This document discusses the weaknesses of text-based passwords and proposes an alternative graphical password system. It summarizes that existing login systems use usernames and passwords but are vulnerable to shoulder surfing, keyloggers, and bots. It then describes a graphical password system that displays a grid of images for the user to click in a specific pattern to log in, avoiding these threats. System requirements of the proposed graphical password system are also listed.
1 of 14
More Related Content
Shoulder surfing resistant graphical and image based login system
1. Group Members
Tanavi Dalavi
Vishakha More
Sonali Jadhav
Guide
Mrs. Vijaya Chavan
2. Existing System Contains User_Name and
Password Based Method.
Threats To The Existing
System are :
Shoulder Keylogger Bots
Surfing
3. When users input their passwords in a public
place, they may be at risk of attackers stealing
their password. An attacker can capture a
password by direct observation.
4. Key stroke are recorded
Threat to login system as
the username and
password recorded
Bots
Perform simple and repetitive tasks
5. Text Based Password are subject to attacked by
following ways
In shoulder surfing attacker can capture a
password by direct observation
In key logger attacker record the individual’s
authentication session.
In bots attack the automated or semi-automated
robots do the same
6. Sensitive Information requires high security
Authentication processes to keep information
secure
Authentication Methods
Graphical Image Based
Password Based Password
9. A grid of image is displayed, where the user
will select a particular images from the grid.
The aim of this authentication is to avoid attack
from a script or another machine.
A keylogger or bot attack can be avoided.
12. HARDWARE:
Processor: Pentium-IV 1.5 GHz and above
Ram: 256 MB minimum
512 MB preferred
Monitor: 15 inch
CD-ROM: 52x speed
SOFTWARE:
Operating System: Microsoft Windows XP and above.
Software: JDK 1.5 and higher.
13. Websites:
www.ieeexplore.ieee.org
www.wikipedia.com
Book:
“Network Security-Overcome Password Hacking Through
Graphical Password Authentication’’
M.ArunPrakash ,T.R.Gokul
Department of Information Technology, Tamil Nadu, India
“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:”
A User Study Using Images for Authentication