SlideShare une entreprise Scribd logo
1  sur  20
DATA SECURITY WITH
IMAGES THROUGH
CLICK POINTS
PRESENTED BY-
SARIA AFZAL and MANSI GUPTA
PICTURE PASSWORD AUTHENTICATION
The two most commonly used
techniques in picture password
authentication are-
Recognition based techniques
Recall based techniques
RECOGNITION AND RECALL
Recognition based
techniques
A user is presented with a set of images and the
user passes the authentication by recognizing and
identifying the images he selected during the
registration stage.
Recall based techniques
A user is asked to reproduce something that he
created or selected during the registration stage.
PICTURE PASSWORD
AUTHENTICATION
MODULES
USER REGISTRATION
PROCESS
PICTURE SELECTION
PROCESS
SYSTEM LOGIN
PROCESS
MODULE 1
USER REGISTRATION PROCESS
USER REGISTRATION PROCESS
REGISTER
Click on
REGISTER
button
Enter the general entries in their respective fields
user
Verify the
entries and
enter in the
database
MODULE 2
PICTURE SELECTION PROCESS
HOW TO SELECT THE PICTURE?
AFTER SELECTING A PICTURE
User click on
the point
Select
another
point
Point and the image will be
stored in the database
MODULE 3
SYSTEM LOGIN PROCESS
USERNAME VERIFICATION PROCESS
Username
verification
Checks the
username in the
database
Correct image
If username
not matched
Incorrect
username
User enters
the
username
Reenter
the
username
CLICK POINT VERIFICATION PROCESS
Database contains
saved picture and point
Correct
username
CORRECT CLICK POINT OPENS THE SYSTEM
PROTECTED WITH PASSWORD
ADVANTAGES OF PICTURE PASSWORD
 Pictures are easy to remember.
 Graphical password schemes provide a way
of making more human friendly passwords.
 Security of the system is very high.
 Dictionary attacks are infeasible.
DRAWBACKS OF PICTURE PASSWORD
 Password registration and log-in process
are long.
 Require much more storage space than text
based passwords.
 Not suitable for visually disabled people.
 Shoulder surfing.
DO’S AND DON’TS FOR SECURED
PASSWORD
Do’s
 Use easy to remember picture.
 Avoid dark spots on the picture while selecting the click
point.
 Choose 3 to 5 pictures for more stronger password.
 As the number of pictures increases the password
become more tight.
Don’ts
 Do not use too much bright and black pictures for
password.
Technique used-
• Recall based techniques
Technology used-
• Java
Tools-
• Netbeans6.9.1
• Oracle database
• Apache
Possible Attacks-
• Guessing
• Shoulder surfing
APPLICATIONS OF PICTURE PASSWORD SYSTEM
Hard disk locking.
System login and logout
process.
Folder locking.
Web login applications.
CONCLUSIONS
1. Picture password is an alternative to
an textual alphanumeric passwords.
2. It satisfies both conflicting
requirements i.e. it is easy to
remember & it is hard to guess.
3. picture password is still immature,
more research is required in this field.
THANK YOU…

Contenu connexe

Tendances

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attackSaurav Sinha
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password taniamutholil
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attackserneelkamal
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 

Tendances (18)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 

Similaire à Data security with Images through clickpoints

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsIRJET Journal
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 

Similaire à Data security with Images through clickpoints (20)

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Research ppr
Research pprResearch ppr
Research ppr
 
CNS Review PPT.pptx
CNS  Review PPT.pptxCNS  Review PPT.pptx
CNS Review PPT.pptx
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 

Data security with Images through clickpoints

  • 1. DATA SECURITY WITH IMAGES THROUGH CLICK POINTS PRESENTED BY- SARIA AFZAL and MANSI GUPTA
  • 2. PICTURE PASSWORD AUTHENTICATION The two most commonly used techniques in picture password authentication are- Recognition based techniques Recall based techniques
  • 3. RECOGNITION AND RECALL Recognition based techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. Recall based techniques A user is asked to reproduce something that he created or selected during the registration stage.
  • 6. USER REGISTRATION PROCESS REGISTER Click on REGISTER button Enter the general entries in their respective fields user Verify the entries and enter in the database
  • 8. HOW TO SELECT THE PICTURE?
  • 9. AFTER SELECTING A PICTURE User click on the point Select another point Point and the image will be stored in the database
  • 11. USERNAME VERIFICATION PROCESS Username verification Checks the username in the database Correct image If username not matched Incorrect username User enters the username Reenter the username
  • 12. CLICK POINT VERIFICATION PROCESS Database contains saved picture and point Correct username
  • 13. CORRECT CLICK POINT OPENS THE SYSTEM PROTECTED WITH PASSWORD
  • 14. ADVANTAGES OF PICTURE PASSWORD  Pictures are easy to remember.  Graphical password schemes provide a way of making more human friendly passwords.  Security of the system is very high.  Dictionary attacks are infeasible.
  • 15. DRAWBACKS OF PICTURE PASSWORD  Password registration and log-in process are long.  Require much more storage space than text based passwords.  Not suitable for visually disabled people.  Shoulder surfing.
  • 16. DO’S AND DON’TS FOR SECURED PASSWORD Do’s  Use easy to remember picture.  Avoid dark spots on the picture while selecting the click point.  Choose 3 to 5 pictures for more stronger password.  As the number of pictures increases the password become more tight. Don’ts  Do not use too much bright and black pictures for password.
  • 17. Technique used- • Recall based techniques Technology used- • Java Tools- • Netbeans6.9.1 • Oracle database • Apache Possible Attacks- • Guessing • Shoulder surfing
  • 18. APPLICATIONS OF PICTURE PASSWORD SYSTEM Hard disk locking. System login and logout process. Folder locking. Web login applications.
  • 19. CONCLUSIONS 1. Picture password is an alternative to an textual alphanumeric passwords. 2. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. 3. picture password is still immature, more research is required in this field.