SlideShare a Scribd company logo
1 of 17
GRAPHICAL PASSWORD
AUTHENTICATION
PRESENTED BY,
SURAj SHARMA
OUTLINE
Introduction
Overview of the Authentication Methods
Text Password and drawbacks
Graphical Passwords.
The survey
 Recall Based Techniques
 Recognition based Techniques
Discussion
 Advantages
 Disadvantages
Conclusion
INTRODUCTION
 What is PASSWORD?
The term PASSWORD commonly refers to a secret used for authentication. Passwords are the most commonly
used method for identifying users in computer and communication systems.
 PASSWORDS are used for:-
 Logging into accounts.
 Retrieving emails.
 Accessing applications.
 Networks.
 Websites.
 Databases.
 Workstations.
OVERVIEW OF THE AUTHENTICATION METHODS
Token based authentication
Key cards, bank cards, smart card, ………..
Biometric based authentication
Fingerprints, iris scan, facial recognition, …….
Knowledge based authentication
Text-based passwords , picture-based passwords , ……
Mostly widely used authentication techniques
TEXT PASSWORD
• Text password is a secret word or string of characters that is used for user authentication to
prove his identity and gain access to resources.
DRAWBACK
Difficulty of remembering passwords.
 easy to remember -> easy to guess
 Hard to guess -> hard to remember
Vulnerable to attacks like Dictionary attack, Brute force attack.
GRAPHICAL PASSWORD
Graphical passwords were originally described by BLONDER in 1996.
A graphical password is an authentication system that works by having the user
select from images , in a specific order, presented in a graphical user interface (GUI).
For this reason, the graphical –password approach is sometimes called graphical
user authentication(GUA).
USE OF GRAPHICAL PASSWORD
Web log-in application.
ATM machine.
Mobile device.
THE SURVEY : TWO CATEGORIES
Recall Based Techniques
A user is asked to reproduce something that he created or selected earlier during the registration stage
Recognition Based Techniques
A user is presented with a set of images and the user passes the authentication by recognition and iden-
-tifying the images he selected during the registration stage
RECALL BASED TECHNIQUES
Draw-A-Secret (DAS) Scheme
 User draws a simple picture on a 2D grid, the coordinates of the grids
occupied by the picture are started in the order of drawing.
 Redrawing has to touch the same grids in the same sequence in
authentication.
RECALL BASED TECHNIQUES
 Signature scheme
Here authentication conducted by having the user drawing the signature using a mouse.
RECALL BASED TECHNIQUES
 Pass point scheme
User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order
be authenticated, user must click within the tolerance in the correct sequence.
RECOGNITION BASED TECHNIQUES
 Passface Scheme:
In this technique human faces are used as password.
RECOGNITION BASED TECHNIQUES
 Sobrado and Birget Scheme
System display a number of pass-objects (pre-selected by user) among many other subjects, user click
inside the convex hull bounded by pass-objects.
DISCUSSION
Advantages of graphical password
Graphical password schemes provide a way of making more human-friendly
Here the security of the system is very high.
Dictionary attacks and brute search are infesible.
DISCUSSION
Disadvantage of Graphical password
Password registration and long-in process take too long.
Require much more storage space then text based passwords.
Shoulder surfing.
CONCLUSION
Graphical passwords are on alternative to textual alphanumeric password.
It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to
guess.
By the solution of the shoulder surfing problem, it becomes more secure & easier
password scheme.
Not yet widely used, current graphical password techniques are still immature.
THANK YOU…..

More Related Content

What's hot

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 
Graphical password
Graphical passwordGraphical password
Graphical passwordsowji888
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication ServiceSwathy T
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 

What's hot (20)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
3d passwords
3d passwords3d passwords
3d passwords
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 

Similar to Graphical password authentication

graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptxRohitSabale4
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 

Similar to Graphical password authentication (20)

graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
Nilesh
Nilesh Nilesh
Nilesh
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
3d password
3d password3d password
3d password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 

Recently uploaded

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 

Recently uploaded (20)

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 

Graphical password authentication

  • 2. OUTLINE Introduction Overview of the Authentication Methods Text Password and drawbacks Graphical Passwords. The survey  Recall Based Techniques  Recognition based Techniques Discussion  Advantages  Disadvantages Conclusion
  • 3. INTRODUCTION  What is PASSWORD? The term PASSWORD commonly refers to a secret used for authentication. Passwords are the most commonly used method for identifying users in computer and communication systems.  PASSWORDS are used for:-  Logging into accounts.  Retrieving emails.  Accessing applications.  Networks.  Websites.  Databases.  Workstations.
  • 4. OVERVIEW OF THE AUTHENTICATION METHODS Token based authentication Key cards, bank cards, smart card, ……….. Biometric based authentication Fingerprints, iris scan, facial recognition, ……. Knowledge based authentication Text-based passwords , picture-based passwords , …… Mostly widely used authentication techniques
  • 5. TEXT PASSWORD • Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources. DRAWBACK Difficulty of remembering passwords.  easy to remember -> easy to guess  Hard to guess -> hard to remember Vulnerable to attacks like Dictionary attack, Brute force attack.
  • 6. GRAPHICAL PASSWORD Graphical passwords were originally described by BLONDER in 1996. A graphical password is an authentication system that works by having the user select from images , in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical –password approach is sometimes called graphical user authentication(GUA).
  • 7. USE OF GRAPHICAL PASSWORD Web log-in application. ATM machine. Mobile device.
  • 8. THE SURVEY : TWO CATEGORIES Recall Based Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognition and iden- -tifying the images he selected during the registration stage
  • 9. RECALL BASED TECHNIQUES Draw-A-Secret (DAS) Scheme  User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are started in the order of drawing.  Redrawing has to touch the same grids in the same sequence in authentication.
  • 10. RECALL BASED TECHNIQUES  Signature scheme Here authentication conducted by having the user drawing the signature using a mouse.
  • 11. RECALL BASED TECHNIQUES  Pass point scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order be authenticated, user must click within the tolerance in the correct sequence.
  • 12. RECOGNITION BASED TECHNIQUES  Passface Scheme: In this technique human faces are used as password.
  • 13. RECOGNITION BASED TECHNIQUES  Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other subjects, user click inside the convex hull bounded by pass-objects.
  • 14. DISCUSSION Advantages of graphical password Graphical password schemes provide a way of making more human-friendly Here the security of the system is very high. Dictionary attacks and brute search are infesible.
  • 15. DISCUSSION Disadvantage of Graphical password Password registration and long-in process take too long. Require much more storage space then text based passwords. Shoulder surfing.
  • 16. CONCLUSION Graphical passwords are on alternative to textual alphanumeric password. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme. Not yet widely used, current graphical password techniques are still immature.