Graphical password authentication
Upcoming SlideShare
Loading in...5
×
 

Graphical password authentication

on

  • 4,580 views

 

Statistics

Views

Total Views
4,580
Views on SlideShare
4,580
Embed Views
0

Actions

Likes
7
Downloads
631
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Graphical password authentication Graphical password authentication Presentation Transcript

  • Presented by: Anilaja CSE
  •  What is PASSWORD? PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Uses of Password:  Logging into accounts.  Retrieving emails.  Accessing applications.  Networks.  Websites  Databases
  • Authentication is a process of conformation of a persons identity. Types:  Token based authentication  key cards, band cards, smart card, …  Biometric based authentication  Fingerprints, iris scan, facial recognition, …  Knowledge based authentication  text-based passwords, picture-based passwords, …  most widely used authentication techniques
  •  Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Difficulty of remembering passwords  easy to remember -> easy to guess  hard to guess -> hard to remember
  • A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
  •  Recall Based Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage  Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.  Cued-recall Technique An extra cue is provided to users to remember and target specific locations within a presented image.
  •  Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing Redrawing has to touch the same grids in the same sequence in authentication. User studies showed the drawing sequences is hard to remember.
  •  Signature scheme Here authentication is conducted by having the user drawing their signature using a mouse.
  •  Pass Point Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in the correct sequence.
  • B-DAS Scheme Grid Selection Scheme
  •  Dhamija and Perrig Scheme Pick several pictures out of many choices, identify them later in authentication.
  •  Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
  •  Pass face scheme: In this technique human faces are used as password.
  •  Other Schemes Select a sequence of images as password
  •  Graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security.  Here the security of the system is very high.  Dictionary attacks and brute force search are infeasible.
  •  Password registration and log-in process take too long.  Require much more storage space than text based passwords.  Shoulder Surfing .