Comprehensive study of
the usability
features of the
Graphical Password

1
CONTENTS

1. INTRODUCTION
2. CURRENT AUTHENTICATION METHODS
3.DRAWBACKS OF NORMAL PASSWORD
4.WHY DO WE USE GRAPHICAL PASSW...
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biomet...
1Token based authentication

4
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biomet...
2,Biometric based

6
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biomet...
3,Knowledge based
a) text based

8
3,Knowledge based
b)picture based

9
Drawbacks of normal password







Easy to guess
Harder passwords are not easy to remember
Dictionary attack-success...
Why do we use graphical
password?







More secure
More memorable
Easier for people to use
A picture worth thousan...
Graphical password?
Divided into two
Recognition method
 Recall based methods


12
Recognition based technique
A user is presented with a set of
images and the user passes the
authentication by recognizing...
Methods for recognition based
technique
 Dhamija and

Perrig algorithm
 Sobrado and Birget algorithm
 Jansen et al. alg...
Dhamija and Perrig algorithm
Based on hash visualization technique

1
5
User will be asked to select certain
number of images from a set of random
pictures generated by a program
Later, user wil...
Drawbacks
SHOULDER-SURFING

using direct observation techniques,
such as looking over someone's shoulder,
to get informat...
Sobrado and Birget algorithm


Overcome the shoulder-surfing attacks



Login time can be reduced

 Several schemes are...
Triangle scheme

1
9
A user needs to selects their pass-object
among many displayed object
 To be authenticated, a user needs to
recognize all...
Moveable frame scheme

21
This scheme is similar to their previous
scheme but, only three pass objects were
involved in this technique.
 One of the...
Jansen et al. algorithm
Select a sequence of thumbnail photo to form a password

Designed especially for mobile devices ...
Throughout the password creation, a user
has to select the theme first e.g. sea and
shore,
 Afterward, a user has to sele...
Passface algorithm

25
Based on the assumption that human can
recall human faces easier than other
pictures
 User are requires to select the pre...


This step continuously repeated until all
the four face is identified. User needs to
recognize all the face selected du...
Takada and koike
 Allow

users to use their favourite image
for authentication
First register their favourite images wit...
Recall based techniques
A user is asked to reproduce
something that he or she created or
selected earlier during the regis...
Methods for recall based techniques





Passlogix scheme
DAS scheme
Signature scheme

30
Passlogix scheme



“Repeating a sequence of actions”
Creating a password by a chronological
situation

31
User can select their background
images based on the environment, for
example in the
kitchen, bathroom, bedroom or etc
 T...


For example in the kitchen environment,
user can prepare a meal by selecting
cooking ingredients, take fast food from
f...
DAS scheme

“Draw-a-secret” based on two dimensional grid
 Users can draw a password as long as they wish


34
Signature scheme


There is no need to memorize one’s
signature and signatures are hard to fake

35
Conclusion
In this paper, we have conducted a
comprehensive study of existing graphical
password techniques
 We have foun...
References
Ieee papers
www.graphicalpassword.net

R. Dhamija and A. Perrig. “Déjà vu: A User Study Using
Images forAuthent...
THANK YOU

38
39
Upcoming SlideShare
Loading in...5
×

Comprehensive study of the usability features of the Graphical Password

906
-1

Published on

Comprehensive study of the usability features of the Graphical Password

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
906
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
111
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Comprehensive study of the usability features of the Graphical Password

  1. 1. Comprehensive study of the usability features of the Graphical Password 1
  2. 2. CONTENTS 1. INTRODUCTION 2. CURRENT AUTHENTICATION METHODS 3.DRAWBACKS OF NORMAL PASSWORD 4.WHY DO WE USE GRAPHICAL PASSWORD? 5. RECOGNITION BASED TECHNIQUES 6.RECALL BASED TECHNIQUES 7.CONCLUSION 8.REFERENCES 9.WORDS OF GRATITUDE 2
  3. 3. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 3
  4. 4. 1Token based authentication 4
  5. 5. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 5
  6. 6. 2,Biometric based 6
  7. 7. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 7
  8. 8. 3,Knowledge based a) text based 8
  9. 9. 3,Knowledge based b)picture based 9
  10. 10. Drawbacks of normal password      Easy to guess Harder passwords are not easy to remember Dictionary attack-successively trying all the words in an exhaustive list called a dictionary Bruteforce attack-tries to use every possible character combinations as a password Key-space is limited to 64 ASCII characters 1 0
  11. 11. Why do we use graphical password?       More secure More memorable Easier for people to use A picture worth thousand passwords Offers much larger keyspace Cued recall,which helps users to remember a password based on picture displayed and not just memory alone  Divided into two-recognition method and recall based methods 1 1
  12. 12. Graphical password? Divided into two Recognition method  Recall based methods  12
  13. 13. Recognition based technique A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage 13
  14. 14. Methods for recognition based technique  Dhamija and Perrig algorithm  Sobrado and Birget algorithm  Jansen et al. algorithm  Passface algorithm 1 4
  15. 15. Dhamija and Perrig algorithm Based on hash visualization technique 1 5
  16. 16. User will be asked to select certain number of images from a set of random pictures generated by a program Later, user will be required to identify the pre-selected images to be authenticated 16
  17. 17. Drawbacks SHOULDER-SURFING using direct observation techniques, such as looking over someone's shoulder, to get information Longer login time 1 7
  18. 18. Sobrado and Birget algorithm  Overcome the shoulder-surfing attacks  Login time can be reduced  Several schemes are there, eg.triangle scheme,moveable frame scheme,special geometric configuration scheme 1 8
  19. 19. Triangle scheme 1 9
  20. 20. A user needs to selects their pass-object among many displayed object  To be authenticated, a user needs to recognize all the pre-selected pass-object which was selected during the registration phase.  The user requires to click inside the convex-hull which formed by the passobject  20
  21. 21. Moveable frame scheme 21
  22. 22. This scheme is similar to their previous scheme but, only three pass objects were involved in this technique.  One of the pass-objects is placed into the moveable frame.  To be authenticated, the user needs to rotate the frame until all the pass-object is located in a straight line  22
  23. 23. Jansen et al. algorithm Select a sequence of thumbnail photo to form a password Designed especially for mobile devices such as PDAs 2 3
  24. 24. Throughout the password creation, a user has to select the theme first e.g. sea and shore,  Afterward, a user has to selects and registers a sequence of the selected thumbnail photo to form a password .  The user needs to recognize and identify the previously seen photos and touch it by using stylus with the correct sequence in order to be authenticated  24
  25. 25. Passface algorithm 25
  26. 26. Based on the assumption that human can recall human faces easier than other pictures  User are requires to select the previously seen human face picture from a grid of nine faces which one of the face is the known face and the rest is the decoy faces  26
  27. 27.  This step continuously repeated until all the four face is identified. User needs to recognize all the face selected during the enrollment stage. User is authenticated if all the correct face is successfully identified. 27
  28. 28. Takada and koike  Allow users to use their favourite image for authentication First register their favourite images with the server 28
  29. 29. Recall based techniques A user is asked to reproduce something that he or she created or selected earlier during the registration stage 29
  30. 30. Methods for recall based techniques    Passlogix scheme DAS scheme Signature scheme 30
  31. 31. Passlogix scheme   “Repeating a sequence of actions” Creating a password by a chronological situation 31
  32. 32. User can select their background images based on the environment, for example in the kitchen, bathroom, bedroom or etc  To enter a password, user can click and/or drag on a series of items within that image.  32
  33. 33.  For example in the kitchen environment, user can prepare a meal by selecting cooking ingredients, take fast food from fridge and put it in the microwave oven, select some fruits and wash it in washbasin and then put it in the clean bowl. 33
  34. 34. DAS scheme “Draw-a-secret” based on two dimensional grid  Users can draw a password as long as they wish  34
  35. 35. Signature scheme  There is no need to memorize one’s signature and signatures are hard to fake 35
  36. 36. Conclusion In this paper, we have conducted a comprehensive study of existing graphical password techniques  We have found that the graphical passwords schemes is more difficult to be cracked by using the traditional attack methods.  36
  37. 37. References Ieee papers www.graphicalpassword.net R. Dhamija and A. Perrig. “Déjà vu: A User Study Using Images forAuthentication wikipedia 37
  38. 38. THANK YOU 38
  39. 39. 39
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×