SlideShare ist ein Scribd-Unternehmen logo
1 von 30
PRESENTED BY:

HARIKRISHNAN NAIR
The two most commonly used techniques in picture password
RECOGNITION BASED TECHNIQUES
 A user is presented with a set of images and the user passes the
 authentication by recognizing and identifying the images he selected
 during the registration stage


RECALL BASED TECHNIQUES
 A user is asked to reproduce something that he          created or
 selected earlier during the registration stage
  THIS      PROJECT        IS   BASED    ON      RECALL     BASED
MODULES   USER REGISTRATION
              PROCESS
                                  FINAL
                              REGISTRATION
                                PROCESS
          PICTURE SELECTION
               PROCESS



              SYSTEM
           LOGIN PROCESS
//EXAMPLE:

Enter the username in the
                                                         rocky
username field
  USERNAME


        Click on
        NEW USER REGISTER button


            NEW USER
            REGISTER                                     DATABASE
                                  Verifies the username and
 New user registration process.   store into the database
How to Select picture’s?
There are two ways for selecting an picture for password authen
User Defined Picture’s
Picture’s are selected by the user from the hard disk or any other image
supported devices.


   PICTURE
System Defined Picture’s
Picture’s are selected by the user from the database of the
password system

   PICTURE




                                                         DATABASE
THE PICTURE
                            SELECTED FROM ONE
                              OF THE SYSTEM




   USER DEFINED PICTURE


           OR
DATABASE
                             Picture + Gridlines
           SYSTEM DEFINED PICTURE
MESSAGE BOX:

                                 DO YOU WISH TO CONTINUE WITH THIS POINT

                                 YES                                NO




                                                           Select another po

         User click on the       DATABASE
         point

                   Point and the image will be stored into database .
                   Now the user can select another image and follows the
User with username Steps above.
Click point’s as password
1st click          2nd click   3rd click   4th click   5th click …




     Click
     point
FINAL REGISTRATION PROCESS
       USER REGISTRATION PROCESS          +    PICTURE SELECTION PROCESS

           STEP1:
            User enters the username and click on NRB.

           STEP2:
            Click on PICTURE button for selecting an picture for password.

           STEP3:
            Select a point on the picture and click to next picture.

           STEP4:
            The point on the last picture will be calculated as the last point for
              opening the desired system.

Note: all the points and the pictures along with the username will be stored into database
Username
 USERNAME          verification         Verifies the username

                                                                Checks the usernam
Reenter the                       Incorrect                     in the database
username                          username
         User enters
         the username
                     Generates an message
                     “ username doesn't match “                    DATABASE
                                                     If username
                     “Please Reenter the username”
                                                     not matched
          NOTE                                                       Correct
           The user can enter the username only 5 times             username
            if the username is wrong.

           If the incorrect username exists 5 times the
            PASSWORD SYSTEM SHUTS DOWN.
First picture stored in database during
                                                                              Last picture
           registration

                                                     Correct click point
                                                     Gives the next image
              Correct
              username




     DATABASE                                                               System gives 3 chances to
                                   Verification of click point              The user for incorrect
                                                                            password

Database contains saved
pictures and points.
                                    If the user exists 3 chances then the password system displays
                                    another picture which will be unrelated to the picture selected
                                    by the user during password creation
Opens the system protected with password

Last picture in the database




          The change password can be done after logging into the main
           system.

          The change password follow’s the same create password steps.
Advantages of picture password authentication

  Graphical password schemes provide a way of
   making more human-friendly passwords .

  Here the security of the system is very high.

  Here we use a series of selectable images on
   successive screen pages.

   Dictionary attacks are infeasible.
Drawback's of picture password
  Password registration and log-in process take too long.

  Require much more storage space than text based passwords.



 SHOULDER SURFING
 It means watching over people's shoulders as they process information.
 Examples include observing the keyboard as a person types his or her password,
 enters a PIN number, or views personal information.
    Because of their graphic nature, nearly all graphical password schemes are
 quite vulnerable to shoulder surfing.
Grid Square Size
 The security of this
   system
   depends on the size of
the
   picture

 As the size of the picture
  increases Simultaneously
  the grid square
  Increases.

 Thus, making the system
  highly Secured.

 We can also use
  encryption alg. For
Do’s and Don’ts for secured password

Do’s
1.   use easy to remember pictures but hard crack.

2.   Avoid hotspots on the picture while selecting click point.

3.   Always remember the click point and picture which will become
     helpful for knowledge based authentication.

4.   Choose minimum 3 pictures or maximum 5 pictures for this
     password system.

5.   As no Of pictures increases the password becomes that tight.


Don’ts
6.   Do not use too much bright and black pictures for password
T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D
                          SYSTEM

                1.   HARD DISK LOCKING.



   2. SYSTEM LOG IN AND LOG OUT PROCESS.
           3. FOLDER LOCKING     .




        4.    WEB LOG-IN APLLICATION
TECHNIQUE PROPOSED AND IMPLEMENTED BY
Blonder , Passlogix , Wiedenbeck


AUTHENTICATION PROCESS
Click on several pre- registered locations of a picture in the right sequence.


MEMORABILITY
Can be hard to remember


PASSWORD SPACE
N^K (N is the number of pixels or smallest units of a picture, K is the number of
locations to be clicked on)


POSSIBLE ATTACK METHODS
Guess, shoulder surfing
CONCLUSION
 Picture passwords are an alternative to textual alphanumeric password.

 It satisfies both conflicting requirements i.e. it is easy to remember & it is
  hard to guess.

 By the solution of the shoulder surfing problem, it becomes more secure &
  easier password scheme.

 By implementing encryption algorithms and hash algorithms for storing and
  retrieving pictures and points, one can achieve more security

 Picture password is still immature, more research is required in this field.
Ppt for graphical password authentication using cued click points

Weitere ähnliche Inhalte

Was ist angesagt?

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
A Comparison of People Counting Techniques via Video Scene Analysis
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene AnalysisPoo Kuan Hoong
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Deepak Yadav
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognitionPankaj Thakur
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 

Was ist angesagt? (20)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
A Comparison of People Counting Techniques via Video Scene Analysis
A Comparison of People Counting Techniques viaVideo Scene AnalysisA Comparison of People Counting Techniques viaVideo Scene Analysis
A Comparison of People Counting Techniques via Video Scene Analysis
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Image Restoration
Image RestorationImage Restoration
Image Restoration
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
face recognition
face recognitionface recognition
face recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Object detection
Object detectionObject detection
Object detection
 

Andere mochten auch

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 

Andere mochten auch (14)

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Windows 8
Windows 8Windows 8
Windows 8
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
11aman
11aman11aman
11aman
 

Ähnlich wie Ppt for graphical password authentication using cued click points

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpointssaria11
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssVinay Sirivara
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 

Ähnlich wie Ppt for graphical password authentication using cued click points (20)

Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
 
An03402300234
An03402300234An03402300234
An03402300234
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Research ppr
Research pprResearch ppr
Research ppr
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 

Kürzlich hochgeladen

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Ppt for graphical password authentication using cued click points

  • 2. The two most commonly used techniques in picture password
  • 3. RECOGNITION BASED TECHNIQUES A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage RECALL BASED TECHNIQUES A user is asked to reproduce something that he created or selected earlier during the registration stage  THIS PROJECT IS BASED ON RECALL BASED
  • 4. MODULES USER REGISTRATION PROCESS FINAL REGISTRATION PROCESS PICTURE SELECTION PROCESS SYSTEM LOGIN PROCESS
  • 5.
  • 6. //EXAMPLE: Enter the username in the rocky username field USERNAME Click on NEW USER REGISTER button NEW USER REGISTER DATABASE Verifies the username and New user registration process. store into the database
  • 7.
  • 8. How to Select picture’s? There are two ways for selecting an picture for password authen
  • 9. User Defined Picture’s Picture’s are selected by the user from the hard disk or any other image supported devices. PICTURE
  • 10. System Defined Picture’s Picture’s are selected by the user from the database of the password system PICTURE DATABASE
  • 11. THE PICTURE SELECTED FROM ONE OF THE SYSTEM USER DEFINED PICTURE OR DATABASE Picture + Gridlines SYSTEM DEFINED PICTURE
  • 12. MESSAGE BOX: DO YOU WISH TO CONTINUE WITH THIS POINT YES NO Select another po User click on the DATABASE point Point and the image will be stored into database . Now the user can select another image and follows the User with username Steps above.
  • 13. Click point’s as password 1st click 2nd click 3rd click 4th click 5th click … Click point
  • 14.
  • 15. FINAL REGISTRATION PROCESS USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS STEP1:  User enters the username and click on NRB. STEP2:  Click on PICTURE button for selecting an picture for password. STEP3:  Select a point on the picture and click to next picture. STEP4:  The point on the last picture will be calculated as the last point for opening the desired system. Note: all the points and the pictures along with the username will be stored into database
  • 16.
  • 17.
  • 18. Username USERNAME verification Verifies the username Checks the usernam Reenter the Incorrect in the database username username User enters the username Generates an message “ username doesn't match “ DATABASE If username “Please Reenter the username” not matched NOTE Correct  The user can enter the username only 5 times username if the username is wrong.  If the incorrect username exists 5 times the PASSWORD SYSTEM SHUTS DOWN.
  • 19.
  • 20. First picture stored in database during Last picture registration Correct click point Gives the next image Correct username DATABASE System gives 3 chances to Verification of click point The user for incorrect password Database contains saved pictures and points. If the user exists 3 chances then the password system displays another picture which will be unrelated to the picture selected by the user during password creation
  • 21. Opens the system protected with password Last picture in the database  The change password can be done after logging into the main system.  The change password follow’s the same create password steps.
  • 22. Advantages of picture password authentication Graphical password schemes provide a way of making more human-friendly passwords . Here the security of the system is very high. Here we use a series of selectable images on successive screen pages.  Dictionary attacks are infeasible.
  • 23. Drawback's of picture password  Password registration and log-in process take too long.  Require much more storage space than text based passwords. SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
  • 24.
  • 25. Grid Square Size  The security of this system depends on the size of the picture  As the size of the picture increases Simultaneously the grid square Increases.  Thus, making the system highly Secured.  We can also use encryption alg. For
  • 26. Do’s and Don’ts for secured password Do’s 1. use easy to remember pictures but hard crack. 2. Avoid hotspots on the picture while selecting click point. 3. Always remember the click point and picture which will become helpful for knowledge based authentication. 4. Choose minimum 3 pictures or maximum 5 pictures for this password system. 5. As no Of pictures increases the password becomes that tight. Don’ts 6. Do not use too much bright and black pictures for password
  • 27. T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D SYSTEM 1. HARD DISK LOCKING. 2. SYSTEM LOG IN AND LOG OUT PROCESS. 3. FOLDER LOCKING . 4. WEB LOG-IN APLLICATION
  • 28. TECHNIQUE PROPOSED AND IMPLEMENTED BY Blonder , Passlogix , Wiedenbeck AUTHENTICATION PROCESS Click on several pre- registered locations of a picture in the right sequence. MEMORABILITY Can be hard to remember PASSWORD SPACE N^K (N is the number of pixels or smallest units of a picture, K is the number of locations to be clicked on) POSSIBLE ATTACK METHODS Guess, shoulder surfing
  • 29. CONCLUSION  Picture passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security  Picture password is still immature, more research is required in this field.