SlideShare a Scribd company logo
1 of 11
Graphical Password
Authentication System
Group Members
Kokane Shubham
Sabale Rohit
Dongare Akash
PROJECT GUIDE
PROF: B.JADHAV
Topic to be covered
• INTRODUCTION
• OBJECTIVES
• LITERATURE SURVEY
• Functional REQUIREMENTS
• Problem statement
• DATA FLOW DIAGRAM
• CONCLUSION
Introduction
Graphical password is one of process for authentication in computer
system computer security is create a afe zone for our digital devices
Graphical password is a one of the processes to provide our security
of digital device or important information: As we know that our
human brain can easly store or recall an image or image-based
password. So, we propose graphical password for user who can
register mndom with highly secure and there is no difficulty to recall
the graphical password Authentication is a data access point that
manages consumer security assurance. It is a process that grants in a
particular context requinng the customer to Validation schemes are
categorized as token-based authentication, validation based on
biometrics, validation based upon knowledge Tokens are used as a
Hidden Key in token-based authentication.
OBJECTIVES
Graphical password authentication systems are a type of
Image-based authentication that attempt to understand the
human memory for visual information. In Pass Points,
passwords consist of sequence pixel click-points on a
given image. Users may choose one pixels in that image
as click-points for their password.
LITERATURE SURVEY
In Dec 2009 author H. Gao proposed graphical password scheme
using color login. In this color login uses background color which
decrease login time. Possibility of accidental login is high and
password is too short. The system developed by Sobrado is
improved by combining text with images or colors to generate
session passwords for authentication. Session passwords can be
used only once and every time a new password is generated. The
advantages of this system is that it reduces the login time, session
passwords are also generated to improve security. The
disadvantage of this system is that it the possibility of accidental
login is high and password is too short.
Functional Requirements
• Hardware requirements
• I3 processor or above
• 4gb ram or above
• 500gb Hard disk
• Internet connection
• Software requirements
• Operating system(Window, Linux ,Mac )
• Database Server
• Language(python)
• pycham
Problem statement
Alphanumeric password is an old traditional common
authentication method. Practically this traditional method is too
unsecure system. For example, attacker may choose easily
guessed user’s password, if user is not using a strong password.
User may use same password for multiple device or site. This are
all unsecure characteristic for normal users. And authentication is
one of the important security points where user has active
responsibility for their personal information security. If we use
old traditional password system then there may have possibility
to dictionary attack, Brute Force Attack.
Data flow diagram
Advantage & disadvantage
• Advantage:
1. The system is user-friendly and has an easy interface.
2.It provides strong security against bot attacks or hackers.
3.Protects systems exposed to attacks.
4.Graphical passwords systems provide a way of making more
human-friendly passwords.
5.Dictionary advances and brute power searches are infeasible.
6. Protects systems vulnerable to attacks.
• Disadvantage:
1. The only disadvantage is if users forget the password, it
cannot be retrieved.
Conclusion
In this extended abstract we are trying to make our authentication
system more user friendly and also we have tried to implement
mature & fast Shoulder Surfing Resistant Mechanism. We have
considered both methods: text based and graphical based systems
and tried to reduce the efforts required by end-user to remember
passwords. A look at the advancement in technology over the past
few years tells us that the next era will have system security at its
core. Thus Graphical Password may be adapted in future as a major
authentication system.
finale.ppt.pptx

More Related Content

Similar to finale.ppt.pptx

Secure visual algorithm simulator
Secure visual algorithm simulatorSecure visual algorithm simulator
Secure visual algorithm simulator
Prachi Singhal
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
Sameer Dighe
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 

Similar to finale.ppt.pptx (20)

Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Secure visual algorithm simulator
Secure visual algorithm simulatorSecure visual algorithm simulator
Secure visual algorithm simulator
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
3D Password
3D Password3D Password
3D Password
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

finale.ppt.pptx

  • 1. Graphical Password Authentication System Group Members Kokane Shubham Sabale Rohit Dongare Akash PROJECT GUIDE PROF: B.JADHAV
  • 2. Topic to be covered • INTRODUCTION • OBJECTIVES • LITERATURE SURVEY • Functional REQUIREMENTS • Problem statement • DATA FLOW DIAGRAM • CONCLUSION
  • 3. Introduction Graphical password is one of process for authentication in computer system computer security is create a afe zone for our digital devices Graphical password is a one of the processes to provide our security of digital device or important information: As we know that our human brain can easly store or recall an image or image-based password. So, we propose graphical password for user who can register mndom with highly secure and there is no difficulty to recall the graphical password Authentication is a data access point that manages consumer security assurance. It is a process that grants in a particular context requinng the customer to Validation schemes are categorized as token-based authentication, validation based on biometrics, validation based upon knowledge Tokens are used as a Hidden Key in token-based authentication.
  • 4. OBJECTIVES Graphical password authentication systems are a type of Image-based authentication that attempt to understand the human memory for visual information. In Pass Points, passwords consist of sequence pixel click-points on a given image. Users may choose one pixels in that image as click-points for their password.
  • 5. LITERATURE SURVEY In Dec 2009 author H. Gao proposed graphical password scheme using color login. In this color login uses background color which decrease login time. Possibility of accidental login is high and password is too short. The system developed by Sobrado is improved by combining text with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. The advantages of this system is that it reduces the login time, session passwords are also generated to improve security. The disadvantage of this system is that it the possibility of accidental login is high and password is too short.
  • 6. Functional Requirements • Hardware requirements • I3 processor or above • 4gb ram or above • 500gb Hard disk • Internet connection • Software requirements • Operating system(Window, Linux ,Mac ) • Database Server • Language(python) • pycham
  • 7. Problem statement Alphanumeric password is an old traditional common authentication method. Practically this traditional method is too unsecure system. For example, attacker may choose easily guessed user’s password, if user is not using a strong password. User may use same password for multiple device or site. This are all unsecure characteristic for normal users. And authentication is one of the important security points where user has active responsibility for their personal information security. If we use old traditional password system then there may have possibility to dictionary attack, Brute Force Attack.
  • 9. Advantage & disadvantage • Advantage: 1. The system is user-friendly and has an easy interface. 2.It provides strong security against bot attacks or hackers. 3.Protects systems exposed to attacks. 4.Graphical passwords systems provide a way of making more human-friendly passwords. 5.Dictionary advances and brute power searches are infeasible. 6. Protects systems vulnerable to attacks. • Disadvantage: 1. The only disadvantage is if users forget the password, it cannot be retrieved.
  • 10. Conclusion In this extended abstract we are trying to make our authentication system more user friendly and also we have tried to implement mature & fast Shoulder Surfing Resistant Mechanism. We have considered both methods: text based and graphical based systems and tried to reduce the efforts required by end-user to remember passwords. A look at the advancement in technology over the past few years tells us that the next era will have system security at its core. Thus Graphical Password may be adapted in future as a major authentication system.