SlideShare a Scribd company logo
1 of 18
Presented
by:
Anilaja
CSE
 What is PASSWORD?

PASSWORD is a secret word or string of
characters that is used for user authentication to
prove his identity and gain access to resources.
 Uses of Password:
 Logging into accounts.
 Retrieving emails.
 Accessing applications.
 Networks.
 Websites
Authentication is a process of conformation of a
persons identity.

Types:
 Token based authentication
 key cards, band cards, smart card, …

 Biometric based authentication
 Fingerprints, iris scan, facial recognition, …

 Knowledge based authentication
 text-based passwords, picture-based

passwords, …
 Text password is a secret word or string of

characters that is used for user authentication to
prove his identity and gain access to resources.
 Difficulty of remembering passwords

 easy to remember -> easy to guess
 hard to guess -> hard to remember
A graphical password is an authentication system that

works by having the user select from images, in a
specific order, presented in a graphical user interface
(GUI).
For this reason, the graphical-password approach is

sometimes called graphical user authentication
(GUA).
An example of a graphical password uses an

image on the screen and lets the user choose a few
click points; these click points are the
"password", and the user has to click closely to
these points again in order to log in.
 Recall Based Techniques
 A user is asked to reproduce something that he

created or selected earlier during the registration
stage
 Recognition Based Techniques
 A user is presented with a set of images and the

user passes the authentication by recognizing and
identifying the images he selected during the
registration stage.
 Cued-recall Technique
 Draw-A-Secret (DAS) Scheme

User draws a simple picture on a 2D grid, the
coordinates of the
grids occupied by the picture are stored in the order of
drawing
 Redrawing has to touch the

same grids in the same
sequence in authentication.
 User studies showed the
 Signature scheme
Here authentication is conducted by having the user
drawing their signature using a
mouse.
 Pass Point Scheme
User click on any place on an image to create a password.
A tolerance around each chosen pixel is calculated. In
order to be authenticated, user must click within the
tolerances in the correct sequence.
B-DAS
Scheme

Grid Selection
Scheme
 Dhamija and Perrig Scheme

Pick several pictures out of many
choices, identify them later
in authentication.
 Sobrado and Birget Scheme

System display a number of pass-objects (pre-selected
by user) among many other objects, user click inside
the convex hull bounded by pass-objects.
 Pass face scheme:
In this technique human faces are used as password.
 Other Schemes

Select a sequence of images as
password
 Graphical password schemes provide a way of

making more
human-friendly passwords while increasing the level of
security.
 Here the security of the system is very high.

 Dictionary attacks and brute force search are

infeasible.
 Password registration and log-in process take too

long.
 Require much more storage space than text based

passwords.
 Shoulder Surfing .
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-

More Related Content

What's hot

A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical password
Graphical passwordGraphical password
Graphical passwordsowji888
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 

What's hot (20)

A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
11aman
11aman11aman
11aman
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 

Viewers also liked

SMARTFIRE_project_presentation
SMARTFIRE_project_presentationSMARTFIRE_project_presentation
SMARTFIRE_project_presentationStephanie Morales
 
работоргівля
работоргівляработоргівля
работоргівляDimaYevmentsev
 
KOMSAS: Drama Hemodialisis
KOMSAS: Drama HemodialisisKOMSAS: Drama Hemodialisis
KOMSAS: Drama HemodialisisFarahLiyana00
 
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABC
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABCHuom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABC
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABCMari Männistö
 
See the line ux lt presentation here
See the line ux lt presentation hereSee the line ux lt presentation here
See the line ux lt presentation hereSuzanne Oke
 
Lighting designers
Lighting designersLighting designers
Lighting designersdeltalightnv
 
Financial planning academy
Financial planning academyFinancial planning academy
Financial planning academyMohammad Ahmed
 
Research Analysis on Financial planning academy
Research Analysis on Financial planning academyResearch Analysis on Financial planning academy
Research Analysis on Financial planning academyMohammad Ahmed
 
Kickstarting ecommerce sales
Kickstarting ecommerce salesKickstarting ecommerce sales
Kickstarting ecommerce salesCafeNMarche
 
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi Oy
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi OyGoogle Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi Oy
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi OyMari Männistö
 
Narriative Couples Therapy
Narriative Couples TherapyNarriative Couples Therapy
Narriative Couples TherapyClaudia L
 
гійом аполінер
гійом аполінергійом аполінер
гійом аполінерDimaYevmentsev
 
Protocolo y etiqueta
Protocolo y etiquetaProtocolo y etiqueta
Protocolo y etiquetaYesikaRamirez
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technologyyogesh p
 

Viewers also liked (18)

SMARTFIRE_project_presentation
SMARTFIRE_project_presentationSMARTFIRE_project_presentation
SMARTFIRE_project_presentation
 
SirJoshuaReynolds
SirJoshuaReynoldsSirJoshuaReynolds
SirJoshuaReynolds
 
работоргівля
работоргівляработоргівля
работоргівля
 
KOMSAS: Drama Hemodialisis
KOMSAS: Drama HemodialisisKOMSAS: Drama Hemodialisis
KOMSAS: Drama Hemodialisis
 
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABC
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABCHuom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABC
Huom! LIO - Tehokkaan ja tuloksellisen kamariviestinnän ABC
 
See the line ux lt presentation here
See the line ux lt presentation hereSee the line ux lt presentation here
See the line ux lt presentation here
 
Sc cg asiah
Sc cg asiahSc cg asiah
Sc cg asiah
 
Lighting designers
Lighting designersLighting designers
Lighting designers
 
Financial planning academy
Financial planning academyFinancial planning academy
Financial planning academy
 
Research Analysis on Financial planning academy
Research Analysis on Financial planning academyResearch Analysis on Financial planning academy
Research Analysis on Financial planning academy
 
Kickstarting ecommerce sales
Kickstarting ecommerce salesKickstarting ecommerce sales
Kickstarting ecommerce sales
 
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi Oy
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi OyGoogle Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi Oy
Google Analytics - Perusteista Perusexpertiksi tunnissa! - Statiivi Oy
 
Narriative Couples Therapy
Narriative Couples TherapyNarriative Couples Therapy
Narriative Couples Therapy
 
гійом аполінер
гійом аполінергійом аполінер
гійом аполінер
 
Sir joshua reynolds
Sir joshua reynoldsSir joshua reynolds
Sir joshua reynolds
 
Protocolo y etiqueta
Protocolo y etiquetaProtocolo y etiqueta
Protocolo y etiqueta
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
deforestation
deforestationdeforestation
deforestation
 

Similar to Graphicalpasswordauthentication 130907104619-

graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptxRohitSabale4
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 

Similar to Graphicalpasswordauthentication 130907104619- (20)

graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Nilesh
Nilesh Nilesh
Nilesh
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Research ppr
Research pprResearch ppr
Research ppr
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
An03402300234
An03402300234An03402300234
An03402300234
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 

Graphicalpasswordauthentication 130907104619-

  • 2.  What is PASSWORD? PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Uses of Password:  Logging into accounts.  Retrieving emails.  Accessing applications.  Networks.  Websites
  • 3. Authentication is a process of conformation of a persons identity. Types:  Token based authentication  key cards, band cards, smart card, …  Biometric based authentication  Fingerprints, iris scan, facial recognition, …  Knowledge based authentication  text-based passwords, picture-based passwords, …
  • 4.  Text password is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources.  Difficulty of remembering passwords  easy to remember -> easy to guess  hard to guess -> hard to remember
  • 5. A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
  • 6.  Recall Based Techniques  A user is asked to reproduce something that he created or selected earlier during the registration stage  Recognition Based Techniques  A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.  Cued-recall Technique
  • 7.  Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing  Redrawing has to touch the same grids in the same sequence in authentication.  User studies showed the
  • 8.  Signature scheme Here authentication is conducted by having the user drawing their signature using a mouse.
  • 9.  Pass Point Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in the correct sequence.
  • 11.  Dhamija and Perrig Scheme Pick several pictures out of many choices, identify them later in authentication.
  • 12.  Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
  • 13.  Pass face scheme: In this technique human faces are used as password.
  • 14.  Other Schemes Select a sequence of images as password
  • 15.  Graphical password schemes provide a way of making more human-friendly passwords while increasing the level of security.  Here the security of the system is very high.  Dictionary attacks and brute force search are infeasible.
  • 16.  Password registration and log-in process take too long.  Require much more storage space than text based passwords.  Shoulder Surfing .