SlideShare a Scribd company logo
1 of 30
PRESENTED BY:

HARIKRISHNAN NAIR
The two most commonly used techniques in picture password
RECOGNITION BASED TECHNIQUES
 A user is presented with a set of images and the user passes the
 authentication by recognizing and identifying the images he selected
 during the registration stage


RECALL BASED TECHNIQUES
 A user is asked to reproduce something that he          created or
 selected earlier during the registration stage
  THIS      PROJECT        IS   BASED    ON      RECALL     BASED
MODULES   USER REGISTRATION
              PROCESS
                                  FINAL
                              REGISTRATION
                                PROCESS
          PICTURE SELECTION
               PROCESS



              SYSTEM
           LOGIN PROCESS
//EXAMPLE:

Enter the username in the
                                                         rocky
username field
  USERNAME


        Click on
        NEW USER REGISTER button


            NEW USER
            REGISTER                                     DATABASE
                                  Verifies the username and
 New user registration process.   store into the database
How to Select picture’s?
There are two ways for selecting an picture for password authen
User Defined Picture’s
Picture’s are selected by the user from the hard disk or any other image
supported devices.


   PICTURE
System Defined Picture’s
Picture’s are selected by the user from the database of the
password system

   PICTURE




                                                         DATABASE
THE PICTURE
                            SELECTED FROM ONE
                              OF THE SYSTEM




   USER DEFINED PICTURE


           OR
DATABASE
                             Picture + Gridlines
           SYSTEM DEFINED PICTURE
MESSAGE BOX:

                                 DO YOU WISH TO CONTINUE WITH THIS POINT

                                 YES                                NO




                                                           Select another po

         User click on the       DATABASE
         point

                   Point and the image will be stored into database .
                   Now the user can select another image and follows the
User with username Steps above.
Click point’s as password
1st click          2nd click   3rd click   4th click   5th click …




     Click
     point
FINAL REGISTRATION PROCESS
       USER REGISTRATION PROCESS          +    PICTURE SELECTION PROCESS

           STEP1:
            User enters the username and click on NRB.

           STEP2:
            Click on PICTURE button for selecting an picture for password.

           STEP3:
            Select a point on the picture and click to next picture.

           STEP4:
            The point on the last picture will be calculated as the last point for
              opening the desired system.

Note: all the points and the pictures along with the username will be stored into database
Username
 USERNAME          verification         Verifies the username

                                                                Checks the usernam
Reenter the                       Incorrect                     in the database
username                          username
         User enters
         the username
                     Generates an message
                     “ username doesn't match “                    DATABASE
                                                     If username
                     “Please Reenter the username”
                                                     not matched
          NOTE                                                       Correct
           The user can enter the username only 5 times             username
            if the username is wrong.

           If the incorrect username exists 5 times the
            PASSWORD SYSTEM SHUTS DOWN.
First picture stored in database during
                                                                              Last picture
           registration

                                                     Correct click point
                                                     Gives the next image
              Correct
              username




     DATABASE                                                               System gives 3 chances to
                                   Verification of click point              The user for incorrect
                                                                            password

Database contains saved
pictures and points.
                                    If the user exists 3 chances then the password system displays
                                    another picture which will be unrelated to the picture selected
                                    by the user during password creation
Opens the system protected with password

Last picture in the database




          The change password can be done after logging into the main
           system.

          The change password follow’s the same create password steps.
Advantages of picture password authentication

  Graphical password schemes provide a way of
   making more human-friendly passwords .

  Here the security of the system is very high.

  Here we use a series of selectable images on
   successive screen pages.

   Dictionary attacks are infeasible.
Drawback's of picture password
  Password registration and log-in process take too long.

  Require much more storage space than text based passwords.



 SHOULDER SURFING
 It means watching over people's shoulders as they process information.
 Examples include observing the keyboard as a person types his or her password,
 enters a PIN number, or views personal information.
    Because of their graphic nature, nearly all graphical password schemes are
 quite vulnerable to shoulder surfing.
Grid Square Size
 The security of this
   system
   depends on the size of
the
   picture

 As the size of the picture
  increases Simultaneously
  the grid square
  Increases.

 Thus, making the system
  highly Secured.

 We can also use
  encryption alg. For
Do’s and Don’ts for secured password

Do’s
1.   use easy to remember pictures but hard crack.

2.   Avoid hotspots on the picture while selecting click point.

3.   Always remember the click point and picture which will become
     helpful for knowledge based authentication.

4.   Choose minimum 3 pictures or maximum 5 pictures for this
     password system.

5.   As no Of pictures increases the password becomes that tight.


Don’ts
6.   Do not use too much bright and black pictures for password
T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D
                          SYSTEM

                1.   HARD DISK LOCKING.



   2. SYSTEM LOG IN AND LOG OUT PROCESS.
           3. FOLDER LOCKING     .




        4.    WEB LOG-IN APLLICATION
TECHNIQUE PROPOSED AND IMPLEMENTED BY
Blonder , Passlogix , Wiedenbeck


AUTHENTICATION PROCESS
Click on several pre- registered locations of a picture in the right sequence.


MEMORABILITY
Can be hard to remember


PASSWORD SPACE
N^K (N is the number of pixels or smallest units of a picture, K is the number of
locations to be clicked on)


POSSIBLE ATTACK METHODS
Guess, shoulder surfing
CONCLUSION
 Picture passwords are an alternative to textual alphanumeric password.

 It satisfies both conflicting requirements i.e. it is easy to remember & it is
  hard to guess.

 By the solution of the shoulder surfing problem, it becomes more secure &
  easier password scheme.

 By implementing encryption algorithms and hash algorithms for storing and
  retrieving pictures and points, one can achieve more security

 Picture password is still immature, more research is required in this field.
Ppt for graphical password authentication using cued click points

More Related Content

What's hot

A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
Vikram Verma
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 

What's hot (20)

A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfsteganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
A bufferrrrrrrrrr (1)
A bufferrrrrrrrrr (1)A bufferrrrrrrrrr (1)
A bufferrrrrrrrrr (1)
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

Viewers also liked

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 

Viewers also liked (13)

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Windows 8
Windows 8Windows 8
Windows 8
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
11aman
11aman11aman
11aman
 

Similar to Ppt for graphical password authentication using cued click points

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
saria11
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 

Similar to Ppt for graphical password authentication using cued click points (20)

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
 
An03402300234
An03402300234An03402300234
An03402300234
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Research ppr
Research pprResearch ppr
Research ppr
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Ppt for graphical password authentication using cued click points

  • 2. The two most commonly used techniques in picture password
  • 3. RECOGNITION BASED TECHNIQUES A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage RECALL BASED TECHNIQUES A user is asked to reproduce something that he created or selected earlier during the registration stage  THIS PROJECT IS BASED ON RECALL BASED
  • 4. MODULES USER REGISTRATION PROCESS FINAL REGISTRATION PROCESS PICTURE SELECTION PROCESS SYSTEM LOGIN PROCESS
  • 5.
  • 6. //EXAMPLE: Enter the username in the rocky username field USERNAME Click on NEW USER REGISTER button NEW USER REGISTER DATABASE Verifies the username and New user registration process. store into the database
  • 7.
  • 8. How to Select picture’s? There are two ways for selecting an picture for password authen
  • 9. User Defined Picture’s Picture’s are selected by the user from the hard disk or any other image supported devices. PICTURE
  • 10. System Defined Picture’s Picture’s are selected by the user from the database of the password system PICTURE DATABASE
  • 11. THE PICTURE SELECTED FROM ONE OF THE SYSTEM USER DEFINED PICTURE OR DATABASE Picture + Gridlines SYSTEM DEFINED PICTURE
  • 12. MESSAGE BOX: DO YOU WISH TO CONTINUE WITH THIS POINT YES NO Select another po User click on the DATABASE point Point and the image will be stored into database . Now the user can select another image and follows the User with username Steps above.
  • 13. Click point’s as password 1st click 2nd click 3rd click 4th click 5th click … Click point
  • 14.
  • 15. FINAL REGISTRATION PROCESS USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS STEP1:  User enters the username and click on NRB. STEP2:  Click on PICTURE button for selecting an picture for password. STEP3:  Select a point on the picture and click to next picture. STEP4:  The point on the last picture will be calculated as the last point for opening the desired system. Note: all the points and the pictures along with the username will be stored into database
  • 16.
  • 17.
  • 18. Username USERNAME verification Verifies the username Checks the usernam Reenter the Incorrect in the database username username User enters the username Generates an message “ username doesn't match “ DATABASE If username “Please Reenter the username” not matched NOTE Correct  The user can enter the username only 5 times username if the username is wrong.  If the incorrect username exists 5 times the PASSWORD SYSTEM SHUTS DOWN.
  • 19.
  • 20. First picture stored in database during Last picture registration Correct click point Gives the next image Correct username DATABASE System gives 3 chances to Verification of click point The user for incorrect password Database contains saved pictures and points. If the user exists 3 chances then the password system displays another picture which will be unrelated to the picture selected by the user during password creation
  • 21. Opens the system protected with password Last picture in the database  The change password can be done after logging into the main system.  The change password follow’s the same create password steps.
  • 22. Advantages of picture password authentication Graphical password schemes provide a way of making more human-friendly passwords . Here the security of the system is very high. Here we use a series of selectable images on successive screen pages.  Dictionary attacks are infeasible.
  • 23. Drawback's of picture password  Password registration and log-in process take too long.  Require much more storage space than text based passwords. SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
  • 24.
  • 25. Grid Square Size  The security of this system depends on the size of the picture  As the size of the picture increases Simultaneously the grid square Increases.  Thus, making the system highly Secured.  We can also use encryption alg. For
  • 26. Do’s and Don’ts for secured password Do’s 1. use easy to remember pictures but hard crack. 2. Avoid hotspots on the picture while selecting click point. 3. Always remember the click point and picture which will become helpful for knowledge based authentication. 4. Choose minimum 3 pictures or maximum 5 pictures for this password system. 5. As no Of pictures increases the password becomes that tight. Don’ts 6. Do not use too much bright and black pictures for password
  • 27. T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D SYSTEM 1. HARD DISK LOCKING. 2. SYSTEM LOG IN AND LOG OUT PROCESS. 3. FOLDER LOCKING . 4. WEB LOG-IN APLLICATION
  • 28. TECHNIQUE PROPOSED AND IMPLEMENTED BY Blonder , Passlogix , Wiedenbeck AUTHENTICATION PROCESS Click on several pre- registered locations of a picture in the right sequence. MEMORABILITY Can be hard to remember PASSWORD SPACE N^K (N is the number of pixels or smallest units of a picture, K is the number of locations to be clicked on) POSSIBLE ATTACK METHODS Guess, shoulder surfing
  • 29. CONCLUSION  Picture passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security  Picture password is still immature, more research is required in this field.