SlideShare a Scribd company logo
1 of 20
GRAPHICAL
PASSWORD
APPROACH
PRESENTED BY
G. Ruchitha
CONTENTS
• What Is Graphical Password
• The Survey
• Recognition Based Technique
• Recall Based Technique
• Security Factors
• Implementation And Discussion
• Advantages
• Drawbacks
• Conclusion
WHAT IS GRAPHICAL PASSWORD?
• A graphical password is an authentication system that works by having the user select from
images, in A specific order, presented in A graphical user interface (GUI). For this reason, the
graphical-password approach is called graphical user authentication (GUA).
It can be used in:
• Web login application
• ATM machines
• Mobile devices
THE SURVEY: TWO CATEGORIES
• RECOGNITION BASED TECHNIQUE
USING RECOGNITION-BASED TECHNIQUES, A USER IS
PRESENTED WITH A SET OF IMAGES AND THE USER PASSES THE
AUTHENTICATION BY RECOGNIZING AND IDENTIFYING THE
IMAGES HE OR SHE SELECTED DURING THE REGISTRATION
STAGE.
• RECALL BASED TECHNIQUE
IN THESE TECHNIQUES, USER HAS TO RECALL
SOMETHING THAT HAS BEEN CREATED OR SELECTED
DURING REGISTRATION.
RECOGNITION BASED TECHNIQUE
SOBRADO AND BIRGET SCHEME
PASSFACE TECHNIQUE
RECALL BASED TECHNIQUE
• Pure recall based technique
• Pass doodle technique
• Signature technique
• Cued recall based technique
• Blonder technique
• Pass point technique
PURE RECALL BASED
• Here user is not provided a clue to recall a password.
PASS DOODLE TECHNIQUE
• Here some handwritten text/design is drawn by the user
on touch sensitive screen with stylus. During login user
has to redraw the same text.
SIGNATURE TECHNIQUE
• Here, during registration user has to register his own signature. For
authentication user has to draw the same signature with mouse.
CUED CLICK POINTS
• Cued click points (CCP) is a proposed alternative to pass points. In
CCP, users click one point on each of c =8 images rather than on five
points on one image.
BLONDER TECHNIQUE
• In this, for password registration a predetermined image with
predetermined tap regions are displayed to the user. The user has to
click inside those tap regions in a sequential manner. For
authentication, user has to click approximate areas of those tap
regions in a predefined sequence. Here image is a clue to recall a
password.
PASS POINT TECHNIQUE
SECURITY FACTORS
• Brute force
• Dictionary attacks
• Guessing
• Shoulder surfing
• Social engineering
IMPLEMENTATION AND DISCUSSION
• Graphical password can be implemented in authenticating several
systems and websites. The implementation has few focuses:
• Password: contain image as reference & encryption algorithm.
• Login: contains username, images, graphical password and related
methods.
• Ssr shield: contains shield for shoulder surfing.
• Grids: contains unique grid values and grid clicking related methods
ADVANTAGES
• Graphical password schemes provides a way of
making more human-friendly passwords.
• Here the security of the systems is very high.
• Here we use series of selectable images on
successive screen pages.
• Dictionary attacks are infeasible
DRAWBACKS
• Password registration and login process take too
long.
• Require much more storage space than text based
passwords.
• Because of their graphic nature, nearly all
graphical password scheme are quite vulnerable
to shoulder surfing
CONCLUSION
• Although the main use for graphical passwords is that
people are better at memorizing graphical passwords than
text-based passwords, the existing user studies are very
limited and there is not yet convincing evidence to
support this argument. Our preliminary analysis suggests
that it is more difficult to break graphical passwords
using the traditional attack methods such as brute force
search, dictionary attack, or spyware.
THANK YOU

More Related Content

Similar to Graphical password

3 d secure password
3 d secure password3 d secure password
3 d secure passwordJai Chaudhary
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdfGirishKA4
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordNirzar Bhaidkar
 
3D Password
3D Password3D Password
3D PasswordAnkit Nagar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptxAkashDongre7
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01Malepati Prathibha
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 

Similar to Graphical password (20)

3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Vc pred
Vc predVc pred
Vc pred
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
3D Password
3D Password3D Password
3D Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Review 1 (1) (1).pptx
Review 1 (1) (1).pptxReview 1 (1) (1).pptx
Review 1 (1) (1).pptx
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Graphical password

  • 2. CONTENTS • What Is Graphical Password • The Survey • Recognition Based Technique • Recall Based Technique • Security Factors • Implementation And Discussion • Advantages • Drawbacks • Conclusion
  • 3. WHAT IS GRAPHICAL PASSWORD? • A graphical password is an authentication system that works by having the user select from images, in A specific order, presented in A graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). It can be used in: • Web login application • ATM machines • Mobile devices
  • 4. THE SURVEY: TWO CATEGORIES • RECOGNITION BASED TECHNIQUE USING RECOGNITION-BASED TECHNIQUES, A USER IS PRESENTED WITH A SET OF IMAGES AND THE USER PASSES THE AUTHENTICATION BY RECOGNIZING AND IDENTIFYING THE IMAGES HE OR SHE SELECTED DURING THE REGISTRATION STAGE. • RECALL BASED TECHNIQUE IN THESE TECHNIQUES, USER HAS TO RECALL SOMETHING THAT HAS BEEN CREATED OR SELECTED DURING REGISTRATION.
  • 8. RECALL BASED TECHNIQUE • Pure recall based technique • Pass doodle technique • Signature technique • Cued recall based technique • Blonder technique • Pass point technique
  • 9. PURE RECALL BASED • Here user is not provided a clue to recall a password.
  • 10. PASS DOODLE TECHNIQUE • Here some handwritten text/design is drawn by the user on touch sensitive screen with stylus. During login user has to redraw the same text.
  • 11. SIGNATURE TECHNIQUE • Here, during registration user has to register his own signature. For authentication user has to draw the same signature with mouse.
  • 12. CUED CLICK POINTS • Cued click points (CCP) is a proposed alternative to pass points. In CCP, users click one point on each of c =8 images rather than on five points on one image.
  • 13. BLONDER TECHNIQUE • In this, for password registration a predetermined image with predetermined tap regions are displayed to the user. The user has to click inside those tap regions in a sequential manner. For authentication, user has to click approximate areas of those tap regions in a predefined sequence. Here image is a clue to recall a password.
  • 15. SECURITY FACTORS • Brute force • Dictionary attacks • Guessing • Shoulder surfing • Social engineering
  • 16. IMPLEMENTATION AND DISCUSSION • Graphical password can be implemented in authenticating several systems and websites. The implementation has few focuses: • Password: contain image as reference & encryption algorithm. • Login: contains username, images, graphical password and related methods. • Ssr shield: contains shield for shoulder surfing. • Grids: contains unique grid values and grid clicking related methods
  • 17. ADVANTAGES • Graphical password schemes provides a way of making more human-friendly passwords. • Here the security of the systems is very high. • Here we use series of selectable images on successive screen pages. • Dictionary attacks are infeasible
  • 18. DRAWBACKS • Password registration and login process take too long. • Require much more storage space than text based passwords. • Because of their graphic nature, nearly all graphical password scheme are quite vulnerable to shoulder surfing
  • 19. CONCLUSION • Although the main use for graphical passwords is that people are better at memorizing graphical passwords than text-based passwords, the existing user studies are very limited and there is not yet convincing evidence to support this argument. Our preliminary analysis suggests that it is more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack, or spyware.