this ppt will give you more information abt. graphical password authentication using cued click points.
email id: harikrishnan89@yahoo.co.in
download and edit it..the upload had some problem with fonts.
2. The two most commonly used techniques in picture password
3. RECOGNITION BASED TECHNIQUES
A user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he selected
during the registration stage
RECALL BASED TECHNIQUES
A user is asked to reproduce something that he created or
selected earlier during the registration stage
THIS PROJECT IS BASED ON RECALL BASED
4. MODULES USER REGISTRATION
PROCESS
FINAL
REGISTRATION
PROCESS
PICTURE SELECTION
PROCESS
SYSTEM
LOGIN PROCESS
5.
6. //EXAMPLE:
Enter the username in the
rocky
username field
USERNAME
Click on
NEW USER REGISTER button
NEW USER
REGISTER DATABASE
Verifies the username and
New user registration process. store into the database
7.
8. How to Select picture’s?
There are two ways for selecting an picture for password authen
11. THE PICTURE
SELECTED FROM ONE
OF THE SYSTEM
USER DEFINED PICTURE
OR
DATABASE
Picture + Gridlines
SYSTEM DEFINED PICTURE
12. MESSAGE BOX:
DO YOU WISH TO CONTINUE WITH THIS POINT
YES NO
Select another po
User click on the DATABASE
point
Point and the image will be stored into database .
Now the user can select another image and follows the
User with username Steps above.
13. Click point’s as password
1st click 2nd click 3rd click 4th click 5th click …
Click
point
14.
15. FINAL REGISTRATION PROCESS
USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS
STEP1:
User enters the username and click on NRB.
STEP2:
Click on PICTURE button for selecting an picture for password.
STEP3:
Select a point on the picture and click to next picture.
STEP4:
The point on the last picture will be calculated as the last point for
opening the desired system.
Note: all the points and the pictures along with the username will be stored into database
16.
17.
18. Username
USERNAME verification Verifies the username
Checks the usernam
Reenter the Incorrect in the database
username username
User enters
the username
Generates an message
“ username doesn't match “ DATABASE
If username
“Please Reenter the username”
not matched
NOTE Correct
The user can enter the username only 5 times username
if the username is wrong.
If the incorrect username exists 5 times the
PASSWORD SYSTEM SHUTS DOWN.
19.
20. First picture stored in database during
Last picture
registration
Correct click point
Gives the next image
Correct
username
DATABASE System gives 3 chances to
Verification of click point The user for incorrect
password
Database contains saved
pictures and points.
If the user exists 3 chances then the password system displays
another picture which will be unrelated to the picture selected
by the user during password creation
21. Opens the system protected with password
Last picture in the database
The change password can be done after logging into the main
system.
The change password follow’s the same create password steps.
22. Advantages of picture password authentication
Graphical password schemes provide a way of
making more human-friendly passwords .
Here the security of the system is very high.
Here we use a series of selectable images on
successive screen pages.
Dictionary attacks are infeasible.
23. Drawback's of picture password
Password registration and log-in process take too long.
Require much more storage space than text based passwords.
SHOULDER SURFING
It means watching over people's shoulders as they process information.
Examples include observing the keyboard as a person types his or her password,
enters a PIN number, or views personal information.
Because of their graphic nature, nearly all graphical password schemes are
quite vulnerable to shoulder surfing.
24.
25. Grid Square Size
The security of this
system
depends on the size of
the
picture
As the size of the picture
increases Simultaneously
the grid square
Increases.
Thus, making the system
highly Secured.
We can also use
encryption alg. For
26. Do’s and Don’ts for secured password
Do’s
1. use easy to remember pictures but hard crack.
2. Avoid hotspots on the picture while selecting click point.
3. Always remember the click point and picture which will become
helpful for knowledge based authentication.
4. Choose minimum 3 pictures or maximum 5 pictures for this
password system.
5. As no Of pictures increases the password becomes that tight.
Don’ts
6. Do not use too much bright and black pictures for password
27. T H E A P P L I C AT I O N O F P I C T U R E PA S S W O R D
SYSTEM
1. HARD DISK LOCKING.
2. SYSTEM LOG IN AND LOG OUT PROCESS.
3. FOLDER LOCKING .
4. WEB LOG-IN APLLICATION
28. TECHNIQUE PROPOSED AND IMPLEMENTED BY
Blonder , Passlogix , Wiedenbeck
AUTHENTICATION PROCESS
Click on several pre- registered locations of a picture in the right sequence.
MEMORABILITY
Can be hard to remember
PASSWORD SPACE
N^K (N is the number of pixels or smallest units of a picture, K is the number of
locations to be clicked on)
POSSIBLE ATTACK METHODS
Guess, shoulder surfing
29. CONCLUSION
Picture passwords are an alternative to textual alphanumeric password.
It satisfies both conflicting requirements i.e. it is easy to remember & it is
hard to guess.
By the solution of the shoulder surfing problem, it becomes more secure &
easier password scheme.
By implementing encryption algorithms and hash algorithms for storing and
retrieving pictures and points, one can achieve more security
Picture password is still immature, more research is required in this field.