SlideShare a Scribd company logo
MATRIC NO. : BTBL17047072
PROGRAMME : COMPUTER NETWORK
SECURITY
STUDENT: NURRUL HAFIZZA BINTI MOHD
ANIS
SUPERVISOR: PROF. MADYA DR ZARINA
BINTI MOHAMAD
NAME : NURRUL HAFIZZA BINTI
MOHD ANIS
PROBLEM
STATEMENT
OBJECTIVES
SCOPE
LIMITATION OF
WORK
INTRODUCTION LITERATURE REVIEW
GANTT CHART
REFERENCES
EXPECTED RESULT
METHODOLOGY
1) Authentication is the first line of defence and also one of the techniques to
protect against harm including encipherments, routing protocols, digital
signature and data integrity as it ensure and confirm user’s identity [1].
2) Passwords are often used to secure computers and information. A good
password for security should be easy for the user to remember, difficult for
others to steal and hard to guess by impostor [2].
3) Authentication can be divided into three which are token-based
authentication, biometric based authentication and knowledge based
authentication.
PROBLEM STATEMENT
Most of the users tend to use weak password because
a long and random password is secure but it is hard
for the users to remember [8].
Weak passwords is easier to remember but it vulnerable by
various attacks such as brute force attack, dictionary attack
and shoulder surfing to succeed in password exploitation.
Hackers can get any password cracking software
for free on the internet that will test most
combination of characters for each user on a
system and retrieve the password.
OBJECTIVES
To study and design the
graphical password.
关键词
关键词
关键词
To implement and
combine cued-recall
based technique with
zero knowledge protocol.
To test the efficiency and
the secure of the
graphical password
using cued recall based
techniques combine with
zero knowledge protocol.
SCOPE
USER
register for the first visit in the
system.
SYSTEM
Login to the system and select
five images that have been
selected during register process
and click at the same point that
they have clicked before.
view user’s password and
responsible to it
system can verify and
authorize the user by the
password that user’s key in.
LIMITATION OF WORK
1) The images can only be selected from database for the registration
phase.
2) This system used for authentication only.
3) The combination of graphical password of cued click point with
zero knowledge protocol might be slower compare to traditional text-
based password authentication system.
LITERATURE
REVIEW
YEAR AUTHOR TITLE TECHNIQUE DESCRIPTION
2015 Rashmi. K.,
Naaz. S.
Graphical Password
Authentication Using
Cued Click Points
Cued Click
Points
- Cued Click Points provide greater
security than Passpoints because the
number of images increase the
workload for attackers.- Require more
storage for images- Performance was
very good in terms of speed, accuracy,
and number of errors.
2013 Khundrakpam
Johnson
Singh, Usham
Sanjota Chanu
Graphical Password or
Graphical User
Authentication as
Effective Password
Provider
Cued recall
based methods
- User presented with a grid of pictures
or segments of a single picture. -
Graphical password allow users to click
on certain areas.- People are better at
memorizing graphical passwords.- More
difficult to break graphical passwords
using traditional attack such as brute
force attack and dictionary attack.
2015 Majed Sanan ,
Mahmoud
Rammal
,Wassim
Rammal
Graphical Passwords
replacing text
passwords:
Advantages and Cons
Recognition
based and
recall based
methods
- Graphical passwords replace text
passwords- Human can remember
images better than text.- Graphical
password is more secure eventhough it
is slow log-in operation.
2014 Ramanan, S.,
Bindhu. J.
A Survey on Different
Graphical Password
Authentication
Techniques
Recognition
based, pure
recall based,
cued recall
based and
hybrid schemes
- Hybrid schemes and cued recall based
have a great seccurity than recognition
based and pure recall based methods.-
Registration and login process takes a
long time.- improve the security as the
alphanumeric corpus size is limited.
2012 Meng. Y Designing Click-Draw
Based Graphical
PasswordScheme for
Better Authentication
Recall Based
Techniques
- Further enhance the image-based
authentication in both security and
usability- It is hard and expensive for an
authentication system to accurately
recognize.
2007 Dirik, A.E.,
Memon, N., &
Birget, J.C
Modeling user Choice
in the Passpoints
Graphical Password
Scheme
Passpoint
technique
- More secure than text based
passwords but less secure than cued
click point.- Hard to remember more
than two points in one images.
EXPECTED RESULTS
KEY WORDS
1) Can replace authentication using textual password as it is more efficient.
2) Produce more secure password.
GANTT CHART
Duration
Task FYP 1
September October
1 2 3 4 5 6 7 8
Project Title proposal
Discussion and selection title
Develop gantt chart
State problem statement
State objective
Submission of abstract
State scope
Literature review research
Research for methodology
Preparation proposal
Presentation project proposal
Proposal correction
REFERENCES
1) Ms Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty,
Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and
Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64
2) Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme
Based On Color Image Gallery, International Journal of Engineering and Innovative Technology
(IJEIT) Volum2, Issue 4, October 2012.
3) Rashmi. K., Naaz. S., Graphical Password Authentication Using Cued Click Points
, International Journal of Engineering and Innovative Technology (IJEIT) ,2015.
4) Hu, W., X. Wu, and G.Wei, The Security Analysis of Graphical Passwords, in International
Conference on Communications and Intelligence Information Security.2010.
5) A.H. Lashkari, F.T., Graphical User Authentication(GUA).2010: Lambert Academic Publisher.
METHODOLOGY
USE CASE DIAGRAM
FLOWCHART REGISTRATION
Input: User enter details, select pictures and
click at some point for password.
Output: User receives positive message from
the system which is successfully registered.
FLOWCHART LOGIN
Input: User provides username and verify. The
correct username display the image and user
choose five image from database.
Output: The authentication confirmed message.
FLOWCHART FOR CUED CLICK POINT
PROOF OF CONCEPT
Graphical Password Authentication using Cued click point technique with zero knowledge protocol
Graphical Password Authentication using Cued click point technique with zero knowledge protocol

More Related Content

What's hot

Automated Train Ticket Validation and Verification System.
Automated Train Ticket Validation and Verification System.Automated Train Ticket Validation and Verification System.
Automated Train Ticket Validation and Verification System.
Ajinkya Mohod
 
Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)
Vidyut Singhania
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
SarvaniShettigar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Shobha Rani
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
Suman Mia
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
TELKOMNIKA JOURNAL
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
lemon_au
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
Aditya Mishra
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
movie ticket pricing prediction
movie ticket pricing prediction movie ticket pricing prediction
movie ticket pricing prediction
Abinaya Muruganantham
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlab
Kongara Sudharshan
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Automatic number-plate-recognition
Automatic number-plate-recognitionAutomatic number-plate-recognition
Automatic number-plate-recognition
Devang Tailor
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 

What's hot (20)

Automated Train Ticket Validation and Verification System.
Automated Train Ticket Validation and Verification System.Automated Train Ticket Validation and Verification System.
Automated Train Ticket Validation and Verification System.
 
Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
 
3 d password
3 d password 3 d password
3 d password
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
movie ticket pricing prediction
movie ticket pricing prediction movie ticket pricing prediction
movie ticket pricing prediction
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlab
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Automatic number-plate-recognition
Automatic number-plate-recognitionAutomatic number-plate-recognition
Automatic number-plate-recognition
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

Similar to Graphical Password Authentication using Cued click point technique with zero knowledge protocol

Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
nuruladnan11
 
Poster fyp 047072
Poster fyp 047072Poster fyp 047072
Poster fyp 047072
NurrulHafizza
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
IJERA Editor
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
Fyp2
Fyp2Fyp2
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
GirishKA4
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
IRJET Journal
 
3 d
3 d3 d
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
gadisagemechu1
 

Similar to Graphical Password Authentication using Cued click point technique with zero knowledge protocol (20)

Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Poster fyp 047072
Poster fyp 047072Poster fyp 047072
Poster fyp 047072
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Fyp2
Fyp2Fyp2
Fyp2
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
3 d
3 d3 d
3 d
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Graphical Password Authentication using Cued click point technique with zero knowledge protocol

  • 1. MATRIC NO. : BTBL17047072 PROGRAMME : COMPUTER NETWORK SECURITY STUDENT: NURRUL HAFIZZA BINTI MOHD ANIS SUPERVISOR: PROF. MADYA DR ZARINA BINTI MOHAMAD NAME : NURRUL HAFIZZA BINTI MOHD ANIS
  • 2. PROBLEM STATEMENT OBJECTIVES SCOPE LIMITATION OF WORK INTRODUCTION LITERATURE REVIEW GANTT CHART REFERENCES EXPECTED RESULT METHODOLOGY
  • 3. 1) Authentication is the first line of defence and also one of the techniques to protect against harm including encipherments, routing protocols, digital signature and data integrity as it ensure and confirm user’s identity [1]. 2) Passwords are often used to secure computers and information. A good password for security should be easy for the user to remember, difficult for others to steal and hard to guess by impostor [2]. 3) Authentication can be divided into three which are token-based authentication, biometric based authentication and knowledge based authentication.
  • 4. PROBLEM STATEMENT Most of the users tend to use weak password because a long and random password is secure but it is hard for the users to remember [8]. Weak passwords is easier to remember but it vulnerable by various attacks such as brute force attack, dictionary attack and shoulder surfing to succeed in password exploitation. Hackers can get any password cracking software for free on the internet that will test most combination of characters for each user on a system and retrieve the password.
  • 5. OBJECTIVES To study and design the graphical password. 关键词 关键词 关键词 To implement and combine cued-recall based technique with zero knowledge protocol. To test the efficiency and the secure of the graphical password using cued recall based techniques combine with zero knowledge protocol.
  • 6. SCOPE USER register for the first visit in the system. SYSTEM Login to the system and select five images that have been selected during register process and click at the same point that they have clicked before. view user’s password and responsible to it system can verify and authorize the user by the password that user’s key in.
  • 7. LIMITATION OF WORK 1) The images can only be selected from database for the registration phase. 2) This system used for authentication only. 3) The combination of graphical password of cued click point with zero knowledge protocol might be slower compare to traditional text- based password authentication system.
  • 9. YEAR AUTHOR TITLE TECHNIQUE DESCRIPTION 2015 Rashmi. K., Naaz. S. Graphical Password Authentication Using Cued Click Points Cued Click Points - Cued Click Points provide greater security than Passpoints because the number of images increase the workload for attackers.- Require more storage for images- Performance was very good in terms of speed, accuracy, and number of errors. 2013 Khundrakpam Johnson Singh, Usham Sanjota Chanu Graphical Password or Graphical User Authentication as Effective Password Provider Cued recall based methods - User presented with a grid of pictures or segments of a single picture. - Graphical password allow users to click on certain areas.- People are better at memorizing graphical passwords.- More difficult to break graphical passwords using traditional attack such as brute force attack and dictionary attack. 2015 Majed Sanan , Mahmoud Rammal ,Wassim Rammal Graphical Passwords replacing text passwords: Advantages and Cons Recognition based and recall based methods - Graphical passwords replace text passwords- Human can remember images better than text.- Graphical password is more secure eventhough it is slow log-in operation.
  • 10. 2014 Ramanan, S., Bindhu. J. A Survey on Different Graphical Password Authentication Techniques Recognition based, pure recall based, cued recall based and hybrid schemes - Hybrid schemes and cued recall based have a great seccurity than recognition based and pure recall based methods.- Registration and login process takes a long time.- improve the security as the alphanumeric corpus size is limited. 2012 Meng. Y Designing Click-Draw Based Graphical PasswordScheme for Better Authentication Recall Based Techniques - Further enhance the image-based authentication in both security and usability- It is hard and expensive for an authentication system to accurately recognize. 2007 Dirik, A.E., Memon, N., & Birget, J.C Modeling user Choice in the Passpoints Graphical Password Scheme Passpoint technique - More secure than text based passwords but less secure than cued click point.- Hard to remember more than two points in one images.
  • 11. EXPECTED RESULTS KEY WORDS 1) Can replace authentication using textual password as it is more efficient. 2) Produce more secure password.
  • 12. GANTT CHART Duration Task FYP 1 September October 1 2 3 4 5 6 7 8 Project Title proposal Discussion and selection title Develop gantt chart State problem statement State objective Submission of abstract State scope Literature review research Research for methodology Preparation proposal Presentation project proposal Proposal correction
  • 13. REFERENCES 1) Ms Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64 2) Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012. 3) Rashmi. K., Naaz. S., Graphical Password Authentication Using Cued Click Points , International Journal of Engineering and Innovative Technology (IJEIT) ,2015. 4) Hu, W., X. Wu, and G.Wei, The Security Analysis of Graphical Passwords, in International Conference on Communications and Intelligence Information Security.2010. 5) A.H. Lashkari, F.T., Graphical User Authentication(GUA).2010: Lambert Academic Publisher.
  • 16. FLOWCHART REGISTRATION Input: User enter details, select pictures and click at some point for password. Output: User receives positive message from the system which is successfully registered.
  • 17. FLOWCHART LOGIN Input: User provides username and verify. The correct username display the image and user choose five image from database. Output: The authentication confirmed message.
  • 18. FLOWCHART FOR CUED CLICK POINT