0% found this document useful (0 votes)
39 views

Graphical Authentication System (Autosaved)

This document summarizes a project on graphical password authentication. It introduces graphical passwords as an alternative to text passwords that aims to be both easier for users to remember and harder for attackers to guess. It reviews existing recognition-based graphical password techniques and proposes a framework for a new system. While graphical passwords could improve usability and security over text passwords by being more memorable and resistant to dictionary attacks, they also have disadvantages like longer login times and vulnerability to shoulder surfing that current research seeks to address.

Uploaded by

Rohit Sabale
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Graphical Authentication System (Autosaved)

This document summarizes a project on graphical password authentication. It introduces graphical passwords as an alternative to text passwords that aims to be both easier for users to remember and harder for attackers to guess. It reviews existing recognition-based graphical password techniques and proposes a framework for a new system. While graphical passwords could improve usability and security over text passwords by being more memorable and resistant to dictionary attacks, they also have disadvantages like longer login times and vulnerability to shoulder surfing that current research seeks to address.

Uploaded by

Rohit Sabale
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Graphical Password

Authentication System

Group Members
• Dongare Akash
PROJECT GUIDE
• Sabale Rohit
PROF: B.JADHAV
• Kokane Shubham
Introduction
Overview of the Authentication Methods
Text Password and drawbacks.
Literature survey.
The survey
 Recognition Based Techniques
Data Flow Diagram
Framework.
Discussion
 Advantages
 disadvantages
Conclusion
 What is PASSWORD

The term PASSWORD commonly refers to a secret used for


authentication. Passwords are the most commonly used method for
identifying users in computer and communication systems.

 PASSWORDS are used for:

 Logging into accounts.


 Retrieving emails.
 Accessing applications.
 Networks.
 Websites
 Databases
 workstations
 Token based authentication
 Key cards, bank cards, smart card, …

 Biometric based authentication


 Fingerprints, iris scan, facial recognition, …

 Knowledge based authentication


 Text-based passwords, picture-based passwords, …
 Most widely used authentication techniques
Text Password
Text password is a secret word or string of characters that is
used for user authentication to prove his identity and gain access
to resources.

Drawback
 Difficulty of remembering passwords.
easy to remember -> easy to guess

 hard to guess -> hard to remember

 Vulnerable to attacks like Dictionary attack, Brute


force
attack .
Many solutions have been proposed. Graphical
passwordis one of the solutions.
Literature survey
 Graphical passwords were originally described by BLONDER
in 1996.

 A graphical password is an authentication system that


works by having the user select from images, in a specific
order, presented in a graphical user interface (GUI).

 For this reason, the graphical-password approach is


sometimes called graphical user authentication (GUA).
Use of graphical password:

 Web log-in application.

 ATM machine.

 Mobile device.
The Survey

 Recognition Based Techniques


A user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he
selected during the registration stage
 Dhamija and Perrig Scheme
Pick several pictures out of many choices, identify them later
in authentication.
 Passface scheme:
In this technique human faces are used as password.
 Sobrado and Birget Scheme
System display a number of pass-objects (pre-selected by user)
among many other objects, user click inside the convex hull
bounded by pass-objects.
Data Flow Diagram
Framework
 Advantages of Graphical password

 Graphical password schemes provide a way of making more


human-friendly passwords .

 Here the security of the system is very high.

 Dictionary attacks and brute force search are infeasible.


 Disadvantages of Graphical password

 Password registration and log-in process take too long.

 Require much more storage space than text based passwords.

 Shoulder Surfing .

- As the name implies, shoulder surfing is watching over people's


shoulders as they process information.

- Because of their graphic nature, nearly all graphical password schemes


are quite vulnerable to shoulder surfing.
 Graphical passwords are an alternative to textual alphanumeric
password.

It satisfies both conflicting requirements i.e. it is easy to


remember & it is hard to guess.

By the solution of the shoulder surfing problem, it becomes more


secure & easier password scheme.

Not yet widely used, current graphical password techniques are


still immature.
THANK
YOU…

You might also like