Your SlideShare is downloading. ×
0
Presented by:
Anilaja
CSE
 What is PASSWORD?
PASSWORD is a secret word or string of characters that is used for user
authentication to prove his id...
Authentication is a process of conformation of a persons identity.
Types:
 Token based authentication
 key cards, band c...
 Text password is a secret word or string of characters that is used for user
authentication to prove his identity and ga...
A graphical password is an authentication system that works by having the
user select from images, in a specific order, p...
 Recall Based Techniques
A user is asked to reproduce something that he created or selected earlier
during the registrat...
 Draw-A-Secret (DAS) Scheme
User draws a simple picture on a 2D grid, the coordinates of the
grids occupied by the pictur...
 Signature scheme
Here authentication is conducted by having the user drawing their signature using
a
mouse.
 Pass Point Scheme
User click on any place on an image to create a password. A tolerance around each
chosen pixel is calc...
B-DAS Scheme Grid Selection Scheme
 Dhamija and Perrig Scheme
Pick several pictures out of many choices, identify them later
in authentication.
 Sobrado and Birget Scheme
System display a number of pass-objects (pre-selected by user) among many
other objects, user ...
 Pass face scheme:
In this technique human faces are used as password.
 Other Schemes
Select a sequence of images as password
 Graphical password schemes provide a way of making more
human-friendly passwords while increasing the level of security....
 Password registration and log-in process take too long.
 Require much more storage space than text based passwords.
 S...
Graphical password authentication
Graphical password authentication
Upcoming SlideShare
Loading in...5
×

Graphical password authentication

7,604

Published on

Published in: Technology
0 Comments
11 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
7,604
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1,022
Comments
0
Likes
11
Embeds 0
No embeds

No notes for slide

Transcript of "Graphical password authentication"

  1. 1. Presented by: Anilaja CSE
  2. 2.  What is PASSWORD? PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Uses of Password:  Logging into accounts.  Retrieving emails.  Accessing applications.  Networks.  Websites  Databases
  3. 3. Authentication is a process of conformation of a persons identity. Types:  Token based authentication  key cards, band cards, smart card, …  Biometric based authentication  Fingerprints, iris scan, facial recognition, …  Knowledge based authentication  text-based passwords, picture-based passwords, …  most widely used authentication techniques
  4. 4.  Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Difficulty of remembering passwords  easy to remember -> easy to guess  hard to guess -> hard to remember
  5. 5. A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
  6. 6.  Recall Based Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage  Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.  Cued-recall Technique An extra cue is provided to users to remember and target specific locations within a presented image.
  7. 7.  Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing Redrawing has to touch the same grids in the same sequence in authentication. User studies showed the drawing sequences is hard to remember.
  8. 8.  Signature scheme Here authentication is conducted by having the user drawing their signature using a mouse.
  9. 9.  Pass Point Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in the correct sequence.
  10. 10. B-DAS Scheme Grid Selection Scheme
  11. 11.  Dhamija and Perrig Scheme Pick several pictures out of many choices, identify them later in authentication.
  12. 12.  Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
  13. 13.  Pass face scheme: In this technique human faces are used as password.
  14. 14.  Other Schemes Select a sequence of images as password
  15. 15.  Graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security.  Here the security of the system is very high.  Dictionary attacks and brute force search are infeasible.
  16. 16.  Password registration and log-in process take too long.  Require much more storage space than text based passwords.  Shoulder Surfing .
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×