Shoulder surfing resistant graphical and image based login system
Mrs. Vijaya Chavan
Existing System Contains User_Name and
Password Based Method.
Threats To The Existing
System are :
Shoulder Keylogger Bots
When users input their passwords in a public
place, they may be at risk of attackers stealing
their password. An attacker can capture a
password by direct observation.
Key stroke are recorded
Threat to login system as
the username and
Perform simple and repetitive tasks
Text Based Password are subject to attacked by
In shoulder surfing attacker can capture a
password by direct observation
In key logger attacker record the individual’s
In bots attack the automated or semi-automated
robots do the same
Sensitive Information requires high security
Authentication processes to keep information
Graphical Image Based
Password Based Password
A grid of image is displayed, where the user
will select a particular images from the grid.
The aim of this authentication is to avoid attack
from a script or another machine.
A keylogger or bot attack can be avoided.
Processor: Pentium-IV 1.5 GHz and above
Ram: 256 MB minimum
512 MB preferred
Monitor: 15 inch
CD-ROM: 52x speed
Operating System: Microsoft Windows XP and above.
Software: JDK 1.5 and higher.
“Network Security-Overcome Password Hacking Through
Graphical Password Authentication’’
Department of Information Technology, Tamil Nadu, India
“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:”
A User Study Using Images for Authentication