SlideShare une entreprise Scribd logo
1  sur  17
Submitted By: Achal S. Khawale.
Guided By: Prof.S.N.Khandare.
Department Of (M.C.A.3rd)
H.V.P.M. Amravati.
2013-2014
Contents:
Introduction
Graphical Password
Advantages of Graphical Password
Drawbacks
Solution to Shoulder Surfing Problem
Usability
Conclusion
Introduction:
 Most common computer authentication method (Text-Based
Passwords).
• Difficulty of remembering passwords.
 Easy to remember => Easy to guess
 Hard to guess => Hard to remember
 Users tend to write passwords down or use the same passwords for
different accounts.
 An alternative: Graphical Passwords.
• Psychological studies: Human can remember pictures better than text.
Graphical Password:
• An authentication system that works by having the user select
from images, in a specific order, presented in a graphical user
interface (GUI).
• The graphical-password approach is sometimes called graphical
user authentication (GUI).
Classification Techniques:
 Recognition Based Techniques:
• A user is presented with a set of images and the user passes
the authentication by recognizing and identifying the images he
selected during the registration stage.
 Recall Based Techniques:
• A user is asked to reproduce something that he created or
selected earlier during the registration stage.
Classification Techniques:
 Recognition Based Techniques:
• A user is presented with a set of images and the user passes
the authentication by recognizing and identifying the images he
selected during the registration stage.
 Recall Based Techniques:
• A user is asked to reproduce something that he created or
selected earlier during the registration stage.
Recognition Based Techniques:
 Dhamija & Perring Scheme:
• Pick several pictures out of many
choices, identify later in
authentication.
• Take longer to create graphical
passwords.
 Sobrado & Birget Scheme:
• Systems display a number of
pass-objects (pre-selected by user)
among many other objects, user
click inside the convex hull ounded
by pass-objects.
Recognition Based Techniques:
 Other Schemes:
Using human faces as password Select a sequence of images as password
Recall Based techniques:
 Draw-A-Secret (DAS) Scheme:
• User draws a simple picture on 2D grid, the co ordinates
of the grids occupied by the picture are stored in the order
of drawing.
• Redrawing has to touch the
same grids in the same
sequences in authentication.
Advantages of Graphical Passwords:
 Provide a way of making more human-friendly
passwords while increasing the level of security.
 On average–millions of years to break into the system.
 Dictionary attacks are infeasible.
Drawbacks:
 The shoulder surfing problem:
 As the name implies, shoulder is watching over people’s shoulders as
they process information.
Example includes observing the keyboard as a person types his or her
password, enters a PIN number, or views personal information.
 Because of their graphic nature, nearly all graphical password
schemes are quite vulnerable to shoulder surfing. Most of the existing
schemes simple circumvent the problem by stating the graphical
passwords should only be used with handheld devices or workstation set
up in such a way that only one person can see the screen at the time of
login.
However, it is possible to create schemes to counter shoulder surfing
problem.
Solution of Shoulder surfing problem:
Triangle Scheme: Movable Frame Scheme:
Usability:
 Pictures are easier to remember than text strings.
 Password registration and login process take too long.
 Require much more storage space than text based passwords.
Conclusion:
 Main argument for Graphical Password:
• Satisfies both conflicting requirements i.e. it is easy to remember & it is
hard to guess.
 More difficult to break graphical passwords from traditional
attack methods:
• Brute Force Search
• Dictionary Attack
• Spyware
 Not yet widely used, current graphical password techniques are
still immature.
 By implementing other special geometric configurations like
triangle & movable frame, one can achieve more security.
Reference
 www.searchsecurity.teachtarget.com
 www.acsac.org
 www.ieexplorer.ieee.org
Thank
You.!!!

Contenu connexe

Tendances

Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
Vikram Verma
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Tendances (20)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
face recognition
face recognitionface recognition
face recognition
 
Signature verification
Signature verificationSignature verification
Signature verification
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 

En vedette

Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
Dr.YNM
 

En vedette (16)

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
11aman
11aman11aman
11aman
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
 
Applications of 8051 microcontrollers
Applications of 8051 microcontrollersApplications of 8051 microcontrollers
Applications of 8051 microcontrollers
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
 

Similaire à Graphical Password Authentication

graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
Geetha982072
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
Snehal Wankhede
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 

Similaire à Graphical Password Authentication (20)

A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
Nilesh
Nilesh Nilesh
Nilesh
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Graphical Password Authentication

  • 1. Submitted By: Achal S. Khawale. Guided By: Prof.S.N.Khandare. Department Of (M.C.A.3rd) H.V.P.M. Amravati. 2013-2014
  • 2. Contents: Introduction Graphical Password Advantages of Graphical Password Drawbacks Solution to Shoulder Surfing Problem Usability Conclusion
  • 3. Introduction:  Most common computer authentication method (Text-Based Passwords). • Difficulty of remembering passwords.  Easy to remember => Easy to guess  Hard to guess => Hard to remember  Users tend to write passwords down or use the same passwords for different accounts.  An alternative: Graphical Passwords. • Psychological studies: Human can remember pictures better than text.
  • 4. Graphical Password: • An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). • The graphical-password approach is sometimes called graphical user authentication (GUI).
  • 5. Classification Techniques:  Recognition Based Techniques: • A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.  Recall Based Techniques: • A user is asked to reproduce something that he created or selected earlier during the registration stage.
  • 6. Classification Techniques:  Recognition Based Techniques: • A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.  Recall Based Techniques: • A user is asked to reproduce something that he created or selected earlier during the registration stage.
  • 7. Recognition Based Techniques:  Dhamija & Perring Scheme: • Pick several pictures out of many choices, identify later in authentication. • Take longer to create graphical passwords.  Sobrado & Birget Scheme: • Systems display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull ounded by pass-objects.
  • 8. Recognition Based Techniques:  Other Schemes: Using human faces as password Select a sequence of images as password
  • 9. Recall Based techniques:  Draw-A-Secret (DAS) Scheme: • User draws a simple picture on 2D grid, the co ordinates of the grids occupied by the picture are stored in the order of drawing. • Redrawing has to touch the same grids in the same sequences in authentication.
  • 10. Advantages of Graphical Passwords:  Provide a way of making more human-friendly passwords while increasing the level of security.  On average–millions of years to break into the system.  Dictionary attacks are infeasible.
  • 11. Drawbacks:  The shoulder surfing problem:  As the name implies, shoulder is watching over people’s shoulders as they process information. Example includes observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.  Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing. Most of the existing schemes simple circumvent the problem by stating the graphical passwords should only be used with handheld devices or workstation set up in such a way that only one person can see the screen at the time of login. However, it is possible to create schemes to counter shoulder surfing problem.
  • 12. Solution of Shoulder surfing problem: Triangle Scheme: Movable Frame Scheme:
  • 13. Usability:  Pictures are easier to remember than text strings.  Password registration and login process take too long.  Require much more storage space than text based passwords.
  • 14. Conclusion:  Main argument for Graphical Password: • Satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  More difficult to break graphical passwords from traditional attack methods: • Brute Force Search • Dictionary Attack • Spyware  Not yet widely used, current graphical password techniques are still immature.  By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.
  • 16.