SlideShare ist ein Scribd-Unternehmen logo
1 von 14
GRAPHICAL PASSWORD
  AUTHENTICATION
              Presented By:
              Sarthak Gupta
Outline
• Introduction
• Graphical Passwords
• Advantages of Graphical Passwords
• Drawbacks
• Solution To Shoulder Surfing Problem
• Usability
• Conclusion
INTRODUCTION

• Mostcommon computer authentication method (Text-based
 passwords).
   • Difficulty of remembering passwords
      •   easy to remember -> easy to guess
      •   hard to guess -> hard to remember
      •   Users tend to write passwords down or use the same passwords for different
          accounts

• An alternative: Graphical Passwords
   • Psychological studies: Human can remember pictures better than text
GRAPHICAL PASSWORDS



• An authentication system that works by having the user select
 from images, in a specific order, presented in a graphical user
 interface (GUI).
• The graphical-password approach is sometimes called graphical
 user authentication (GUA).
CLASSIFICATION TECHNIQUES


• Recognition Based Techniques
   •   a user is presented with a set of images and the user passes the authentication by
       recognizing and identifying the images he selected during the registration stage


• Recall Based Techniques
   •   A user is asked to reproduce something that he created or selected earlier during the
       registration stage
RECOGNITION BASED TECHNIQUES
Dhamija and Perrig Scheme                         Sobrado and Birget Scheme
• Pick several pictures out of many           •   System display a number of pass-objects
    choices, identify   them     later   in
                                                  (pre-selected by user) among many other
    authentication.
                                                  objects, user click inside the convex hull
•   Take longer    to   create   graphical
                                                  bounded by pass-objects.
    passwords
RECOGNITION BASED TECHNIQUES


•   Other Schemes




     Using human faces as password   Select a sequence of images as
                                     password
Recall Based Techniques
• Draw-A-Secret (DAS) Scheme
User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture
  are stored in the order of drawing


•   redrawing has to touch the
same grids in the same
sequence in authentication
ADVATAGES OF GRAPHICAL PASSWORDS


• Provide a way of making more human-friendly passwords while
  increasing the level of security.
• On average - millions of years to break into the system.
• Dictionary attacks are infeasible.
DRAWBACKS
• THE SHOULDER SURFING PROBLEM
   •   As the name implies, shoulder surfing is watching over people's shoulders as they
       process information.
   •   Examples include observing the keyboard as a person types his or her password, enters
       a PIN number, or views personal information.
   •   Because of their graphic nature, nearly all graphical password schemes are quite
       vulnerable to shoulder surfing. Most of the existing schemes simply circumvent the
       problem by stating that graphical passwords should only be used with handheld
       devices or workstations set up in such a way that only one person can see the screen at
       the time of login.
• However, it is possible to create schemes to counter shoulder surfing
  problem
SOLUTION TO SHOULDER SURFING
              PROBLEM

• (1) TRIANGLE SCHEME   (2) MOVABLE FRAME SCHEME
USABILITY

• Pictures are easier to remember than text strings
• Password registration and log-in process take too long
• Require much more storage space than text based passwords
CONCLUSION
• Main Argument for Graphical Passwords:
   •   Satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.
• More difficult to break graphical passwords from traditional attack
  methods:
   •   Brute Force Search
   •   Dictionary Attack
   •   Or Spyware.
• Not yet widely used, current graphical password techniques are still
  immature.
• By implementing other special geometric configurations like triangle &
  movable frame, one can achieve more security.
Graphical User Authentication

Weitere ähnliche Inhalte

Was ist angesagt?

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxSarvaniShettigar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 

Was ist angesagt? (20)

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D Password
3D Password3D Password
3D Password
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 

Andere mochten auch

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Deepak Yadav
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical passwordGopinath Ramanna
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalAleyda Solís
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 

Andere mochten auch (14)

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
11aman
11aman11aman
11aman
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Nilesh
Nilesh Nilesh
Nilesh
 
ICIECA 2014 Paper 20
ICIECA 2014 Paper 20ICIECA 2014 Paper 20
ICIECA 2014 Paper 20
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 

Ähnlich wie Graphical User Authentication

A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdfGirishKA4
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptxRohitSabale4
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordNirzar Bhaidkar
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptxHARIKRISHNANU13
 
Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpointssaria11
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsSashank Dara
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-convertedMaheshbabu319
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 

Ähnlich wie Graphical User Authentication (20)

Graphical password
Graphical passwordGraphical password
Graphical password
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx3-D PASSWORD IN HARDWARE PPT.pptx
3-D PASSWORD IN HARDWARE PPT.pptx
 
Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public Clouds
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
Review 1 (1) (1).pptx
Review 1 (1) (1).pptxReview 1 (1) (1).pptx
Review 1 (1) (1).pptx
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 

Mehr von Sarthak Gupta

People Capability Maturity Model
People Capability Maturity ModelPeople Capability Maturity Model
People Capability Maturity ModelSarthak Gupta
 
BPCL’s Petrol Pump Retail Revolution Case
BPCL’s Petrol Pump Retail Revolution CaseBPCL’s Petrol Pump Retail Revolution Case
BPCL’s Petrol Pump Retail Revolution CaseSarthak Gupta
 
Customer Centered Brand Management Case
Customer Centered Brand Management CaseCustomer Centered Brand Management Case
Customer Centered Brand Management CaseSarthak Gupta
 

Mehr von Sarthak Gupta (6)

Depreciation
DepreciationDepreciation
Depreciation
 
CIBIL
CIBILCIBIL
CIBIL
 
People Capability Maturity Model
People Capability Maturity ModelPeople Capability Maturity Model
People Capability Maturity Model
 
BPCL’s Petrol Pump Retail Revolution Case
BPCL’s Petrol Pump Retail Revolution CaseBPCL’s Petrol Pump Retail Revolution Case
BPCL’s Petrol Pump Retail Revolution Case
 
Customer Centered Brand Management Case
Customer Centered Brand Management CaseCustomer Centered Brand Management Case
Customer Centered Brand Management Case
 
Value & Ethics
Value & EthicsValue & Ethics
Value & Ethics
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Graphical User Authentication

  • 1. GRAPHICAL PASSWORD AUTHENTICATION Presented By: Sarthak Gupta
  • 2. Outline • Introduction • Graphical Passwords • Advantages of Graphical Passwords • Drawbacks • Solution To Shoulder Surfing Problem • Usability • Conclusion
  • 3. INTRODUCTION • Mostcommon computer authentication method (Text-based passwords). • Difficulty of remembering passwords • easy to remember -> easy to guess • hard to guess -> hard to remember • Users tend to write passwords down or use the same passwords for different accounts • An alternative: Graphical Passwords • Psychological studies: Human can remember pictures better than text
  • 4. GRAPHICAL PASSWORDS • An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). • The graphical-password approach is sometimes called graphical user authentication (GUA).
  • 5. CLASSIFICATION TECHNIQUES • Recognition Based Techniques • a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage • Recall Based Techniques • A user is asked to reproduce something that he created or selected earlier during the registration stage
  • 6. RECOGNITION BASED TECHNIQUES Dhamija and Perrig Scheme Sobrado and Birget Scheme • Pick several pictures out of many • System display a number of pass-objects choices, identify them later in (pre-selected by user) among many other authentication. objects, user click inside the convex hull • Take longer to create graphical bounded by pass-objects. passwords
  • 7. RECOGNITION BASED TECHNIQUES • Other Schemes Using human faces as password Select a sequence of images as password
  • 8. Recall Based Techniques • Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing • redrawing has to touch the same grids in the same sequence in authentication
  • 9. ADVATAGES OF GRAPHICAL PASSWORDS • Provide a way of making more human-friendly passwords while increasing the level of security. • On average - millions of years to break into the system. • Dictionary attacks are infeasible.
  • 10. DRAWBACKS • THE SHOULDER SURFING PROBLEM • As the name implies, shoulder surfing is watching over people's shoulders as they process information. • Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. • Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing. Most of the existing schemes simply circumvent the problem by stating that graphical passwords should only be used with handheld devices or workstations set up in such a way that only one person can see the screen at the time of login. • However, it is possible to create schemes to counter shoulder surfing problem
  • 11. SOLUTION TO SHOULDER SURFING PROBLEM • (1) TRIANGLE SCHEME (2) MOVABLE FRAME SCHEME
  • 12. USABILITY • Pictures are easier to remember than text strings • Password registration and log-in process take too long • Require much more storage space than text based passwords
  • 13. CONCLUSION • Main Argument for Graphical Passwords: • Satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. • More difficult to break graphical passwords from traditional attack methods: • Brute Force Search • Dictionary Attack • Or Spyware. • Not yet widely used, current graphical password techniques are still immature. • By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.