SlideShare a Scribd company logo
PRESENTED BY:

HARIKRISHNAN NAIR
The two most commonly used techniques in picture password
RECOGNITION BASED TECHNIQUES
 A user is presented with a set of images and the user passes the
 authentication by recognizing and identifying the images he selected
 during the registration stage


RECALL BASED TECHNIQUES
 A user is asked to reproduce something that he          created or
 selected earlier during the registration stage
  THIS      PROJECT        IS   BASED    ON      RECALL     BASED
MODULES   USER REGISTRATION
              PROCESS
                                  FINAL
                              REGISTRATION
                                PROCESS
          PICTURE SELECTION
               PROCESS



              SYSTEM
           LOGIN PROCESS
//EXAMPLE:

Enter the username in the
                                                         rocky
username field
  USERNAME


        Click on
        NEW USER REGISTER button


            NEW USER
            REGISTER                                     DATABASE
                                  Verifies the username and
 New user registration process.   store into the database
How to Select picture’s?
There are two ways for selecting an picture for password authen
User Defined Picture’s
Picture’s are selected by the user from the hard disk or any other image
supported devices.


   PICTURE
System Defined Picture’s
Picture’s are selected by the user from the database of the
password system

   PICTURE




                                                         DATABASE
THE PICTURE
                            SELECTED FROM ONE
                              OF THE SYSTEM




   USER DEFINED PICTURE


           OR
DATABASE
                             Picture + Gridlines
           SYSTEM DEFINED PICTURE
MESSAGE BOX:

                                 DO YOU WISH TO CONTINUE WITH THIS POINT

                                 YES                                NO




                                                           Select another po

         User click on the       DATABASE
         point

                   Point and the image will be stored into database .
                   Now the user can select another image and follows the
User with username Steps above.
Click point’s as password
1st click          2nd click   3rd click   4th click   5th click …




     Click
     point
FINAL REGISTRATION PROCESS
       USER REGISTRATION PROCESS          +    PICTURE SELECTION PROCESS

           STEP1:
            User enters the username and click on NRB.

           STEP2:
            Click on PICTURE button for selecting an picture for password.

           STEP3:
            Select a point on the picture and click to next picture.

           STEP4:
            The point on the last picture will be calculated as the last point for
              opening the desired system.

Note: all the points and the pictures along with the username will be stored into database
Username
 USERNAME          verification         Verifies the username

                                                                Checks the usernam
Reenter the                       Incorrect                     in the database
username                          username
         User enters
         the username
                     Generates an message
                     “ username doesn't match “                    DATABASE
                                                     If username
                     “Please Reenter the username”
                                                     not matched
          NOTE                                                       Correct
           The user can enter the username only 5 times             username
            if the username is wrong.

           If the incorrect username exists 5 times the
            PASSWORD SYSTEM SHUTS DOWN.
First picture stored in database during
                                                                              Last picture
           registration

                                                     Correct click point
                                                     Gives the next image
              Correct
              username




     DATABASE                                                               System gives 3 chances to
                                   Verification of click point              The user for incorrect
                                                                            password

Database contains saved
pictures and points.
                                    If the user exists 3 chances then the password system displays
                                    another picture which will be unrelated to the picture selected
                                    by the user during password creation
Opens the system protected with password

Last picture in the database




          The change password can be done after logging into the main
           system.

          The change password follow’s the same create password steps.
Advantages of picture password authentication

  Graphical password schemes provide a way of
   making more human-friendly passwords .

  Here the security of the system is very high.

  Here we use a series of selectable images on
   successive screen pages.

   Dictionary attacks are infeasible.
Drawback's of picture password
  Password registration and log-in process take too long.

  Require much more storage space than text based passwords.



 SHOULDER SURFING
 It means watching over people's shoulders as they process information.
 Examples include observing the keyboard as a person types his or her password,
 enters a PIN number, or views personal information.
    Because of their graphic nature, nearly all graphical password schemes are
 quite vulnerable to shoulder surfing.
Grid Square Size
 The security of this
   system
   depends on the size of
the
   picture

 As the size of the picture
  increases Simultaneously
  the grid square
  Increases.

 Thus, making the system
  highly Secured.

 We can also use
  encryption alg. For
Do’s and Don’ts for secured password

Do’s
1.   use easy to remember pictures but hard crack.

2.   Avoid hotspots on the picture while selecting click point.

3.   Always remember the click point and picture which will become
     helpful for knowledge based authentication.

4.   Choose minimum 3 pictures or maximum 5 pictures for this
     password system.

5.   As no Of pictures increases the password becomes that tight.


Don’ts
6.   Do not use too much bright and black pictures for password
T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D
                          SYSTEM

                1.   HARD DISK LOCKING.



   2. SYSTEM LOG IN AND LOG OUT PROCESS.
           3. FOLDER LOCKING     .




        4.    WEB LOG-IN APLLICATION
TECHNIQUE PROPOSED AND IMPLEMENTED BY
Blonder , Passlogix , Wiedenbeck


AUTHENTICATION PROCESS
Click on several pre- registered locations of a picture in the right sequence.


MEMORABILITY
Can be hard to remember


PASSWORD SPACE
N^K (N is the number of pixels or smallest units of a picture, K is the number of
locations to be clicked on)


POSSIBLE ATTACK METHODS
Guess, shoulder surfing
CONCLUSION
 Picture passwords are an alternative to textual alphanumeric password.

 It satisfies both conflicting requirements i.e. it is easy to remember & it is
  hard to guess.

 By the solution of the shoulder surfing problem, it becomes more secure &
  easier password scheme.

 By implementing encryption algorithms and hash algorithms for storing and
  retrieving pictures and points, one can achieve more security

 Picture password is still immature, more research is required in this field.
Ppt for graphical password authentication using cued click points

More Related Content

What's hot

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 

What's hot (20)

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
face recognition
face recognitionface recognition
face recognition
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
3d passwords
3d passwords3d passwords
3d passwords
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processing
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 

Viewers also liked

Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 

Viewers also liked (15)

Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Windows 8
Windows 8Windows 8
Windows 8
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
11aman
11aman11aman
11aman
 

Similar to Ppt for graphical password authentication using cued click points

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
saria11
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 

Similar to Ppt for graphical password authentication using cued click points (20)

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
 
An03402300234
An03402300234An03402300234
An03402300234
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Research ppr
Research pprResearch ppr
Research ppr
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Ppt for graphical password authentication using cued click points

  • 2. The two most commonly used techniques in picture password
  • 3. RECOGNITION BASED TECHNIQUES A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage RECALL BASED TECHNIQUES A user is asked to reproduce something that he created or selected earlier during the registration stage  THIS PROJECT IS BASED ON RECALL BASED
  • 4. MODULES USER REGISTRATION PROCESS FINAL REGISTRATION PROCESS PICTURE SELECTION PROCESS SYSTEM LOGIN PROCESS
  • 5.
  • 6. //EXAMPLE: Enter the username in the rocky username field USERNAME Click on NEW USER REGISTER button NEW USER REGISTER DATABASE Verifies the username and New user registration process. store into the database
  • 7.
  • 8. How to Select picture’s? There are two ways for selecting an picture for password authen
  • 9. User Defined Picture’s Picture’s are selected by the user from the hard disk or any other image supported devices. PICTURE
  • 10. System Defined Picture’s Picture’s are selected by the user from the database of the password system PICTURE DATABASE
  • 11. THE PICTURE SELECTED FROM ONE OF THE SYSTEM USER DEFINED PICTURE OR DATABASE Picture + Gridlines SYSTEM DEFINED PICTURE
  • 12. MESSAGE BOX: DO YOU WISH TO CONTINUE WITH THIS POINT YES NO Select another po User click on the DATABASE point Point and the image will be stored into database . Now the user can select another image and follows the User with username Steps above.
  • 13. Click point’s as password 1st click 2nd click 3rd click 4th click 5th click … Click point
  • 14.
  • 15. FINAL REGISTRATION PROCESS USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS STEP1:  User enters the username and click on NRB. STEP2:  Click on PICTURE button for selecting an picture for password. STEP3:  Select a point on the picture and click to next picture. STEP4:  The point on the last picture will be calculated as the last point for opening the desired system. Note: all the points and the pictures along with the username will be stored into database
  • 16.
  • 17.
  • 18. Username USERNAME verification Verifies the username Checks the usernam Reenter the Incorrect in the database username username User enters the username Generates an message “ username doesn't match “ DATABASE If username “Please Reenter the username” not matched NOTE Correct  The user can enter the username only 5 times username if the username is wrong.  If the incorrect username exists 5 times the PASSWORD SYSTEM SHUTS DOWN.
  • 19.
  • 20. First picture stored in database during Last picture registration Correct click point Gives the next image Correct username DATABASE System gives 3 chances to Verification of click point The user for incorrect password Database contains saved pictures and points. If the user exists 3 chances then the password system displays another picture which will be unrelated to the picture selected by the user during password creation
  • 21. Opens the system protected with password Last picture in the database  The change password can be done after logging into the main system.  The change password follow’s the same create password steps.
  • 22. Advantages of picture password authentication Graphical password schemes provide a way of making more human-friendly passwords . Here the security of the system is very high. Here we use a series of selectable images on successive screen pages.  Dictionary attacks are infeasible.
  • 23. Drawback's of picture password  Password registration and log-in process take too long.  Require much more storage space than text based passwords. SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
  • 24.
  • 25. Grid Square Size  The security of this system depends on the size of the picture  As the size of the picture increases Simultaneously the grid square Increases.  Thus, making the system highly Secured.  We can also use encryption alg. For
  • 26. Do’s and Don’ts for secured password Do’s 1. use easy to remember pictures but hard crack. 2. Avoid hotspots on the picture while selecting click point. 3. Always remember the click point and picture which will become helpful for knowledge based authentication. 4. Choose minimum 3 pictures or maximum 5 pictures for this password system. 5. As no Of pictures increases the password becomes that tight. Don’ts 6. Do not use too much bright and black pictures for password
  • 27. T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D SYSTEM 1. HARD DISK LOCKING. 2. SYSTEM LOG IN AND LOG OUT PROCESS. 3. FOLDER LOCKING . 4. WEB LOG-IN APLLICATION
  • 28. TECHNIQUE PROPOSED AND IMPLEMENTED BY Blonder , Passlogix , Wiedenbeck AUTHENTICATION PROCESS Click on several pre- registered locations of a picture in the right sequence. MEMORABILITY Can be hard to remember PASSWORD SPACE N^K (N is the number of pixels or smallest units of a picture, K is the number of locations to be clicked on) POSSIBLE ATTACK METHODS Guess, shoulder surfing
  • 29. CONCLUSION  Picture passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security  Picture password is still immature, more research is required in this field.