SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Comprehensive study of
the usability
features of the
Graphical Password

1
CONTENTS

1. INTRODUCTION
2. CURRENT AUTHENTICATION METHODS
3.DRAWBACKS OF NORMAL PASSWORD
4.WHY DO WE USE GRAPHICAL PASSWORD?
5. RECOGNITION BASED TECHNIQUES
6.RECALL BASED TECHNIQUES
7.CONCLUSION
8.REFERENCES
9.WORDS OF GRATITUDE

2
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biometric based
(fingerprint,iris scan,facial recognition)
Knowledge based
(text based and picture based passwords)

3
1Token based authentication

4
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biometric based
(fingerprint,iris scan,facial recognition)
Knowledge based
(text based and picture based passwords)

5
2,Biometric based

6
Introduction
Current authentication methods






Token based authentication
( key cards,bank cards,smart cards)
Biometric based
(fingerprint,iris scan,facial recognition)
Knowledge based
(text based and picture based passwords)

7
3,Knowledge based
a) text based

8
3,Knowledge based
b)picture based

9
Drawbacks of normal password







Easy to guess
Harder passwords are not easy to remember
Dictionary attack-successively trying all the
words in an exhaustive list called a dictionary
Bruteforce attack-tries to use every possible
character combinations as a password
Key-space is limited to 64 ASCII characters
1
0
Why do we use graphical
password?







More secure
More memorable
Easier for people to use
A picture worth thousand passwords
Offers much larger keyspace
Cued recall,which helps users to remember a
password based on picture displayed and not
just memory alone
 Divided into two-recognition method and
recall based methods

1
1
Graphical password?
Divided into two
Recognition method
 Recall based methods


12
Recognition based technique
A user is presented with a set of
images and the user passes the
authentication by recognizing and
identifying the images he or she
selected during the registration stage

13
Methods for recognition based
technique
 Dhamija and

Perrig algorithm
 Sobrado and Birget algorithm
 Jansen et al. algorithm
 Passface algorithm

1
4
Dhamija and Perrig algorithm
Based on hash visualization technique

1
5
User will be asked to select certain
number of images from a set of random
pictures generated by a program
Later, user will be required to identify
the pre-selected images to be
authenticated

16
Drawbacks
SHOULDER-SURFING

using direct observation techniques,
such as looking over someone's shoulder,
to get information
Longer login

time
1
7
Sobrado and Birget algorithm


Overcome the shoulder-surfing attacks



Login time can be reduced

 Several schemes are there, eg.triangle

scheme,moveable frame scheme,special
geometric configuration scheme
1
8
Triangle scheme

1
9
A user needs to selects their pass-object
among many displayed object
 To be authenticated, a user needs to
recognize all the pre-selected pass-object
which was selected during the registration
phase.
 The user requires to click inside the
convex-hull which formed by the passobject


20
Moveable frame scheme

21
This scheme is similar to their previous
scheme but, only three pass objects were
involved in this technique.
 One of the pass-objects is placed into the
moveable frame.
 To be authenticated, the user needs to
rotate the frame until all the pass-object is
located in a straight line


22
Jansen et al. algorithm
Select a sequence of thumbnail photo to form a password

Designed especially for mobile devices such as PDAs

2
3
Throughout the password creation, a user
has to select the theme first e.g. sea and
shore,
 Afterward, a user has to selects and
registers a sequence of the selected
thumbnail photo to form a password .
 The user needs to recognize and identify
the previously seen photos and touch it by
using stylus with the correct sequence in
order to be authenticated


24
Passface algorithm

25
Based on the assumption that human can
recall human faces easier than other
pictures
 User are requires to select the previously
seen human face picture from a grid of
nine faces which one of the face is the
known face and the rest is the decoy faces


26


This step continuously repeated until all
the four face is identified. User needs to
recognize all the face selected during the
enrollment stage. User is authenticated if
all the correct face is successfully
identified.

27
Takada and koike
 Allow

users to use their favourite image
for authentication
First register their favourite images with

the server

28
Recall based techniques
A user is asked to reproduce
something that he or she created or
selected earlier during the registration
stage

29
Methods for recall based techniques





Passlogix scheme
DAS scheme
Signature scheme

30
Passlogix scheme



“Repeating a sequence of actions”
Creating a password by a chronological
situation

31
User can select their background
images based on the environment, for
example in the
kitchen, bathroom, bedroom or etc
 To enter a password, user can click
and/or drag on a series of items within
that image.


32


For example in the kitchen environment,
user can prepare a meal by selecting
cooking ingredients, take fast food from
fridge and put it in the microwave oven,
select some fruits and wash it in
washbasin and then put it in the clean
bowl.

33
DAS scheme

“Draw-a-secret” based on two dimensional grid
 Users can draw a password as long as they wish


34
Signature scheme


There is no need to memorize one’s
signature and signatures are hard to fake

35
Conclusion
In this paper, we have conducted a
comprehensive study of existing graphical
password techniques
 We have found that the graphical
passwords schemes is more difficult to be
cracked by using the traditional attack
methods.


36
References
Ieee papers
www.graphicalpassword.net

R. Dhamija and A. Perrig. “Déjà vu: A User Study Using
Images forAuthentication
wikipedia

37
THANK YOU

38
39

Weitere ähnliche Inhalte

Was ist angesagt?

Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 

Was ist angesagt? (20)

Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
11aman
11aman11aman
11aman
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 

Andere mochten auch

Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical passwordGopinath Ramanna
 

Andere mochten auch (6)

Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 

Ähnlich wie Comprehensive study of the usability features of the Graphical Password

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpointssaria11
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.YuvrajGanguly2
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...IRJET Journal
 

Ähnlich wie Comprehensive study of the usability features of the Graphical Password (20)

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Data security with Images through clickpoints
Data security with Images through clickpointsData security with Images through clickpoints
Data security with Images through clickpoints
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
 
3D Password
3D Password3D Password
3D Password
 

Kürzlich hochgeladen

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Comprehensive study of the usability features of the Graphical Password

  • 1. Comprehensive study of the usability features of the Graphical Password 1
  • 2. CONTENTS 1. INTRODUCTION 2. CURRENT AUTHENTICATION METHODS 3.DRAWBACKS OF NORMAL PASSWORD 4.WHY DO WE USE GRAPHICAL PASSWORD? 5. RECOGNITION BASED TECHNIQUES 6.RECALL BASED TECHNIQUES 7.CONCLUSION 8.REFERENCES 9.WORDS OF GRATITUDE 2
  • 3. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 3
  • 5. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 5
  • 7. Introduction Current authentication methods    Token based authentication ( key cards,bank cards,smart cards) Biometric based (fingerprint,iris scan,facial recognition) Knowledge based (text based and picture based passwords) 7
  • 10. Drawbacks of normal password      Easy to guess Harder passwords are not easy to remember Dictionary attack-successively trying all the words in an exhaustive list called a dictionary Bruteforce attack-tries to use every possible character combinations as a password Key-space is limited to 64 ASCII characters 1 0
  • 11. Why do we use graphical password?       More secure More memorable Easier for people to use A picture worth thousand passwords Offers much larger keyspace Cued recall,which helps users to remember a password based on picture displayed and not just memory alone  Divided into two-recognition method and recall based methods 1 1
  • 12. Graphical password? Divided into two Recognition method  Recall based methods  12
  • 13. Recognition based technique A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage 13
  • 14. Methods for recognition based technique  Dhamija and Perrig algorithm  Sobrado and Birget algorithm  Jansen et al. algorithm  Passface algorithm 1 4
  • 15. Dhamija and Perrig algorithm Based on hash visualization technique 1 5
  • 16. User will be asked to select certain number of images from a set of random pictures generated by a program Later, user will be required to identify the pre-selected images to be authenticated 16
  • 17. Drawbacks SHOULDER-SURFING using direct observation techniques, such as looking over someone's shoulder, to get information Longer login time 1 7
  • 18. Sobrado and Birget algorithm  Overcome the shoulder-surfing attacks  Login time can be reduced  Several schemes are there, eg.triangle scheme,moveable frame scheme,special geometric configuration scheme 1 8
  • 20. A user needs to selects their pass-object among many displayed object  To be authenticated, a user needs to recognize all the pre-selected pass-object which was selected during the registration phase.  The user requires to click inside the convex-hull which formed by the passobject  20
  • 22. This scheme is similar to their previous scheme but, only three pass objects were involved in this technique.  One of the pass-objects is placed into the moveable frame.  To be authenticated, the user needs to rotate the frame until all the pass-object is located in a straight line  22
  • 23. Jansen et al. algorithm Select a sequence of thumbnail photo to form a password Designed especially for mobile devices such as PDAs 2 3
  • 24. Throughout the password creation, a user has to select the theme first e.g. sea and shore,  Afterward, a user has to selects and registers a sequence of the selected thumbnail photo to form a password .  The user needs to recognize and identify the previously seen photos and touch it by using stylus with the correct sequence in order to be authenticated  24
  • 26. Based on the assumption that human can recall human faces easier than other pictures  User are requires to select the previously seen human face picture from a grid of nine faces which one of the face is the known face and the rest is the decoy faces  26
  • 27.  This step continuously repeated until all the four face is identified. User needs to recognize all the face selected during the enrollment stage. User is authenticated if all the correct face is successfully identified. 27
  • 28. Takada and koike  Allow users to use their favourite image for authentication First register their favourite images with the server 28
  • 29. Recall based techniques A user is asked to reproduce something that he or she created or selected earlier during the registration stage 29
  • 30. Methods for recall based techniques    Passlogix scheme DAS scheme Signature scheme 30
  • 31. Passlogix scheme   “Repeating a sequence of actions” Creating a password by a chronological situation 31
  • 32. User can select their background images based on the environment, for example in the kitchen, bathroom, bedroom or etc  To enter a password, user can click and/or drag on a series of items within that image.  32
  • 33.  For example in the kitchen environment, user can prepare a meal by selecting cooking ingredients, take fast food from fridge and put it in the microwave oven, select some fruits and wash it in washbasin and then put it in the clean bowl. 33
  • 34. DAS scheme “Draw-a-secret” based on two dimensional grid  Users can draw a password as long as they wish  34
  • 35. Signature scheme  There is no need to memorize one’s signature and signatures are hard to fake 35
  • 36. Conclusion In this paper, we have conducted a comprehensive study of existing graphical password techniques  We have found that the graphical passwords schemes is more difficult to be cracked by using the traditional attack methods.  36
  • 37. References Ieee papers www.graphicalpassword.net R. Dhamija and A. Perrig. “Déjà vu: A User Study Using Images forAuthentication wikipedia 37
  • 39. 39