SlideShare a Scribd company logo
1 of 15
Nimisha Goel
Rollno:9910103481
Student at JIIT-128
Computer Science
Project 2013-14
 Graphical password is an authentication system that
works by having the user select from images in specific
order, presented in a graphical user interface.
 This approach sometimes called graphical user
authentication.
Token-based
 Based on “Something you possess”. It allows user to enter the username
and password in order to obtain the token. Once the token has been
obtained user can access the resource.
 Example-Smart card, University ID.
Biometric-based
 It means life measure. This implies it is a system which recognizes human-
based one or more physical and behavioural traits.
 Example-Finger Print scan
Knowledge based
 Based on “Something you know”. It is authentication scheme in which user
is asked to answer at least one secret question.
 Example PIN(personal identification number).
Recognition based
 Identifying whether user has seen one image before.
Pure recall based
 User has to reproduce something that he or she created
or selected earlier during the registration stage.
Cued recall based
 A user is provided with a hint so that he or she can
recall his his/her password
Hybrid Systems
 Combination of two or more schemes.
 Identification
Identify the user
 Authentication
User supplies the proof of her/his identity
 Authorization
User can access the resource.
 Originated by Blonder
 User select one point per image for five images. The
interface displays only one image at a time; the image
is replaced by the next image as soon as a user selects a
click point. The system determines the next image to
display based on the user’s click-point on the current
image.
 User select five images in sequence order and
during login phase user has to select the
selected images one by one in sequence
order from random positions of images in
grid view.
 If user selects wrong image then the selected
images will not display in the grid view. User
get to know user is going in wrong path.
 It is combination of pure recall and cued
recall system.
 Android SDK
 Eclipse Kepler
 It is graphical password application to unlock
the folder of private or public files.
 Android is the world's most widely used
Smartphone platform.
 Steps basically same as cued click points but
there is one difference i.e. Random function
which changes the position of images in grid
view and user has to select the selected from
them.
 Guessing Attack
 It includes Brute-force attack and dictionary
attack.
 Capture Attack
 directly obtain passwords by intercepting user-
entered data, or tricking users
 It includes Shoulder-surfing attack.
 users enter login information, an attacker may
gain knowledge about their credentials by direct
observation or external recording devices such as
video cameras.
 Many Graphical based algorithms provide better
security and usability than textual passwords.
 GPAS is more vulnerable to shoulder-surfing and
password capture attacks.
 It is hard to manage the balance between a
system which is user-oriented and also safe from
the hackers.
 Guess attack can be removed by increasing the
load of number of images on system.
 Android has captured a very good market and
used by more than 60% people. It is best to serve
the purpose of the project.
 The advantage of the approach is increasing
security by providing password of higher
security.
 The goal of GPAS is to reduce the probability of
security attacks like guessing attack as well as
encouraging users to select more random, and
difficult password to guess.
 It also increases the workload for the attackers
and system’s flexibility to increase the number of
images by selecting them at random that allows
arbitrarily increases this workload.
 It is effective to reduce the effect of hotspots
analysis.

More Related Content

What's hot

Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
Vikram Verma
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

What's hot (20)

Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
face recognition
face recognitionface recognition
face recognition
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 

Similar to Graphical password authentication system ppts

PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 

Similar to Graphical password authentication system ppts (20)

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
An03402300234
An03402300234An03402300234
An03402300234
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
grindle-hcii
grindle-hciigrindle-hcii
grindle-hcii
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Research ppr
Research pprResearch ppr
Research ppr
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 

Graphical password authentication system ppts

  • 1. Nimisha Goel Rollno:9910103481 Student at JIIT-128 Computer Science Project 2013-14
  • 2.  Graphical password is an authentication system that works by having the user select from images in specific order, presented in a graphical user interface.  This approach sometimes called graphical user authentication.
  • 3. Token-based  Based on “Something you possess”. It allows user to enter the username and password in order to obtain the token. Once the token has been obtained user can access the resource.  Example-Smart card, University ID. Biometric-based  It means life measure. This implies it is a system which recognizes human- based one or more physical and behavioural traits.  Example-Finger Print scan Knowledge based  Based on “Something you know”. It is authentication scheme in which user is asked to answer at least one secret question.  Example PIN(personal identification number).
  • 4. Recognition based  Identifying whether user has seen one image before. Pure recall based  User has to reproduce something that he or she created or selected earlier during the registration stage. Cued recall based  A user is provided with a hint so that he or she can recall his his/her password Hybrid Systems  Combination of two or more schemes.
  • 5.  Identification Identify the user  Authentication User supplies the proof of her/his identity  Authorization User can access the resource.
  • 6.  Originated by Blonder  User select one point per image for five images. The interface displays only one image at a time; the image is replaced by the next image as soon as a user selects a click point. The system determines the next image to display based on the user’s click-point on the current image.
  • 7.
  • 8.  User select five images in sequence order and during login phase user has to select the selected images one by one in sequence order from random positions of images in grid view.  If user selects wrong image then the selected images will not display in the grid view. User get to know user is going in wrong path.  It is combination of pure recall and cued recall system.
  • 9.
  • 10.  Android SDK  Eclipse Kepler
  • 11.  It is graphical password application to unlock the folder of private or public files.  Android is the world's most widely used Smartphone platform.  Steps basically same as cued click points but there is one difference i.e. Random function which changes the position of images in grid view and user has to select the selected from them.
  • 12.
  • 13.  Guessing Attack  It includes Brute-force attack and dictionary attack.  Capture Attack  directly obtain passwords by intercepting user- entered data, or tricking users  It includes Shoulder-surfing attack.  users enter login information, an attacker may gain knowledge about their credentials by direct observation or external recording devices such as video cameras.
  • 14.  Many Graphical based algorithms provide better security and usability than textual passwords.  GPAS is more vulnerable to shoulder-surfing and password capture attacks.  It is hard to manage the balance between a system which is user-oriented and also safe from the hackers.  Guess attack can be removed by increasing the load of number of images on system.  Android has captured a very good market and used by more than 60% people. It is best to serve the purpose of the project.
  • 15.  The advantage of the approach is increasing security by providing password of higher security.  The goal of GPAS is to reduce the probability of security attacks like guessing attack as well as encouraging users to select more random, and difficult password to guess.  It also increases the workload for the attackers and system’s flexibility to increase the number of images by selecting them at random that allows arbitrarily increases this workload.  It is effective to reduce the effect of hotspots analysis.