SQL Database Design For Developers at php[tek] 2024
Graphical Password Authentication ppt.pptx
1. GRAPHICAL PASSWORD AUTHENTICATION
Presented By :
Sandhya Ramesh Naik (4SF19CS138)
Shettigar Sarvani Vasudeva
(4SF19CS147)
Shrilakshmi K (4SF19CS156)
Vaishnavi Kothwal (4SF19CS178)
Under the Guidance of :
Dr. Ananth Prabhu G (Guide)
Mr. Harisha (Co – Guide)
2. DOMAIN : CYBER SECURITY
FLOW :
1. Abstract
2. Introduction
3. Problem Statement
4. Literature Survey
5. System Requirements Specification
6. Architecture Diagram
7. Conclusion
3. ABSTRACT
Graphical password is one of the techniques for authentication of computer security.
Now-a-days digital/computer security is most important things in computer science for
protected user or customer data. And Shoulder-surfing is one of the threats where a criminal
can steal a password by direct observation or by recording the authentication session. There are
several techniques available for this authentication, the most prevalent and simple of which is
the Graphical password technique.
First, the user must register if the registration does not exist. Second, the user must
login with a valid user ID and password. The password is a grouping of characters and numbers.
Third, user has to cross graphical-based authentication where user can choose their password
and this method have higher chances to offset each other. The user should choose password
according to the registration password, it must to match at login time. So, here is proposed a
new graphical password authentication technique that is resilient to shoulder surfing and also
two other types of probable attacks.
4. INTRODUCTION
User authentication is an important component of securing user data. There are several
mechanisms used for this purpose, such as alphanumerical usernames and passwords. However,
due to the well known weakness of this method, graphics based passwords are suggested.
There are several disadvantages to the alphanumeric forms of authentical. Example, users
choose passwords that are easy to guess (DOB, their names, car plate number, etc.) in order to
remember them, because difficult passwords are not easily remembered. This brought about
the alternative of graphical passwords because research have been carried out to prove that
humans find it easier to recall images than alphanumeric words. [3] [2]
The author [2], provides a study that comprises of comprehensive research in the
graphical password schemes and evaluates each of the available schemes at two main areas,
which are attack resistance and usability. The study provides the information different
algorithms about the two categories under graphical password authentication which are
recognition-based and recall based, which is further classified into pure-recall-based and cued-
recall-based. It also provides studies about security attacks in Graphical password schemes.
5. Among the two types i.e., recognition based and recall based, the dimension of [1]
study revolves around the recall type authentication system. For this the research study aims to
analyze the usability aspect in the existing recall based authentication systems. Recall based
graphical password scheme gives the users an opportunity to recreate previously created
passwords, users are either given hints or reminders (cues recall based) or asked to reproduce
the passwords without remainders (pure recall based).
The paper [3] study reviews 10 recognition-based graphical password algorithms, and the
common usability and security threats of these systems based on these algorithms were
analyzed. Recognition based graphical password scheme creates a platform for the user to
select pictures from a variety of images provided, during authentication the user is asked to
recognize the previously selected images to gain access.
6. PROBLEM STATEMENT
Alphanumeric password is an old traditional common authentication
method. Practically this traditional method is too unsecure system. For
example, attacker may choose easily guessed user’s password, if user is not
using a strong password. User may use same password for multiple device or
site. This are all unsecure characteristic for normal users. And authentication
is one of the important security points where user has active responsibility
for their personal information security. If we use old traditional password
system then there may have possibility to dictionary attack, brute force
attack.
7. LITERATURE SURVEY
NAME AUTHORS YEAR DESCRIPTION
Study of Usability
Parameter for Graphical
Based Authentication
System
P. C. Golar
and
B. Khandelwal
2020 This paper provides a study on recall-based graphical
password authentication schemes. The research
study aims to analyze the usability aspect in the
existing recall based authentication systems.
Evaluation of Graphical
Password Schemes in
Terms of Attack
Resistance and Usability
] J. A. Jaffar
and
A. M. Zeki
2020 This paper provides a study that comprises of
comprehensive research in the graphical password
schemes and evaluates each of the available schemes
at two main areas, which are attack resistance and
usability.
Recognition-Based
Graphical Password
Algorithms: A Survey
J. G. Kaka,
O. O. Ishaq
and
J. O. Ojeniyi
2020 The paper study reviews 10 recognition-based
graphical password algorithms, and the common
usability and security threats of these systems based
on these algorithms were analyzed.
10. CONCLUSION
Digital devices are becoming part of our life day by day. By using digital
devices, we have abled to know about authentication process. Validation is an
integral part of security. Authentication will give the customer greater security.
Specific review articles research in the same field about the specific assaults found
during validation. Printed hidden term authentication is an excellent testing device.
It is more useful and secure compared to previous old base graphical password
authentication systems. Since the password space is very large, it offers security
against brute force attacks. It’s easy to use. Passwords can be easily created and
recall. To have a good system, you need high security and good usability, and can’t
be separated them. Shoulder navigation attack is subject to safety precaution.
However, proposed methods for the shoulder surfing problem still need to be
improved. This system can also be used to add a higher level of security to the text-
based password system. This system is very cheap as compared to a biometrics
system.
11. REFERENCES
[1] P. C. Golar and B. Khandelwal, “Study of Usability Parameter for Graphical Based
Authentication System”, 2020 9th International Conference System Modelling and Advancement
in Research Trends (SMART), 2020, pp. 23-26, doi: 10.1109/SMART50582.2020.9337116.
[2] J. A. Jaffar and A. M. Zeki, “Evaluation of Graphical Password Schemes in Terms of Attack
Resistance and Usability”, 2020 International Conference on Innovation and Intelligence for
Informatics, Computing and Technologies (3ICT), 2020, pp. 1-5, doi:
10.1109/3ICT51146.2020.9312011.
[3] J. G. Kaka, O. O. Ishaq and J. O. Ojeniyi, "Recognition-Based Graphical Password Algorithms: A
Survey," 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 2021, pp. 44-
51, doi: 10.1109/CYBERNIGERIA51635.2021.9428801.