SlideShare a Scribd company logo
SEMINAR
ON
GRAPHICAL PASSWORD AUTHENTICATION
1
CONTENTS
 Introduction
o Text Password
 Advantages And Disadvantages of text password
 Graphical password
 Use of graphical password
 Over View Of The Authentication Methods
 Comparison between Graphical password and
Alphanumeric password
 Advantages and Disadvantages of graphical password
 Conclusion
2
INTRODUCTION
 Graphical password authentication is a form of
authentication that requires the recall and selection of an
image or points in an image inputted during the registration
stage in a graphical user interface.
 A graphical based password is one promising alternatives
of textual passwords.
 The most common computer authentication method in use
today is alphanumerical usernames and passwords.
3
TEXT PASSWORD
 Text password is a secret word or string of characters that is
used for user authentication to prove his identity and gain
access to resources.
 With this text password, the user has no longer remember,
so this graphical password is used.
 Text password is a problem to the users for remembering
long time.
4
ADAVNTAGES &DISADVANTAGES
OF TEXT PASSWORD
Advantages:
 Simple to use
 Simple to deploy—since the operating system provides the user
accounts and password, almost no extra configuration is
needed.
Disadvantages:
 Security is entirely based on confidentiality and the strength of
the password.
 Does not provide strong identity check.
:
5
GRAPHICAL PASSWORD
 A graphical password is an authentication system that works
by having the user select from images, in a specific order,
presented in a graphical user interface (GUI).
 For this reason, the graphical-password approach is
sometimes called graphical user authentication (GUA).
 A graphical password is easier than a text-based password for
most people to remember.
 Graphical passwords were originally implemented in vb.net.6
PASSWORD ARE USED IN:
.
o Logging into accounts.
o Retrieving emails.
o Accessing Applications.
o Networks.
o Websites.
o Databases.
o Workstations.
.
7
OVER VIEW OF
AUTHENTICATION METHODS
 Token based authentication
 Biometric based authentication
 Knowledge based authentication
8
TOKEN BASED AUTHENTICATION
 It is based on “What You Possess”. For example
 Smart Cards.
 A driver’s license
 Credit card
 A university ID card etc.
 Many token based authentication systems also use
knowledge based techniques to enhance security.
9
BIOMETRIC BASED AUTHENTICATION
 Biometrics is the study of automated methods for uniquely
recognizing humans based upon one or more physical or
behavioral .
 It uses physiological or behavioral characteristics like
fingerprint or facial scans and iris or voice recognition to
identify users.
 A biometric scanning device takes a user's biometric data,
such as an iris pattern or fingerprint scan, and converts it into
digital information a computer can interpret and verify.
10
KNOWLEDGE BASED AUTHENTICATION
 Knowledge Based Authentication (KBA) is based on using
“What You Know” to identify you. For example; a Personal
Identification Number (PIN), .
 It is an authentication scheme in which the user is asked to
answer at least one "secret" question.
 Knowledge based techniques are the most widely used
authentication techniques and include both text-based and
picture-based passwords.
 The picture-based techniques can be further divided into two
categories:
11
CONT…
Two Categories:
 Recall Based Techniques
A user is asked to reproduce something that he created or
selected earlier during the registration stage.
 Recognition Based Techniques
A user is presented with a set of images and the user
passes the authentication by recognizing and identifying
the images he selected during the registration stage.
12
COMPARISON B/W ALPHA-NUMERIC AND
GRAPHICAL PASSWORDS
Commonly used guidelines for alpha-numeric passwords
are:
 The password should be at least 8 characters long.
 The password should be easy to relate to the user(e.g., last
name, birth date).
 Ideally, the user should combine upper and lower case
letters and digits.
Graphical passwords
 The password consists of some actions that the user
performs on an image.
 Such passwords are easier to remember & hard to guess.13
ADVANTAGES OF GRAPHICAL
PASSWORD
 A graphical password authentication system is relatively
inexpensive to implement
 Graphical passwords provide a way of making user friendly
passwords.
 Graphical passwords are not vulnerable to dictionary
attacks.
 It is less convenient for a user to give away graphical
passwords to another person.
14
DISADVANTAGES OF GRAPHICAL
PASSWORD
 Password registration and login process takes too
long login process is slow .
 Most users are not familiar with the graphical
passwords, they often find graphical passwords less
convenient and time consuming.
 Graphical passwords are prone to shoulder surfing.
This is because of their graphic nature, nearly all
graphical password scheme are prone to shoulder
surfing.
15
CONCLUSION
Graphical passwords are an alternative to
textual alphanumeric password. It satisfies both
conflicting requirements i.e it is easy to remember and
it is hard to guess. By the solution off the shoulder
surfing problem,it becomes more secure and easier
password scheme.Not yet widely used,current
graphical password techniques are still immature.
16
ANY QUERIES?
17
18

More Related Content

What's hot

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
Graphical password
Graphical passwordGraphical password
Graphical password
sowji888
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
Vikram Verma
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
PRINCE PRANAV
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
Nawin Kumar Sharma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
Mohab El-Shishtawy
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Rajiv Ranjan Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 

What's hot (20)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password 3 d password
3 d password
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
3 d password
3 d password3 d password
3 d password
 

Similar to Graphical Password Authentication

Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
RohitSabale4
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
Geetha982072
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
KumudhaKumar1
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
IRJET Journal
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
prasanna9
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
Sameer Dighe
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
Sunanda Bansal
 
3D Password
3D Password3D Password
3D Password
Shubham Rungta
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
 

Similar to Graphical Password Authentication (20)

Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password
3D Password3D Password
3D Password
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 

More from Shobha Rani

Web Mining
Web MiningWeb Mining
Web Mining
Shobha Rani
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
Shobha Rani
 
3D Optical Data Storage
3D Optical Data Storage 3D Optical Data Storage
3D Optical Data Storage
Shobha Rani
 
Web Mining
Web MiningWeb Mining
Web Mining
Shobha Rani
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
Shobha Rani
 
Brain gate ppt
Brain gate pptBrain gate ppt
Brain gate ppt
Shobha Rani
 
Human Computer Interface (HCI)
Human Computer Interface (HCI)Human Computer Interface (HCI)
Human Computer Interface (HCI)
Shobha Rani
 
Cluster Computing
Cluster Computing Cluster Computing
Cluster Computing
Shobha Rani
 

More from Shobha Rani (8)

Web Mining
Web MiningWeb Mining
Web Mining
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
 
3D Optical Data Storage
3D Optical Data Storage 3D Optical Data Storage
3D Optical Data Storage
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Night Vision Technology
Night Vision TechnologyNight Vision Technology
Night Vision Technology
 
Brain gate ppt
Brain gate pptBrain gate ppt
Brain gate ppt
 
Human Computer Interface (HCI)
Human Computer Interface (HCI)Human Computer Interface (HCI)
Human Computer Interface (HCI)
 
Cluster Computing
Cluster Computing Cluster Computing
Cluster Computing
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Graphical Password Authentication

  • 2. CONTENTS  Introduction o Text Password  Advantages And Disadvantages of text password  Graphical password  Use of graphical password  Over View Of The Authentication Methods  Comparison between Graphical password and Alphanumeric password  Advantages and Disadvantages of graphical password  Conclusion 2
  • 3. INTRODUCTION  Graphical password authentication is a form of authentication that requires the recall and selection of an image or points in an image inputted during the registration stage in a graphical user interface.  A graphical based password is one promising alternatives of textual passwords.  The most common computer authentication method in use today is alphanumerical usernames and passwords. 3
  • 4. TEXT PASSWORD  Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  With this text password, the user has no longer remember, so this graphical password is used.  Text password is a problem to the users for remembering long time. 4
  • 5. ADAVNTAGES &DISADVANTAGES OF TEXT PASSWORD Advantages:  Simple to use  Simple to deploy—since the operating system provides the user accounts and password, almost no extra configuration is needed. Disadvantages:  Security is entirely based on confidentiality and the strength of the password.  Does not provide strong identity check. : 5
  • 6. GRAPHICAL PASSWORD  A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).  For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).  A graphical password is easier than a text-based password for most people to remember.  Graphical passwords were originally implemented in vb.net.6
  • 7. PASSWORD ARE USED IN: . o Logging into accounts. o Retrieving emails. o Accessing Applications. o Networks. o Websites. o Databases. o Workstations. . 7
  • 8. OVER VIEW OF AUTHENTICATION METHODS  Token based authentication  Biometric based authentication  Knowledge based authentication 8
  • 9. TOKEN BASED AUTHENTICATION  It is based on “What You Possess”. For example  Smart Cards.  A driver’s license  Credit card  A university ID card etc.  Many token based authentication systems also use knowledge based techniques to enhance security. 9
  • 10. BIOMETRIC BASED AUTHENTICATION  Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more physical or behavioral .  It uses physiological or behavioral characteristics like fingerprint or facial scans and iris or voice recognition to identify users.  A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. 10
  • 11. KNOWLEDGE BASED AUTHENTICATION  Knowledge Based Authentication (KBA) is based on using “What You Know” to identify you. For example; a Personal Identification Number (PIN), .  It is an authentication scheme in which the user is asked to answer at least one "secret" question.  Knowledge based techniques are the most widely used authentication techniques and include both text-based and picture-based passwords.  The picture-based techniques can be further divided into two categories: 11
  • 12. CONT… Two Categories:  Recall Based Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage.  Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. 12
  • 13. COMPARISON B/W ALPHA-NUMERIC AND GRAPHICAL PASSWORDS Commonly used guidelines for alpha-numeric passwords are:  The password should be at least 8 characters long.  The password should be easy to relate to the user(e.g., last name, birth date).  Ideally, the user should combine upper and lower case letters and digits. Graphical passwords  The password consists of some actions that the user performs on an image.  Such passwords are easier to remember & hard to guess.13
  • 14. ADVANTAGES OF GRAPHICAL PASSWORD  A graphical password authentication system is relatively inexpensive to implement  Graphical passwords provide a way of making user friendly passwords.  Graphical passwords are not vulnerable to dictionary attacks.  It is less convenient for a user to give away graphical passwords to another person. 14
  • 15. DISADVANTAGES OF GRAPHICAL PASSWORD  Password registration and login process takes too long login process is slow .  Most users are not familiar with the graphical passwords, they often find graphical passwords less convenient and time consuming.  Graphical passwords are prone to shoulder surfing. This is because of their graphic nature, nearly all graphical password scheme are prone to shoulder surfing. 15
  • 16. CONCLUSION Graphical passwords are an alternative to textual alphanumeric password. It satisfies both conflicting requirements i.e it is easy to remember and it is hard to guess. By the solution off the shoulder surfing problem,it becomes more secure and easier password scheme.Not yet widely used,current graphical password techniques are still immature. 16
  • 18. 18