Sei sulla pagina 1di 16

COMPARATIVE STUDY ON GRAPHICAL

PASSWORD AUTHENTICATION USING IMAGES


SCHEMES TO ENHANCE INFORMATION
SECURITY
PRESENTED BY:

B.PRABHAVATHI
16311A05Q6
CONTENTS:
• INTRODUCTION
• OVERVIEW OF AUTHENTICATION METHODS
• GRAPHICAL PASSWORDS
• ADVANTAGES
• DISADVANTAGES
• CONCLUSION
INTRODUCTION:
• The basic concept of this system is simply the
interaction of user with sequence of 5 images.
The basic goal of this system is to achieve
higher security with simple technique by a
user and harder to guess by a hacker.
Graphical passwords have been designed to
make passwords more memorable and easier
for people to use and therefore, more secure.
PASSWORDS are used for?
1.Logging into accounts
2.Retrieving emails
3.Accessing applications
4.Networks
5.Websites
6.Databases
7.workstations
OVERVIEW OF AUTHENTICATION
METHODS:
• Token based authentication: key cards, band
cards, smart card.
• Biometric based authentication: Fingerprints,
iris scan, facial recognition.
• Knowledge based authentication: text-based
passwords, picture-based passwords most
widely used authentication techniques.
GRAPHICAL PASSWORDS:
• Graphical passwords were originally described
by BLONDER in 1996.
• It is an authentication system that works by
having the user select from images, in a
specific order, presented in a graphical user
interface (GUI). For this reason, the graphical-
password approach is sometimes called
graphical user authentication (GUA).
CATEGORIES OF GRAPHICAL
PASSWORD:
• Recall Based Techniques: User is asked to
reproduce something that he created or
selected earlier during the registration stage.
• Recognition Based Techniques: A user is
presented with a set of images and the user
passes the authentication by recognizing and
identifying the images he selected during the
registration stage.
Recall Based Technique:
• PassPoint Scheme: User click on any place on
an image to create a password. A tolerance
around each chosen pixel is calculated. In
order to be authenticated, user must click
within the tolerances in correct sequence.
Recognition Based Technique:
• Sobrado and Birget Scheme
System display a number of
pass-objects (pre selected by
user) among many other
objects,user click inside the
convex hull bounded by pass-
objects. authors suggested
using 1000 objects, which
makes the display very crowed
and the objects almost
• PassFace Scheme: In this technique we use the
human faces as password.
Comparison between graphical
password and alphanumeric
password:
Commonly used guidelines for alpha-numeric
passwords are:
• The password should be at least 8 characters
long.
• The password should not be easy to relate to
the user (e.g., last name, birth date).
• Ideally, the user should combine upper and
lower case letters and digits.

Graphical passwords:
ADVANTAGES:
• Graphical password schemes provide a way of
making more human-friendly passwords .
• Here the security of the system is very high.
Here we use a series of selectable images on
successive screen pages.
• Dictionary attacks are infeasible.
DISADVANTAGES:
• Password registration and log-in process take
too long.
• Require much more storage space than text
based passwords.
• Shoulder Surfing: It means watching over
people's shoulders as they process
information. Examples include observing the
keyboard as a person types his or her
password, enters a PIN number, or views
personal information . Because of their
CONCLUSION:
• Graphical passwords are an alternative to
textual alphanumeric password.
• It satisfies both conflicting requirements i.e. it
is easy to remember & it is hard to guess.
• By the solution of the shoulder surfing
problem, it becomes more secure & easier
password scheme.
• By implementing other special geometric
configurations like triangle & movable frame,
one can achieve more security.
REFERENCES:

• 1. Vaibhav Moraskar, Sagar Jaikalyani,


Mujib Saiyyed, Jaykumar Gurnani, Kalyani
Pendke, "Cued Click Point techniques for
graphical password
authentication", International Journal Of
Computer Science And Mobile
Computing, vol. 3, no. 1, pp. 166-172,
January 2014
• 2. Jermyn Ian, Mayer Alain, Monrose

Potrebbero piacerti anche