Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
PRESENTED BYAsim Kumar PathakCS-47/09
IntroductionOverview of the Authentication MethodsText Password and drawbacks.Graphical Passwords.The surveyRecall B...
What is PASSWORDThe term PASSWORD commonly refers to a secret used forauthentication. Passwords are the most commonly use...
Token based authentication Key cards, bank cards, smart card, …Biometric based authentication Fingerprints, iris scan,...
Text PasswordText password is a secret word or string of characters that isused for user authentication to prove his ident...
 Graphical passwords were originally described by BLONDERin 1996. A graphical password is an authentication system that ...
Use of graphical password: Web log-in application. ATM machine. Mobile device.
Recall Based TechniquesA user is asked to reproduce something that he created orselected earlier during the registration ...
Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of thegrids occupied by the picture...
Signature schemeHere authentication is conducted by having the user drawingtheir signature using a mouse.
Pass Point SchemeUser click on any place on an image to create a password. Atolerance around each chosen pixel is calcula...
 Dhamija and Perrig SchemePick several pictures out of many choices, identify them laterin authentication.
 Passface scheme:In this technique human faces are used as password.
 Sobrado and Birget SchemeSystem display a number of pass-objects (pre-selected by user)among many other objects, user cl...
Advantages of Graphical password Graphical password schemes provide a way of making morehuman-friendly passwords . Here...
 Disadvantages of Graphical password Password registration and log-in process take too long. Require much more storage ...
Graphical passwords are an alternative to textual alphanumericpassword.It satisfies both conflicting requirements i.e. i...
Thank You…
Upcoming SlideShare
Loading in …5
×

Graphical password authentication

46,930 views

Published on

Published in: Education, Technology

Graphical password authentication

  1. 1. PRESENTED BYAsim Kumar PathakCS-47/09
  2. 2. IntroductionOverview of the Authentication MethodsText Password and drawbacks.Graphical Passwords.The surveyRecall Based TechniquesRecognition Based TechniquesDiscussionAdvantagesdisadvantagesConclusion
  3. 3. What is PASSWORDThe term PASSWORD commonly refers to a secret used forauthentication. Passwords are the most commonly used method foridentifying users in computer and communication systems.PASSWORDS are used for: Logging into accounts. Retrieving emails. Accessing applications. Networks. Websites Databases workstations
  4. 4. Token based authentication Key cards, bank cards, smart card, …Biometric based authentication Fingerprints, iris scan, facial recognition, …Knowledge based authentication Text-based passwords, picture-based passwords, … Most widely used authentication techniques
  5. 5. Text PasswordText password is a secret word or string of characters that isused for user authentication to prove his identity and gain accessto resources.Drawback Difficulty of remembering passwords. easy to remember -> easy to guess hard to guess -> hard to remember Vulnerable to attacks like Dictionary attack, Brute forceattack .Many solutions have been proposed. Graphical password isone of the solutions.
  6. 6.  Graphical passwords were originally described by BLONDERin 1996. A graphical password is an authentication system that worksby having the user select from images, in a specificorder, presented in a graphical user interface (GUI). For this reason, the graphical-password approach issometimes called graphical user authentication (GUA).
  7. 7. Use of graphical password: Web log-in application. ATM machine. Mobile device.
  8. 8. Recall Based TechniquesA user is asked to reproduce something that he created orselected earlier during the registration stageRecognition Based TechniquesA user is presented with a set of images and the user passes theauthentication by recognizing and identifying the images heselected during the registration stage
  9. 9. Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of thegrids occupied by the picture are stored in the order of drawing. Redrawing has to touchthe same grids in thesame sequence inauthentication.
  10. 10. Signature schemeHere authentication is conducted by having the user drawingtheir signature using a mouse.
  11. 11. Pass Point SchemeUser click on any place on an image to create a password. Atolerance around each chosen pixel is calculated. In order to beauthenticated, user must click within the tolerances in thecorrect sequence.
  12. 12.  Dhamija and Perrig SchemePick several pictures out of many choices, identify them laterin authentication.
  13. 13.  Passface scheme:In this technique human faces are used as password.
  14. 14.  Sobrado and Birget SchemeSystem display a number of pass-objects (pre-selected by user)among many other objects, user click inside the convex hullbounded by pass-objects.
  15. 15. Advantages of Graphical password Graphical password schemes provide a way of making morehuman-friendly passwords . Here the security of the system is very high. Dictionary attacks and brute force search are infeasible.
  16. 16.  Disadvantages of Graphical password Password registration and log-in process take too long. Require much more storage space than text based passwords. Shoulder Surfing .- As the name implies, shoulder surfing is watching over peoplesshoulders as they process information.- Because of their graphic nature, nearly all graphical password schemesare quite vulnerable to shoulder surfing.
  17. 17. Graphical passwords are an alternative to textual alphanumericpassword.It satisfies both conflicting requirements i.e. it is easy toremember & it is hard to guess.By the solution of the shoulder surfing problem, it becomes moresecure & easier password scheme.Not yet widely used, current graphical password techniques arestill immature.
  18. 18. Thank You…

×