SlideShare a Scribd company logo
1 of 5
Download to read offline
Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64
www.ijera.com 60 | P a g e
Graphical password authentication using Pass faces
Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina
Rumao**, Aishwarya Shetty **
*(Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai-
103)
**(Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai-
103)
** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai-
103)
** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai-
103)
** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai-
103)
ABSTRACT
Authentication is one of the most important security primitive. Alphanumeric password authentication is most
widely used authentication mechanism. This mechanism has been shown to have several drawbacks and is prone
to various attacks such as brute force attack, shoulder surfing attack, dictionary attack. Thus to overcome the
drawbacks of alphanumeric passwords, we propose Graphical passwords as an alternative to alphanumeric
passwords. This is because humans tend to remember visuals better than text. This paper attempts to highlight
the existing graphical Passface system, its usability features and then develop a new graphical password system
that combines both graphic and texts passwords to fortify the authentication process on desktop systems.
Keywords – Security, Authentication, Graphical Password, Passfaces, Distortion.
I. INTRODUCTION
Password authentication is degrading as an
authentication mechanism due to lack of
memorability and security. In user authentication the
process which we have to pass through is username
and password. Most of the application provides
knowledge based authentication which include
alphanumeric password as well as graphical
password. Generally, password systems are faced by
problem of conflicting requirements. First is the fact
that passwords should be usable and easy to
remember. The second requirement is for it to be
secure. In today’s changing world when we are
having number of networks and personal account
some sort of easy authentication schema need to be
provided. To combat the various security
inadequacies, graphical password systems have been
proposed as a possible alternative to text-based
passwords, motivated particularly by the fact that
humans can remember pictures better than text.
Pictures are generally easier to be remembered or
recognized than text [5], especially photos, which are
even easier to be remembered than random pictures.
Although the existing Passface method covers many
usability features like easy to use, easy to memorize,
easy to recognize and easy to understand [2], but
there are several drawbacks with this algorithm.
When a password is selected by mouse, it is very
easy for the shoulder surfer attacker to observe the
password. Also another research shows users tend to
select faces of their own race which cause the
algorithm to be guessable by attacker [5]. The aim of
this study is to increase the security of Passface
algorithm by creating resistance to shoulder surfing
attack.
1. LITERATURE REVIEW
There are three types of user authentication:
Token based, Biometric based and Knowledge based
authentication, knowledge-based techniques are
currently the most frequently used method for user
authentication which includes text and image
passwords [6]. The picture-based techniques can be
further divided into two categories: recognition-based
and recall-based graphical techniques. Using
recognition-based techniques, a user is presented with
a set of images and the user passes the authentication
by recognizing and identifying the images he or she
selected during the registration stage. Using recall-
based techniques, a user is asked to reproduce
something that he or she created or selected earlier
during the registration stage [1]. The traditional and
most common authentication method employs
usernames and passwords composed of alphanumeric
text. This method has proven to be insecure in
practice [3]. Some drawbacks of alphanumeric text
RESEARCH ARTICLE OPEN ACCESS
Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64
www.ijera.com 61 | P a g e
password are like forgetting the password, choosing a
weak password, password stolen, etc. Moreover,
alphanumeric passwords are vulnerable to shoulder
surfing attack, spy ware attack and social engineering
attack etc [5].
1. Shoulder surfing attack
Shoulder surfing attack refers to looking over
someone’s shoulder in order to obtain information
such as password, PIN and other sensitive
information. It is effective if the attacker can observe
what the user keys in, clicks or touches. Graphical
authentication is generally more vulnerable to
shoulder surfing attacks than text-based passwords.
Due to this reason, only a few graphical
authentication methods are designed to resist
shoulder surfing attack.
2. Brute force attacks
It is a simplest attack form for an authentication
system where, the attacker tries to guess the correct
password.
Brute force attacks have two subtypes:
Dictionary Attacks: Here the attacker uses a
dictionary of common text or graphical passwords. In
the text-based password, dictionary attack creates a
dictionary of memorable words such as birthdates,
favorite foods, pet names, or person names as
potential passwords.
Guessing Attacks: The attacker here tries possible
passwords related to the user. Such as, birth date,
English name, phone number, combination of two
elements etc. To defend against brute force attacks
the system should have a sufficiently large password
space to make it impractical.
3. Spyware
There are several types of spyware including
hijackers, key loggers etc. Spyware collects
information entered by the user. With graphical
passwords, it is more difficult to conduct spyware
based attacks because it is harder to copy mouse
motions exactly. Combinations of Passfaces and text
may be especially resistant to spyware.
A graphical based password is one promising
alternatives of textual passwords. The motivation for
graphical authentication is that people remember
images better than text [3]. Pass face algorithm was
created in 2000, with the idea of using pictures of
human faces in order to validate the identity of user
[7]. If the number of possible pictures is sufficiently
large, the possible password space of a graphical
password scheme may exceed that of text based
schemes and thus presumably offer better resistance
to dictionary attacks [1]. Because of these (presumed)
advantages, there is a growing interest in graphical
password.
2. PREVIOUS WORK
In conventional Graphical Password
Authentication, the user will be asked to choose four
images of human faces from a face database as their
future password. In the authentication stage, the user
sees a grid of nine faces, consisting of one face
previously chosen by the user and eight decoy faces.
The user recognizes and clicks anywhere on the
known face. This procedure is repeated for several
rounds. The user is authenticated if he/she correctly
identifies the four faces [4]. The technique is based
on the assumption that people can recall human faces
easier than other pictures [1]. A potential drawback
of this system is that they are more vulnerable to
shoulder surfing than conventional alphanumeric text
passwords. Shoulder surfing refers to using direct
observation techniques, such as looking over
someone's shoulder, to get information. Also it is
easily predictable since people tend to choose images
that are more attractive.
Security Features of Graphical Passwords:
Different graphical password schemes have
different techniques to reduce the effectiveness of
known attacks [8]. It is considered good practice to
have security features in authentication to favor better
security over usability. However, building a balance
between usability and security can be difficult. It
might be a particular graphical password technique
has higher usability but less security or higher
security with low usability. For example increasing
the picture library would provide a larger password
space, but leads to longer login time due to
crowdedness during authentication. Combining
several security features should increase the security
level. For instance, implementing decoys, randomly
assigned, and random characters could make it harder
for the observer to obtain login session during
shoulder surfing activity surfing [6]. In addition the
location of the images can be randomized and not the
same for every authentication phase. Limited login
attempts block user access to the login page after
several unsuccessful login attempts.
3. PURPOSE
The proposed mechanism focuses on providing
more powerful secure authentication mechanism.
System goes through several phases before creating a
password and while logging into the system such as
image selection, image distortion, text association
and finally password generation. At the time of login,
one correct image from a 3X3 grid is identified. Grid
shows up one correct image and eight decoy faces
and shuffles faces for every attempt. Only upon
identifying correct image and entering text associated
with it, user gets access to the system.
Security Features of Graphical Passwords:
Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64
www.ijera.com 62 | P a g e
Different graphical password schemes have
different techniques to reduce the effectiveness of
known attacks [8]. It is considered good practice to
have security features in authentication to favor better
security over usability. However, building a balance
between usability and security can be difficult. It
might be a particular graphical password technique
has higher usability but less security or higher
security with low usability. For example increasing
the picture library would provide a larger password
space, but leads to longer login time due to
crowdedness during authentication. Combining
several security features should increase the security
level. For instance, implementing decoys, randomly
assigned, and random characters could make it harder
for the observer to obtain login session during
shoulder surfing activity surfing [6]. In addition the
location of the images can be randomized and not the
same for every authentication phase. Limited login
attempts block user access to the login page after
several unsuccessful login attempts.
II. SYSTEM DESCRIPTION:
1. DESIGN:
Fig. 1.Architectural Diagram of the proposed solution
2. DESCRIPTION:
In Password creation phase, user is given two
options; user can either provide images of their
choice or can select images from system database. In
either of the choice user is required to provide three
images.
System uses distortion technique in Distortion
phase to distort received or the provided images. This
distortion of images is carried out by using filters.
System then displays both the distorted and original
images to the user; so that it is easier for user to
mentally associate the distorted images. User is also
required to enter some random text for each of these
images. Both original and distorted images along
with the text are saved or preserved in database.
During Authentication phase, only valid user is
or will be granted access to the system. The system
will ask the user to identify one out of three user
entered images from the grid containing one correct
image and 8 decoy faces and also entering the
associated text. User gets only two attempts to
identify correct images from the grid and to enter the
associated text of the image. The system shuffles the
images in the grid every time the user logs in to the
system.
3. WORKING:
The system requires the user to start the
Graphical Password Authentication application.
System goes through Registration phase, Password
Creation phase and Authentication phase.
In Registration phase, user selects 'Register' option
from displayed Homepage. He can register to the
system by proving required details. Entered details
will then be validated and user name will be verified
against availability.
In Password creation phase, three images
provided by user are distorted using distortion
technique. The original and distorted images along
with the text are then saved or preserved in database.
During log-in phase, user gives username. Valid
users are shown grid of distorted images. The user
then has to identify the correct distorted image and
then enter the text associated with that image .This
procedure is carried out 3 times and on entering the
correct data user gets access to the system. User gets
exactly three attempts to enter correct username and
password into the system.
III. USER INTERFACE DESIGN:
Fig .2.Interface Design for Registration Screen
Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64
www.ijera.com 63 | P a g e
Fig. 3.Interface Design of the original Image with the
distorted Image
Fig .4.Interface Design for Password Login
IV. CONCLUSION
There is a growing interest in using pictures as
passwords instead of alphanumeric passwords. The
main reason for using Graphical passwords is they
can be easily recalled. In this paper, we have
proposed two step graphical password authentication
system which is based on Passfaces. In order to make
our system user friendly and at the same time
difficult to crack ,we have combined images along
with text .The original images taken by the user are
vulnerable to individualized educated guess attacks if
users have a good amount of information about the
users. Moreover, even in the case when the attacker
does not have any information about the users, the
attackers can make better guesses than random
guesses based on contextual information of the
original photos .In contrast, when distorted photos are
used as authentication images, attackers cannot make
better guesses than random guesses even with good
amount of knowledge about the target users. The
Distortion Technique can mitigate the risk of the
collective educated guess attacks using the Biases in
users’ choices of authentication images. Currently,
we are working on the System Evaluation and hope
our paper can prompt research in new techniques to
improve security systems.
Acknowledgements
We hereby take the privilege to present our
project report on “Graphical Authentication of
passwords using Passfaces”. We are very grateful to
our Project Supervisor Ms. Grinal Tuscano for
contributing her valuable moments in the Project
from her busy and hectic schedule right from the
Project’s inception. Being after us like a true mentor
and a great academic parent.
We are very thankful to Ms. Grinal Tuscano
whose guidance and support was an immense
motivation for us to carry on with our Project. She
has been a constant source of inspiration to us. Her
suggestions have greatly contributed for the
betterment of our project.
Our special thanks to the Head of Department
Mr. Pramod Shanbhag, staff members and lab
assistants for their co-operation.
REFERENCES
[1] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen
,“Graphical Passwords: A Survey”,
Department of Computer Science,Georgia
State University,Dec-2005,IEEE
[2] ShraddhaM. Gurav, Leena S. Gawade,
Prathamey K. Rane, Nilesh R. Khochare,
“Graphical Password Authentication”-
Cloud securing scheme,” IEEE 2014
International Conference on Electronic
Systems, Signal Processing and Computing
Technologies.
[3] Robert G. Rittenhouse, Junaid Ahsenali
Chaudry and Malrey Lee ,“Security in
Graphical Authentication”, International
Journal of Security and Its Applications
Vol. 7,No. 3, May, 2013
[4] Gaurav A.,Saurabh S.,Ajay I., “Analysis of
Knowledge Based graphical password
authentication” IEEE 2011 International
Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64
www.ijera.com 64 | P a g e
Conference on Computer Science and
education.
[5] Sacha Brostoff & M. Angela Sasse “Are
Passfaces More Usable Than Passwords? A
Field Trial Investigation”,Department of
Computer Science, University College
London
[6] Ayannuga Olanrewaju O., Folorunso
Olusegun, “Graphical-text Authentication of
a window-based application”, 2011
International Journal of Computer
Applications.
[7] Farnaz Towhidi, Maslin Masrom, Azizah
Abdul Manaf, “An Enhancement on
Passface Graphical Password
Authentication”, Journal of Basic and
Applied Scientific Research 2013.
[8] E. Hayashi, R. Dhamija, N. Christin, and A.
Perrig,“ Use your illusion: secure
authentication usable anywhere”, In
Proceedings of Usable privacy and security,
Aug.2008.

More Related Content

What's hot

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSIJNSA Journal
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attackserneelkamal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attackSaurav Sinha
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 

What's hot (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Defenses against large scale online password guessing attacks
Defenses  against large scale online password guessing attacksDefenses  against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
J0704055058
J0704055058J0704055058
J0704055058
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
3 d password
3 d password3 d password
3 d password
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 

Viewers also liked

AGRI DAILY REPORT-Commodity Market Tips
AGRI DAILY REPORT-Commodity Market TipsAGRI DAILY REPORT-Commodity Market Tips
AGRI DAILY REPORT-Commodity Market TipsMoney Classic Research
 
Onderwijs is Teamwork
Onderwijs is TeamworkOnderwijs is Teamwork
Onderwijs is TeamworkHerman Post
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionRafidah Ariffin
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 

Viewers also liked (12)

AGRI DAILY REPORT-Commodity Market Tips
AGRI DAILY REPORT-Commodity Market TipsAGRI DAILY REPORT-Commodity Market Tips
AGRI DAILY REPORT-Commodity Market Tips
 
Onderwijs is Teamwork
Onderwijs is TeamworkOnderwijs is Teamwork
Onderwijs is Teamwork
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
 
Características Neuropsicológicas del Neonato
Características Neuropsicológicas del NeonatoCaracterísticas Neuropsicológicas del Neonato
Características Neuropsicológicas del Neonato
 
Partner in Progress Learn from US
Partner in Progress  Learn from USPartner in Progress  Learn from US
Partner in Progress Learn from US
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Similar to Graphical password authentication using Pass faces

Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxSarvaniShettigar
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_systemSameer Dighe
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication Systempaperpublications3
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...ijistjournal
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 

Similar to Graphical password authentication using Pass faces (20)

Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Ipas implicit password_authentication_system
Ipas implicit password_authentication_systemIpas implicit password_authentication_system
Ipas implicit password_authentication_system
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication System
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...
AN INNOVATIVE PATTERN BASED PASSWORD METHOD USING TIME VARIABLE WITH ARITHMET...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Graphical password authentication using Pass faces

  • 1. Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64 www.ijera.com 60 | P a g e Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai- 103) **(Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai- 103) ** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai- 103) ** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai- 103) ** (Department of Information Technology, Mumbai University, St. Francis Institute of Technology, Mumbai- 103) ABSTRACT Authentication is one of the most important security primitive. Alphanumeric password authentication is most widely used authentication mechanism. This mechanism has been shown to have several drawbacks and is prone to various attacks such as brute force attack, shoulder surfing attack, dictionary attack. Thus to overcome the drawbacks of alphanumeric passwords, we propose Graphical passwords as an alternative to alphanumeric passwords. This is because humans tend to remember visuals better than text. This paper attempts to highlight the existing graphical Passface system, its usability features and then develop a new graphical password system that combines both graphic and texts passwords to fortify the authentication process on desktop systems. Keywords – Security, Authentication, Graphical Password, Passfaces, Distortion. I. INTRODUCTION Password authentication is degrading as an authentication mechanism due to lack of memorability and security. In user authentication the process which we have to pass through is username and password. Most of the application provides knowledge based authentication which include alphanumeric password as well as graphical password. Generally, password systems are faced by problem of conflicting requirements. First is the fact that passwords should be usable and easy to remember. The second requirement is for it to be secure. In today’s changing world when we are having number of networks and personal account some sort of easy authentication schema need to be provided. To combat the various security inadequacies, graphical password systems have been proposed as a possible alternative to text-based passwords, motivated particularly by the fact that humans can remember pictures better than text. Pictures are generally easier to be remembered or recognized than text [5], especially photos, which are even easier to be remembered than random pictures. Although the existing Passface method covers many usability features like easy to use, easy to memorize, easy to recognize and easy to understand [2], but there are several drawbacks with this algorithm. When a password is selected by mouse, it is very easy for the shoulder surfer attacker to observe the password. Also another research shows users tend to select faces of their own race which cause the algorithm to be guessable by attacker [5]. The aim of this study is to increase the security of Passface algorithm by creating resistance to shoulder surfing attack. 1. LITERATURE REVIEW There are three types of user authentication: Token based, Biometric based and Knowledge based authentication, knowledge-based techniques are currently the most frequently used method for user authentication which includes text and image passwords [6]. The picture-based techniques can be further divided into two categories: recognition-based and recall-based graphical techniques. Using recognition-based techniques, a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage. Using recall- based techniques, a user is asked to reproduce something that he or she created or selected earlier during the registration stage [1]. The traditional and most common authentication method employs usernames and passwords composed of alphanumeric text. This method has proven to be insecure in practice [3]. Some drawbacks of alphanumeric text RESEARCH ARTICLE OPEN ACCESS
  • 2. Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64 www.ijera.com 61 | P a g e password are like forgetting the password, choosing a weak password, password stolen, etc. Moreover, alphanumeric passwords are vulnerable to shoulder surfing attack, spy ware attack and social engineering attack etc [5]. 1. Shoulder surfing attack Shoulder surfing attack refers to looking over someone’s shoulder in order to obtain information such as password, PIN and other sensitive information. It is effective if the attacker can observe what the user keys in, clicks or touches. Graphical authentication is generally more vulnerable to shoulder surfing attacks than text-based passwords. Due to this reason, only a few graphical authentication methods are designed to resist shoulder surfing attack. 2. Brute force attacks It is a simplest attack form for an authentication system where, the attacker tries to guess the correct password. Brute force attacks have two subtypes: Dictionary Attacks: Here the attacker uses a dictionary of common text or graphical passwords. In the text-based password, dictionary attack creates a dictionary of memorable words such as birthdates, favorite foods, pet names, or person names as potential passwords. Guessing Attacks: The attacker here tries possible passwords related to the user. Such as, birth date, English name, phone number, combination of two elements etc. To defend against brute force attacks the system should have a sufficiently large password space to make it impractical. 3. Spyware There are several types of spyware including hijackers, key loggers etc. Spyware collects information entered by the user. With graphical passwords, it is more difficult to conduct spyware based attacks because it is harder to copy mouse motions exactly. Combinations of Passfaces and text may be especially resistant to spyware. A graphical based password is one promising alternatives of textual passwords. The motivation for graphical authentication is that people remember images better than text [3]. Pass face algorithm was created in 2000, with the idea of using pictures of human faces in order to validate the identity of user [7]. If the number of possible pictures is sufficiently large, the possible password space of a graphical password scheme may exceed that of text based schemes and thus presumably offer better resistance to dictionary attacks [1]. Because of these (presumed) advantages, there is a growing interest in graphical password. 2. PREVIOUS WORK In conventional Graphical Password Authentication, the user will be asked to choose four images of human faces from a face database as their future password. In the authentication stage, the user sees a grid of nine faces, consisting of one face previously chosen by the user and eight decoy faces. The user recognizes and clicks anywhere on the known face. This procedure is repeated for several rounds. The user is authenticated if he/she correctly identifies the four faces [4]. The technique is based on the assumption that people can recall human faces easier than other pictures [1]. A potential drawback of this system is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords. Shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information. Also it is easily predictable since people tend to choose images that are more attractive. Security Features of Graphical Passwords: Different graphical password schemes have different techniques to reduce the effectiveness of known attacks [8]. It is considered good practice to have security features in authentication to favor better security over usability. However, building a balance between usability and security can be difficult. It might be a particular graphical password technique has higher usability but less security or higher security with low usability. For example increasing the picture library would provide a larger password space, but leads to longer login time due to crowdedness during authentication. Combining several security features should increase the security level. For instance, implementing decoys, randomly assigned, and random characters could make it harder for the observer to obtain login session during shoulder surfing activity surfing [6]. In addition the location of the images can be randomized and not the same for every authentication phase. Limited login attempts block user access to the login page after several unsuccessful login attempts. 3. PURPOSE The proposed mechanism focuses on providing more powerful secure authentication mechanism. System goes through several phases before creating a password and while logging into the system such as image selection, image distortion, text association and finally password generation. At the time of login, one correct image from a 3X3 grid is identified. Grid shows up one correct image and eight decoy faces and shuffles faces for every attempt. Only upon identifying correct image and entering text associated with it, user gets access to the system. Security Features of Graphical Passwords:
  • 3. Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64 www.ijera.com 62 | P a g e Different graphical password schemes have different techniques to reduce the effectiveness of known attacks [8]. It is considered good practice to have security features in authentication to favor better security over usability. However, building a balance between usability and security can be difficult. It might be a particular graphical password technique has higher usability but less security or higher security with low usability. For example increasing the picture library would provide a larger password space, but leads to longer login time due to crowdedness during authentication. Combining several security features should increase the security level. For instance, implementing decoys, randomly assigned, and random characters could make it harder for the observer to obtain login session during shoulder surfing activity surfing [6]. In addition the location of the images can be randomized and not the same for every authentication phase. Limited login attempts block user access to the login page after several unsuccessful login attempts. II. SYSTEM DESCRIPTION: 1. DESIGN: Fig. 1.Architectural Diagram of the proposed solution 2. DESCRIPTION: In Password creation phase, user is given two options; user can either provide images of their choice or can select images from system database. In either of the choice user is required to provide three images. System uses distortion technique in Distortion phase to distort received or the provided images. This distortion of images is carried out by using filters. System then displays both the distorted and original images to the user; so that it is easier for user to mentally associate the distorted images. User is also required to enter some random text for each of these images. Both original and distorted images along with the text are saved or preserved in database. During Authentication phase, only valid user is or will be granted access to the system. The system will ask the user to identify one out of three user entered images from the grid containing one correct image and 8 decoy faces and also entering the associated text. User gets only two attempts to identify correct images from the grid and to enter the associated text of the image. The system shuffles the images in the grid every time the user logs in to the system. 3. WORKING: The system requires the user to start the Graphical Password Authentication application. System goes through Registration phase, Password Creation phase and Authentication phase. In Registration phase, user selects 'Register' option from displayed Homepage. He can register to the system by proving required details. Entered details will then be validated and user name will be verified against availability. In Password creation phase, three images provided by user are distorted using distortion technique. The original and distorted images along with the text are then saved or preserved in database. During log-in phase, user gives username. Valid users are shown grid of distorted images. The user then has to identify the correct distorted image and then enter the text associated with that image .This procedure is carried out 3 times and on entering the correct data user gets access to the system. User gets exactly three attempts to enter correct username and password into the system. III. USER INTERFACE DESIGN: Fig .2.Interface Design for Registration Screen
  • 4. Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64 www.ijera.com 63 | P a g e Fig. 3.Interface Design of the original Image with the distorted Image Fig .4.Interface Design for Password Login IV. CONCLUSION There is a growing interest in using pictures as passwords instead of alphanumeric passwords. The main reason for using Graphical passwords is they can be easily recalled. In this paper, we have proposed two step graphical password authentication system which is based on Passfaces. In order to make our system user friendly and at the same time difficult to crack ,we have combined images along with text .The original images taken by the user are vulnerable to individualized educated guess attacks if users have a good amount of information about the users. Moreover, even in the case when the attacker does not have any information about the users, the attackers can make better guesses than random guesses based on contextual information of the original photos .In contrast, when distorted photos are used as authentication images, attackers cannot make better guesses than random guesses even with good amount of knowledge about the target users. The Distortion Technique can mitigate the risk of the collective educated guess attacks using the Biases in users’ choices of authentication images. Currently, we are working on the System Evaluation and hope our paper can prompt research in new techniques to improve security systems. Acknowledgements We hereby take the privilege to present our project report on “Graphical Authentication of passwords using Passfaces”. We are very grateful to our Project Supervisor Ms. Grinal Tuscano for contributing her valuable moments in the Project from her busy and hectic schedule right from the Project’s inception. Being after us like a true mentor and a great academic parent. We are very thankful to Ms. Grinal Tuscano whose guidance and support was an immense motivation for us to carry on with our Project. She has been a constant source of inspiration to us. Her suggestions have greatly contributed for the betterment of our project. Our special thanks to the Head of Department Mr. Pramod Shanbhag, staff members and lab assistants for their co-operation. REFERENCES [1] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen ,“Graphical Passwords: A Survey”, Department of Computer Science,Georgia State University,Dec-2005,IEEE [2] ShraddhaM. Gurav, Leena S. Gawade, Prathamey K. Rane, Nilesh R. Khochare, “Graphical Password Authentication”- Cloud securing scheme,” IEEE 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies. [3] Robert G. Rittenhouse, Junaid Ahsenali Chaudry and Malrey Lee ,“Security in Graphical Authentication”, International Journal of Security and Its Applications Vol. 7,No. 3, May, 2013 [4] Gaurav A.,Saurabh S.,Ajay I., “Analysis of Knowledge Based graphical password authentication” IEEE 2011 International
  • 5. Ms Grinal Tuscano et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -5) March 2015, pp.60-64 www.ijera.com 64 | P a g e Conference on Computer Science and education. [5] Sacha Brostoff & M. Angela Sasse “Are Passfaces More Usable Than Passwords? A Field Trial Investigation”,Department of Computer Science, University College London [6] Ayannuga Olanrewaju O., Folorunso Olusegun, “Graphical-text Authentication of a window-based application”, 2011 International Journal of Computer Applications. [7] Farnaz Towhidi, Maslin Masrom, Azizah Abdul Manaf, “An Enhancement on Passface Graphical Password Authentication”, Journal of Basic and Applied Scientific Research 2013. [8] E. Hayashi, R. Dhamija, N. Christin, and A. Perrig,“ Use your illusion: secure authentication usable anywhere”, In Proceedings of Usable privacy and security, Aug.2008.