SlideShare a Scribd company logo
1 of 11
GRAPHICAL PASSWORD AUTHENTICATION
Presented By :
Sandhya Ramesh Naik (4SF19CS138)
Shettigar Sarvani Vasudeva
(4SF19CS147)
Shrilakshmi K (4SF19CS156)
Vaishnavi Kothwal (4SF19CS178)
Under the Guidance of :
Dr. Ananth Prabhu G (Guide)
Mr. Harisha (Co – Guide)
DOMAIN : CYBER SECURITY
FLOW :
1. Abstract
2. Introduction
3. Problem Statement
4. Literature Survey
5. System Requirements Specification
6. Architecture Diagram
7. Conclusion
ABSTRACT
Graphical password is one of the techniques for authentication of computer security.
Now-a-days digital/computer security is most important things in computer science for
protected user or customer data. And Shoulder-surfing is one of the threats where a criminal
can steal a password by direct observation or by recording the authentication session. There are
several techniques available for this authentication, the most prevalent and simple of which is
the Graphical password technique.
First, the user must register if the registration does not exist. Second, the user must
login with a valid user ID and password. The password is a grouping of characters and numbers.
Third, user has to cross graphical-based authentication where user can choose their password
and this method have higher chances to offset each other. The user should choose password
according to the registration password, it must to match at login time. So, here is proposed a
new graphical password authentication technique that is resilient to shoulder surfing and also
two other types of probable attacks.
INTRODUCTION
User authentication is an important component of securing user data. There are several
mechanisms used for this purpose, such as alphanumerical usernames and passwords. However,
due to the well known weakness of this method, graphics based passwords are suggested.
There are several disadvantages to the alphanumeric forms of authentical. Example, users
choose passwords that are easy to guess (DOB, their names, car plate number, etc.) in order to
remember them, because difficult passwords are not easily remembered. This brought about
the alternative of graphical passwords because research have been carried out to prove that
humans find it easier to recall images than alphanumeric words. [3] [2]
The author [2], provides a study that comprises of comprehensive research in the
graphical password schemes and evaluates each of the available schemes at two main areas,
which are attack resistance and usability. The study provides the information different
algorithms about the two categories under graphical password authentication which are
recognition-based and recall based, which is further classified into pure-recall-based and cued-
recall-based. It also provides studies about security attacks in Graphical password schemes.
Among the two types i.e., recognition based and recall based, the dimension of [1]
study revolves around the recall type authentication system. For this the research study aims to
analyze the usability aspect in the existing recall based authentication systems. Recall based
graphical password scheme gives the users an opportunity to recreate previously created
passwords, users are either given hints or reminders (cues recall based) or asked to reproduce
the passwords without remainders (pure recall based).
The paper [3] study reviews 10 recognition-based graphical password algorithms, and the
common usability and security threats of these systems based on these algorithms were
analyzed. Recognition based graphical password scheme creates a platform for the user to
select pictures from a variety of images provided, during authentication the user is asked to
recognize the previously selected images to gain access.
PROBLEM STATEMENT
Alphanumeric password is an old traditional common authentication
method. Practically this traditional method is too unsecure system. For
example, attacker may choose easily guessed user’s password, if user is not
using a strong password. User may use same password for multiple device or
site. This are all unsecure characteristic for normal users. And authentication
is one of the important security points where user has active responsibility
for their personal information security. If we use old traditional password
system then there may have possibility to dictionary attack, brute force
attack.
LITERATURE SURVEY
NAME AUTHORS YEAR DESCRIPTION
Study of Usability
Parameter for Graphical
Based Authentication
System
P. C. Golar
and
B. Khandelwal
2020 This paper provides a study on recall-based graphical
password authentication schemes. The research
study aims to analyze the usability aspect in the
existing recall based authentication systems.
Evaluation of Graphical
Password Schemes in
Terms of Attack
Resistance and Usability
] J. A. Jaffar
and
A. M. Zeki
2020 This paper provides a study that comprises of
comprehensive research in the graphical password
schemes and evaluates each of the available schemes
at two main areas, which are attack resistance and
usability.
Recognition-Based
Graphical Password
Algorithms: A Survey
J. G. Kaka,
O. O. Ishaq
and
J. O. Ojeniyi
2020 The paper study reviews 10 recognition-based
graphical password algorithms, and the common
usability and security threats of these systems based
on these algorithms were analyzed.
SYSTEM
REQUIREMENT
SPECIFICATION
Software Requirements:
• Flask
Hardware Requirements:
• Processor: AMD Ryzen 5 2.1Ghz
• RAM: 8GB
• Speed: 2.10GHz-4.10GHz
• Hard Disk: 1024GB
• System Type:64-bit Operating System
• Input Device: Standard keyboard and Mouse
• Output Device: Monitor
ARCHITECTURE
DIAGRAM
CONCLUSION
Digital devices are becoming part of our life day by day. By using digital
devices, we have abled to know about authentication process. Validation is an
integral part of security. Authentication will give the customer greater security.
Specific review articles research in the same field about the specific assaults found
during validation. Printed hidden term authentication is an excellent testing device.
It is more useful and secure compared to previous old base graphical password
authentication systems. Since the password space is very large, it offers security
against brute force attacks. It’s easy to use. Passwords can be easily created and
recall. To have a good system, you need high security and good usability, and can’t
be separated them. Shoulder navigation attack is subject to safety precaution.
However, proposed methods for the shoulder surfing problem still need to be
improved. This system can also be used to add a higher level of security to the text-
based password system. This system is very cheap as compared to a biometrics
system.
REFERENCES
[1] P. C. Golar and B. Khandelwal, “Study of Usability Parameter for Graphical Based
Authentication System”, 2020 9th International Conference System Modelling and Advancement
in Research Trends (SMART), 2020, pp. 23-26, doi: 10.1109/SMART50582.2020.9337116.
[2] J. A. Jaffar and A. M. Zeki, “Evaluation of Graphical Password Schemes in Terms of Attack
Resistance and Usability”, 2020 International Conference on Innovation and Intelligence for
Informatics, Computing and Technologies (3ICT), 2020, pp. 1-5, doi:
10.1109/3ICT51146.2020.9312011.
[3] J. G. Kaka, O. O. Ishaq and J. O. Ojeniyi, "Recognition-Based Graphical Password Algorithms: A
Survey," 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 2021, pp. 44-
51, doi: 10.1109/CYBERNIGERIA51635.2021.9428801.

More Related Content

What's hot

Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemshraddha mane
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 

What's hot (20)

Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Bus Pass.pptx
Bus Pass.pptxBus Pass.pptx
Bus Pass.pptx
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 

Similar to Graphical Password Authentication ppt.pptx

Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass facesIJERA Editor
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_systemSameer Dighe
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...IRJET Journal
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 

Similar to Graphical Password Authentication ppt.pptx (20)

Graphical password authentication using Pass faces
Graphical password authentication using Pass facesGraphical password authentication using Pass faces
Graphical password authentication using Pass faces
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Fyp2
Fyp2Fyp2
Fyp2
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
3 d password
3 d password3 d password
3 d password
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Graphical Password Authentication ppt.pptx

  • 1. GRAPHICAL PASSWORD AUTHENTICATION Presented By : Sandhya Ramesh Naik (4SF19CS138) Shettigar Sarvani Vasudeva (4SF19CS147) Shrilakshmi K (4SF19CS156) Vaishnavi Kothwal (4SF19CS178) Under the Guidance of : Dr. Ananth Prabhu G (Guide) Mr. Harisha (Co – Guide)
  • 2. DOMAIN : CYBER SECURITY FLOW : 1. Abstract 2. Introduction 3. Problem Statement 4. Literature Survey 5. System Requirements Specification 6. Architecture Diagram 7. Conclusion
  • 3. ABSTRACT Graphical password is one of the techniques for authentication of computer security. Now-a-days digital/computer security is most important things in computer science for protected user or customer data. And Shoulder-surfing is one of the threats where a criminal can steal a password by direct observation or by recording the authentication session. There are several techniques available for this authentication, the most prevalent and simple of which is the Graphical password technique. First, the user must register if the registration does not exist. Second, the user must login with a valid user ID and password. The password is a grouping of characters and numbers. Third, user has to cross graphical-based authentication where user can choose their password and this method have higher chances to offset each other. The user should choose password according to the registration password, it must to match at login time. So, here is proposed a new graphical password authentication technique that is resilient to shoulder surfing and also two other types of probable attacks.
  • 4. INTRODUCTION User authentication is an important component of securing user data. There are several mechanisms used for this purpose, such as alphanumerical usernames and passwords. However, due to the well known weakness of this method, graphics based passwords are suggested. There are several disadvantages to the alphanumeric forms of authentical. Example, users choose passwords that are easy to guess (DOB, their names, car plate number, etc.) in order to remember them, because difficult passwords are not easily remembered. This brought about the alternative of graphical passwords because research have been carried out to prove that humans find it easier to recall images than alphanumeric words. [3] [2] The author [2], provides a study that comprises of comprehensive research in the graphical password schemes and evaluates each of the available schemes at two main areas, which are attack resistance and usability. The study provides the information different algorithms about the two categories under graphical password authentication which are recognition-based and recall based, which is further classified into pure-recall-based and cued- recall-based. It also provides studies about security attacks in Graphical password schemes.
  • 5. Among the two types i.e., recognition based and recall based, the dimension of [1] study revolves around the recall type authentication system. For this the research study aims to analyze the usability aspect in the existing recall based authentication systems. Recall based graphical password scheme gives the users an opportunity to recreate previously created passwords, users are either given hints or reminders (cues recall based) or asked to reproduce the passwords without remainders (pure recall based). The paper [3] study reviews 10 recognition-based graphical password algorithms, and the common usability and security threats of these systems based on these algorithms were analyzed. Recognition based graphical password scheme creates a platform for the user to select pictures from a variety of images provided, during authentication the user is asked to recognize the previously selected images to gain access.
  • 6. PROBLEM STATEMENT Alphanumeric password is an old traditional common authentication method. Practically this traditional method is too unsecure system. For example, attacker may choose easily guessed user’s password, if user is not using a strong password. User may use same password for multiple device or site. This are all unsecure characteristic for normal users. And authentication is one of the important security points where user has active responsibility for their personal information security. If we use old traditional password system then there may have possibility to dictionary attack, brute force attack.
  • 7. LITERATURE SURVEY NAME AUTHORS YEAR DESCRIPTION Study of Usability Parameter for Graphical Based Authentication System P. C. Golar and B. Khandelwal 2020 This paper provides a study on recall-based graphical password authentication schemes. The research study aims to analyze the usability aspect in the existing recall based authentication systems. Evaluation of Graphical Password Schemes in Terms of Attack Resistance and Usability ] J. A. Jaffar and A. M. Zeki 2020 This paper provides a study that comprises of comprehensive research in the graphical password schemes and evaluates each of the available schemes at two main areas, which are attack resistance and usability. Recognition-Based Graphical Password Algorithms: A Survey J. G. Kaka, O. O. Ishaq and J. O. Ojeniyi 2020 The paper study reviews 10 recognition-based graphical password algorithms, and the common usability and security threats of these systems based on these algorithms were analyzed.
  • 8. SYSTEM REQUIREMENT SPECIFICATION Software Requirements: • Flask Hardware Requirements: • Processor: AMD Ryzen 5 2.1Ghz • RAM: 8GB • Speed: 2.10GHz-4.10GHz • Hard Disk: 1024GB • System Type:64-bit Operating System • Input Device: Standard keyboard and Mouse • Output Device: Monitor
  • 10. CONCLUSION Digital devices are becoming part of our life day by day. By using digital devices, we have abled to know about authentication process. Validation is an integral part of security. Authentication will give the customer greater security. Specific review articles research in the same field about the specific assaults found during validation. Printed hidden term authentication is an excellent testing device. It is more useful and secure compared to previous old base graphical password authentication systems. Since the password space is very large, it offers security against brute force attacks. It’s easy to use. Passwords can be easily created and recall. To have a good system, you need high security and good usability, and can’t be separated them. Shoulder navigation attack is subject to safety precaution. However, proposed methods for the shoulder surfing problem still need to be improved. This system can also be used to add a higher level of security to the text- based password system. This system is very cheap as compared to a biometrics system.
  • 11. REFERENCES [1] P. C. Golar and B. Khandelwal, “Study of Usability Parameter for Graphical Based Authentication System”, 2020 9th International Conference System Modelling and Advancement in Research Trends (SMART), 2020, pp. 23-26, doi: 10.1109/SMART50582.2020.9337116. [2] J. A. Jaffar and A. M. Zeki, “Evaluation of Graphical Password Schemes in Terms of Attack Resistance and Usability”, 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), 2020, pp. 1-5, doi: 10.1109/3ICT51146.2020.9312011. [3] J. G. Kaka, O. O. Ishaq and J. O. Ojeniyi, "Recognition-Based Graphical Password Algorithms: A Survey," 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 2021, pp. 44- 51, doi: 10.1109/CYBERNIGERIA51635.2021.9428801.