Fundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingFundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingKarthicaMarasamy
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processingPremaPRC211300301103
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face RecognitionNikhil Katte
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
Face mask detection
Face mask detection Face mask detection
Face mask detection Sonesh yadav
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseasesMuneesh Wari
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 

Tendances (20)

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Fundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingFundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processing
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processing
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Image Security
Image SecurityImage Security
Image Security
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseases
 
Application Security
Application SecurityApplication Security
Application Security
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 

En vedette

Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Deepak Yadav
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksOresti Banos
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMacijjournal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screensree438
 
Coin recognition using matlab
Coin recognition using matlabCoin recognition using matlab
Coin recognition using matlabslmnsvn
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 
Security features of indian banknotes given by rbi
Security features of indian banknotes given by rbiSecurity features of indian banknotes given by rbi
Security features of indian banknotes given by rbiAbhilash Kotawar
 
Watermark
WatermarkWatermark
Watermarkravi33s
 

En vedette (20)

Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
 
Coin recognition using matlab
Coin recognition using matlabCoin recognition using matlab
Coin recognition using matlab
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
11aman
11aman11aman
11aman
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Quiery builder
Quiery builderQuiery builder
Quiery builder
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Security features of indian banknotes given by rbi
Security features of indian banknotes given by rbiSecurity features of indian banknotes given by rbi
Security features of indian banknotes given by rbi
 
Watermark
WatermarkWatermark
Watermark
 

Similaire à Image based authentication

Image based authentication
Image based authentication  Image based authentication
Image based authentication Rishabh Gupta
 
Face identification
Face  identificationFace  identification
Face identification27vipin92
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...AbhilashPasupula
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With FlaskAI Publications
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWCAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWIJLT EMAS
 
Computer Vision.pdf
Computer Vision.pdfComputer Vision.pdf
Computer Vision.pdfBantuBytes
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 

Similaire à Image based authentication (20)

Image based authentication
Image based authentication  Image based authentication
Image based authentication
 
Face identification
Face  identificationFace  identification
Face identification
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With Flask
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
An03402300234
An03402300234An03402300234
An03402300234
 
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWCAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
 
Computer Vision.pdf
Computer Vision.pdfComputer Vision.pdf
Computer Vision.pdf
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 

Plus de أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Plus de أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Image based authentication

  • 1.
  • 2. What you are (biometric)  What you have (token)  What you know (password)
  • 3. Finger attacks  Word of mouth transfer  Dictionary attacks  Image Based Authentication (IBA) can solve all of these
  • 4. IBA is based on a user’s successful identification of his image password set. After the username is sent to the authentication module, it responds by displaying an image set, which consists of images from the user’s password set mixed with other images. The user is authenticated by correctly identifying the password images.
  • 5. Image Space(IS): the set of all images used by IBA system.  Individual Image Set (IIS) – the set of images that a user (u) chooses to authenticate himself.  Key Image – any image in a user's IIS.  Presentation Set (PS) – the set of images presented to a user from which the key images must be selected for a given authentication attempt.
  • 6.  Authentication User Agent (AUA)  Authentication Server (AS)  The communication between them is encrypted using authenticated Diffie-Hellman.  The AS is assumed to be a part of the Trusted Computing Base.
  • 7.  Image Set Selection  Alice selects ‘n’ images (n is set by the administrator, Bob)  Bob stores the image set at the AS  Presentation Subsets  Bob picks one image from IISa and some other images from IS-IISa for each PS_i.  Alice picks the IISa image from each PS_i.
  • 8.  A→B: Username= Alice  B→A: Presentation set for Round 1, PS1.  A→B: Identified image.  B→A: Presentation set for Round 2, PS2.  A→B: Identified image.  …...  B→A: Presentation set for Round R, PSR.  A→B: Identified image.  If all R steps are successful, Bob authenticates Alice.
  • 9. Image Based Authentication is not foolproof.  There are four points of vulnerability: 1. Information stored on the AS. 2. Information Sent between the AS and AUA. 3. The output at the AUA. 4. The input at the AUA.
  • 10. Eve can observe or log Alice’s Key stroke and later authenticate herself as Alice.  Display the images in random order. Keystrokes are only meaningful for this PS in this display order.
  • 11. Eve can observe Alice’s screen ( during the authentication process) and later authenticate herself as Alice. Counter:  Display the image when the mouse is over it.  Otherwise gray out the image.  If input is hidden, then which image is selected is not known- Only get PS_i’s.
  • 12. Brute Force Attack  Frequency Correlation Attack  Intersection Attack  Logic Attack  Countering Frequency Correlation Attack  Decoy Screen  Image Buckets  Fixed PS per Key Image
  • 13. Image Set Storage : Password schemes normally store only the hash of a user’s password. By compromising the server, the attacker cannot recover the password. In our scheme, the server cannot merely store the hash. The server needs to know the image set itself in order to present the authentication screens. If a server is compromised, it will be possible to retrieve the image set of every user. However, many authentication schemes depend heavily on the impenetrability of the Trusted Computing Base and they have been widely deployed.
  • 14.
  • 15.  CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Humans Apart.  CAPTCHA is an automated test that can distinguish between machines and humans alike.  It differentiates between humans and bot by setting some task that is easy for most humans to perform but is more difficult and time consuming for current bots to complete.
  • 16.  Preventing Comment Spam in Blogs.  Protecting Website Registration.  Protecting Email Addresses From Scrapers.  Online Polls.  Preventing Dictionary Attacks.  Worms and Spam.
  • 17. 1. PIX:  Create a large Database of labeled images.  Pick a concrete object.  Pick more random images of the object from the image database.  Distort the images  Ask user to pick the object for a list of words.
  • 18.
  • 19. 2. BONGO  Visual Puzzle  Computer can generate and display, but not solve  Bongo is based on a visual pattern recognition problem.
  • 20. As Figure below shows, a Bongo CAPTCHA uses two sets of images; each set has some specific characteristic. One set might be boldface, for example, while the other is not. The system then presents a single image to the user who then must specify the set to which the image belongs.
  • 21. 3. Pessimal Print  Pessimal Print works by pseudo randomly combining a word, font, and a set of image degradations to generate images like the ones in Figure.
  • 22. Image-based authentication techniques, although currently in their infancy, might have a wider applicability in future. We perceive it be a more user-friendly technique that helps to increase the password quality tremendously compared to a text-based approach. In this seminar we have proposed a simple yet secure authentication technique. We have also identified various issues related with such a system and proposed a novel concept of Image Buckets in overcoming some shortcomings. Its better to be safe than sorry!!