SlideShare a Scribd company logo
DATA SECURITY WITH
IMAGES THROUGH
CLICK POINTS
PRESENTED BY-
SARIA AFZAL and MANSI GUPTA
PICTURE PASSWORD AUTHENTICATION
The two most commonly used
techniques in picture password
authentication are-
Recognition based techniques
Recall based techniques
RECOGNITION AND RECALL
Recognition based
techniques
A user is presented with a set of images and the
user passes the authentication by recognizing and
identifying the images he selected during the
registration stage.
Recall based techniques
A user is asked to reproduce something that he
created or selected during the registration stage.
PICTURE PASSWORD
AUTHENTICATION
MODULES
USER REGISTRATION
PROCESS
PICTURE SELECTION
PROCESS
SYSTEM LOGIN
PROCESS
MODULE 1
USER REGISTRATION PROCESS
USER REGISTRATION PROCESS
REGISTER
Click on
REGISTER
button
Enter the general entries in their respective fields
user
Verify the
entries and
enter in the
database
MODULE 2
PICTURE SELECTION PROCESS
HOW TO SELECT THE PICTURE?
AFTER SELECTING A PICTURE
User click on
the point
Select
another
point
Point and the image will be
stored in the database
MODULE 3
SYSTEM LOGIN PROCESS
USERNAME VERIFICATION PROCESS
Username
verification
Checks the
username in the
database
Correct image
If username
not matched
Incorrect
username
User enters
the
username
Reenter
the
username
CLICK POINT VERIFICATION PROCESS
Database contains
saved picture and point
Correct
username
CORRECT CLICK POINT OPENS THE SYSTEM
PROTECTED WITH PASSWORD
ADVANTAGES OF PICTURE PASSWORD
 Pictures are easy to remember.
 Graphical password schemes provide a way
of making more human friendly passwords.
 Security of the system is very high.
 Dictionary attacks are infeasible.
DRAWBACKS OF PICTURE PASSWORD
 Password registration and log-in process
are long.
 Require much more storage space than text
based passwords.
 Not suitable for visually disabled people.
 Shoulder surfing.
DO’S AND DON’TS FOR SECURED
PASSWORD
Do’s
 Use easy to remember picture.
 Avoid dark spots on the picture while selecting the click
point.
 Choose 3 to 5 pictures for more stronger password.
 As the number of pictures increases the password
become more tight.
Don’ts
 Do not use too much bright and black pictures for
password.
Technique used-
• Recall based techniques
Technology used-
• Java
Tools-
• Netbeans6.9.1
• Oracle database
• Apache
Possible Attacks-
• Guessing
• Shoulder surfing
APPLICATIONS OF PICTURE PASSWORD SYSTEM
Hard disk locking.
System login and logout
process.
Folder locking.
Web login applications.
CONCLUSIONS
1. Picture password is an alternative to
an textual alphanumeric passwords.
2. It satisfies both conflicting
requirements i.e. it is easy to
remember & it is hard to guess.
3. picture password is still immature,
more research is required in this field.
THANK YOU…

More Related Content

What's hot

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
Ayisha M Kalburgi
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
Saurav Sinha
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
taniamutholil
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
Nexgen Technology
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
dhanyashree11
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abhijit Akotkar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical password
Graphical passwordGraphical password
Graphical password
swapnilbirdawade
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
erneelkamal
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
shalini singh
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
ZTech Proje
 

What's hot (18)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 

Similar to Data security with Images through clickpoints

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
IJERA Editor
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
IRJET Journal
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET Journal
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
Sudhanshu Raman
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
Research ppr
Research pprResearch ppr
Research ppr
Sara Sahu
 
CNS Review PPT.pptx
CNS  Review PPT.pptxCNS  Review PPT.pptx
CNS Review PPT.pptx
ShrutiBhartia1
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
IJET - International Journal of Engineering and Techniques
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
Geetha982072
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
ChikaDavidAma
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
IOSR Journals
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
IRJET Journal
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 

Similar to Data security with Images through clickpoints (20)

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Research ppr
Research pprResearch ppr
Research ppr
 
CNS Review PPT.pptx
CNS  Review PPT.pptxCNS  Review PPT.pptx
CNS Review PPT.pptx
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 

Data security with Images through clickpoints

  • 1. DATA SECURITY WITH IMAGES THROUGH CLICK POINTS PRESENTED BY- SARIA AFZAL and MANSI GUPTA
  • 2. PICTURE PASSWORD AUTHENTICATION The two most commonly used techniques in picture password authentication are- Recognition based techniques Recall based techniques
  • 3. RECOGNITION AND RECALL Recognition based techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. Recall based techniques A user is asked to reproduce something that he created or selected during the registration stage.
  • 6. USER REGISTRATION PROCESS REGISTER Click on REGISTER button Enter the general entries in their respective fields user Verify the entries and enter in the database
  • 8. HOW TO SELECT THE PICTURE?
  • 9. AFTER SELECTING A PICTURE User click on the point Select another point Point and the image will be stored in the database
  • 11. USERNAME VERIFICATION PROCESS Username verification Checks the username in the database Correct image If username not matched Incorrect username User enters the username Reenter the username
  • 12. CLICK POINT VERIFICATION PROCESS Database contains saved picture and point Correct username
  • 13. CORRECT CLICK POINT OPENS THE SYSTEM PROTECTED WITH PASSWORD
  • 14. ADVANTAGES OF PICTURE PASSWORD  Pictures are easy to remember.  Graphical password schemes provide a way of making more human friendly passwords.  Security of the system is very high.  Dictionary attacks are infeasible.
  • 15. DRAWBACKS OF PICTURE PASSWORD  Password registration and log-in process are long.  Require much more storage space than text based passwords.  Not suitable for visually disabled people.  Shoulder surfing.
  • 16. DO’S AND DON’TS FOR SECURED PASSWORD Do’s  Use easy to remember picture.  Avoid dark spots on the picture while selecting the click point.  Choose 3 to 5 pictures for more stronger password.  As the number of pictures increases the password become more tight. Don’ts  Do not use too much bright and black pictures for password.
  • 17. Technique used- • Recall based techniques Technology used- • Java Tools- • Netbeans6.9.1 • Oracle database • Apache Possible Attacks- • Guessing • Shoulder surfing
  • 18. APPLICATIONS OF PICTURE PASSWORD SYSTEM Hard disk locking. System login and logout process. Folder locking. Web login applications.
  • 19. CONCLUSIONS 1. Picture password is an alternative to an textual alphanumeric passwords. 2. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. 3. picture password is still immature, more research is required in this field.