SlideShare ist ein Scribd-Unternehmen logo
1 von 21
MATRIC NO. : BTBL17047072
PROGRAMME : COMPUTER NETWORK
SECURITY
STUDENT: NURRUL HAFIZZA BINTI MOHD
ANIS
SUPERVISOR: PROF. MADYA DR ZARINA
BINTI MOHAMAD
NAME : NURRUL HAFIZZA BINTI
MOHD ANIS
PROBLEM
STATEMENT
OBJECTIVES
SCOPE
LIMITATION OF
WORK
INTRODUCTION LITERATURE REVIEW
GANTT CHART
REFERENCES
EXPECTED RESULT
METHODOLOGY
1) Authentication is the first line of defence and also one of the techniques to
protect against harm including encipherments, routing protocols, digital
signature and data integrity as it ensure and confirm user’s identity [1].
2) Passwords are often used to secure computers and information. A good
password for security should be easy for the user to remember, difficult for
others to steal and hard to guess by impostor [2].
3) Authentication can be divided into three which are token-based
authentication, biometric based authentication and knowledge based
authentication.
PROBLEM STATEMENT
Most of the users tend to use weak password because
a long and random password is secure but it is hard
for the users to remember [8].
Weak passwords is easier to remember but it vulnerable by
various attacks such as brute force attack, dictionary attack
and shoulder surfing to succeed in password exploitation.
Hackers can get any password cracking software
for free on the internet that will test most
combination of characters for each user on a
system and retrieve the password.
OBJECTIVES
To study and design the
graphical password.
关键词
关键词
关键词
To implement and
combine cued-recall
based technique with
zero knowledge protocol.
To test the efficiency and
the secure of the
graphical password
using cued recall based
techniques combine with
zero knowledge protocol.
SCOPE
USER
register for the first visit in the
system.
SYSTEM
Login to the system and select
five images that have been
selected during register process
and click at the same point that
they have clicked before.
view user’s password and
responsible to it
system can verify and
authorize the user by the
password that user’s key in.
LIMITATION OF WORK
1) The images can only be selected from database for the registration
phase.
2) This system used for authentication only.
3) The combination of graphical password of cued click point with
zero knowledge protocol might be slower compare to traditional text-
based password authentication system.
LITERATURE
REVIEW
YEAR AUTHOR TITLE TECHNIQUE DESCRIPTION
2015 Rashmi. K.,
Naaz. S.
Graphical Password
Authentication Using
Cued Click Points
Cued Click
Points
- Cued Click Points provide greater
security than Passpoints because the
number of images increase the
workload for attackers.- Require more
storage for images- Performance was
very good in terms of speed, accuracy,
and number of errors.
2013 Khundrakpam
Johnson
Singh, Usham
Sanjota Chanu
Graphical Password or
Graphical User
Authentication as
Effective Password
Provider
Cued recall
based methods
- User presented with a grid of pictures
or segments of a single picture. -
Graphical password allow users to click
on certain areas.- People are better at
memorizing graphical passwords.- More
difficult to break graphical passwords
using traditional attack such as brute
force attack and dictionary attack.
2015 Majed Sanan ,
Mahmoud
Rammal
,Wassim
Rammal
Graphical Passwords
replacing text
passwords:
Advantages and Cons
Recognition
based and
recall based
methods
- Graphical passwords replace text
passwords- Human can remember
images better than text.- Graphical
password is more secure eventhough it
is slow log-in operation.
2014 Ramanan, S.,
Bindhu. J.
A Survey on Different
Graphical Password
Authentication
Techniques
Recognition
based, pure
recall based,
cued recall
based and
hybrid schemes
- Hybrid schemes and cued recall based
have a great seccurity than recognition
based and pure recall based methods.-
Registration and login process takes a
long time.- improve the security as the
alphanumeric corpus size is limited.
2012 Meng. Y Designing Click-Draw
Based Graphical
PasswordScheme for
Better Authentication
Recall Based
Techniques
- Further enhance the image-based
authentication in both security and
usability- It is hard and expensive for an
authentication system to accurately
recognize.
2007 Dirik, A.E.,
Memon, N., &
Birget, J.C
Modeling user Choice
in the Passpoints
Graphical Password
Scheme
Passpoint
technique
- More secure than text based
passwords but less secure than cued
click point.- Hard to remember more
than two points in one images.
EXPECTED RESULTS
KEY WORDS
1) Can replace authentication using textual password as it is more efficient.
2) Produce more secure password.
GANTT CHART
Duration
Task FYP 1
September October
1 2 3 4 5 6 7 8
Project Title proposal
Discussion and selection title
Develop gantt chart
State problem statement
State objective
Submission of abstract
State scope
Literature review research
Research for methodology
Preparation proposal
Presentation project proposal
Proposal correction
REFERENCES
1) Ms Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty,
Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and
Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64
2) Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme
Based On Color Image Gallery, International Journal of Engineering and Innovative Technology
(IJEIT) Volum2, Issue 4, October 2012.
3) Rashmi. K., Naaz. S., Graphical Password Authentication Using Cued Click Points
, International Journal of Engineering and Innovative Technology (IJEIT) ,2015.
4) Hu, W., X. Wu, and G.Wei, The Security Analysis of Graphical Passwords, in International
Conference on Communications and Intelligence Information Security.2010.
5) A.H. Lashkari, F.T., Graphical User Authentication(GUA).2010: Lambert Academic Publisher.
METHODOLOGY
USE CASE DIAGRAM
FLOWCHART REGISTRATION
Input: User enter details, select pictures and
click at some point for password.
Output: User receives positive message from
the system which is successfully registered.
FLOWCHART LOGIN
Input: User provides username and verify. The
correct username display the image and user
choose five image from database.
Output: The authentication confirmed message.
FLOWCHART FOR CUED CLICK POINT
PROOF OF CONCEPT
Graphical Password Authentication using Cued click point technique with zero knowledge protocol
Graphical Password Authentication using Cued click point technique with zero knowledge protocol

Weitere ähnliche Inhalte

Was ist angesagt?

Brain tumor detection using convolutional neural network
Brain tumor detection using convolutional neural network Brain tumor detection using convolutional neural network
Brain tumor detection using convolutional neural network MD Abdullah Al Nasim
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithmsankit panigrahy
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysissneha penmetsa
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaginggeetachauhan
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleChristopher Mehdi Elamri
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learningdataalcott
 
Student management system
Student management systemStudent management system
Student management systemAmit Gandhi
 
Melanoma Skin Cancer Detection using Image Processing and Machine Learning
Melanoma Skin Cancer Detection using Image Processing and Machine LearningMelanoma Skin Cancer Detection using Image Processing and Machine Learning
Melanoma Skin Cancer Detection using Image Processing and Machine Learningijtsrd
 
PhD Thesis Proposal
PhD Thesis Proposal PhD Thesis Proposal
PhD Thesis Proposal Ziqiang Feng
 
LIVER-SEG-PPT-1.pptx
LIVER-SEG-PPT-1.pptxLIVER-SEG-PPT-1.pptx
LIVER-SEG-PPT-1.pptxSunilNaik85
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
Brain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptBrain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptRoshini Vijayakumar
 
Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning JAVAID AHMAD WANI
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease predictionKOYELMAJUMDAR1
 
Plant disease detection using machine learning algorithm-1.pptx
Plant disease detection using machine learning algorithm-1.pptxPlant disease detection using machine learning algorithm-1.pptx
Plant disease detection using machine learning algorithm-1.pptxRummanHajira
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learningdataalcott
 
Smart health disease prediction python django
Smart health disease prediction python djangoSmart health disease prediction python django
Smart health disease prediction python djangoShaikSalman28
 

Was ist angesagt? (20)

Brain tumor detection using convolutional neural network
Brain tumor detection using convolutional neural network Brain tumor detection using convolutional neural network
Brain tumor detection using convolutional neural network
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaging
 
Automated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired PeopleAutomated Neural Image Caption Generator for Visually Impaired People
Automated Neural Image Caption Generator for Visually Impaired People
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learning
 
Student management system
Student management systemStudent management system
Student management system
 
Melanoma Skin Cancer Detection using Image Processing and Machine Learning
Melanoma Skin Cancer Detection using Image Processing and Machine LearningMelanoma Skin Cancer Detection using Image Processing and Machine Learning
Melanoma Skin Cancer Detection using Image Processing and Machine Learning
 
PhD Thesis Proposal
PhD Thesis Proposal PhD Thesis Proposal
PhD Thesis Proposal
 
LIVER-SEG-PPT-1.pptx
LIVER-SEG-PPT-1.pptxLIVER-SEG-PPT-1.pptx
LIVER-SEG-PPT-1.pptx
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
Brain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation pptBrain tumor detection using image segmentation ppt
Brain tumor detection using image segmentation ppt
 
Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning Plant disease detection and classification using deep learning
Plant disease detection and classification using deep learning
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols Classification
 
Deep Learning for Lung Cancer Detection
Deep Learning for Lung Cancer DetectionDeep Learning for Lung Cancer Detection
Deep Learning for Lung Cancer Detection
 
Unit 5 Quantization
Unit 5 QuantizationUnit 5 Quantization
Unit 5 Quantization
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease prediction
 
Plant disease detection using machine learning algorithm-1.pptx
Plant disease detection using machine learning algorithm-1.pptxPlant disease detection using machine learning algorithm-1.pptx
Plant disease detection using machine learning algorithm-1.pptx
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 
Smart health disease prediction python django
Smart health disease prediction python djangoSmart health disease prediction python django
Smart health disease prediction python django
 

Ähnlich wie Graphical Password Authentication using Cued click point technique with zero knowledge protocol

Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationnuruladnan11
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdfGirishKA4
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @heregadisagemechu1
 

Ähnlich wie Graphical Password Authentication using Cued click point technique with zero knowledge protocol (20)

Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Poster fyp 047072
Poster fyp 047072Poster fyp 047072
Poster fyp 047072
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Fyp2
Fyp2Fyp2
Fyp2
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
3 d
3 d3 d
3 d
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 

Kürzlich hochgeladen

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Kürzlich hochgeladen (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Graphical Password Authentication using Cued click point technique with zero knowledge protocol

  • 1. MATRIC NO. : BTBL17047072 PROGRAMME : COMPUTER NETWORK SECURITY STUDENT: NURRUL HAFIZZA BINTI MOHD ANIS SUPERVISOR: PROF. MADYA DR ZARINA BINTI MOHAMAD NAME : NURRUL HAFIZZA BINTI MOHD ANIS
  • 2. PROBLEM STATEMENT OBJECTIVES SCOPE LIMITATION OF WORK INTRODUCTION LITERATURE REVIEW GANTT CHART REFERENCES EXPECTED RESULT METHODOLOGY
  • 3. 1) Authentication is the first line of defence and also one of the techniques to protect against harm including encipherments, routing protocols, digital signature and data integrity as it ensure and confirm user’s identity [1]. 2) Passwords are often used to secure computers and information. A good password for security should be easy for the user to remember, difficult for others to steal and hard to guess by impostor [2]. 3) Authentication can be divided into three which are token-based authentication, biometric based authentication and knowledge based authentication.
  • 4. PROBLEM STATEMENT Most of the users tend to use weak password because a long and random password is secure but it is hard for the users to remember [8]. Weak passwords is easier to remember but it vulnerable by various attacks such as brute force attack, dictionary attack and shoulder surfing to succeed in password exploitation. Hackers can get any password cracking software for free on the internet that will test most combination of characters for each user on a system and retrieve the password.
  • 5. OBJECTIVES To study and design the graphical password. 关键词 关键词 关键词 To implement and combine cued-recall based technique with zero knowledge protocol. To test the efficiency and the secure of the graphical password using cued recall based techniques combine with zero knowledge protocol.
  • 6. SCOPE USER register for the first visit in the system. SYSTEM Login to the system and select five images that have been selected during register process and click at the same point that they have clicked before. view user’s password and responsible to it system can verify and authorize the user by the password that user’s key in.
  • 7. LIMITATION OF WORK 1) The images can only be selected from database for the registration phase. 2) This system used for authentication only. 3) The combination of graphical password of cued click point with zero knowledge protocol might be slower compare to traditional text- based password authentication system.
  • 9. YEAR AUTHOR TITLE TECHNIQUE DESCRIPTION 2015 Rashmi. K., Naaz. S. Graphical Password Authentication Using Cued Click Points Cued Click Points - Cued Click Points provide greater security than Passpoints because the number of images increase the workload for attackers.- Require more storage for images- Performance was very good in terms of speed, accuracy, and number of errors. 2013 Khundrakpam Johnson Singh, Usham Sanjota Chanu Graphical Password or Graphical User Authentication as Effective Password Provider Cued recall based methods - User presented with a grid of pictures or segments of a single picture. - Graphical password allow users to click on certain areas.- People are better at memorizing graphical passwords.- More difficult to break graphical passwords using traditional attack such as brute force attack and dictionary attack. 2015 Majed Sanan , Mahmoud Rammal ,Wassim Rammal Graphical Passwords replacing text passwords: Advantages and Cons Recognition based and recall based methods - Graphical passwords replace text passwords- Human can remember images better than text.- Graphical password is more secure eventhough it is slow log-in operation.
  • 10. 2014 Ramanan, S., Bindhu. J. A Survey on Different Graphical Password Authentication Techniques Recognition based, pure recall based, cued recall based and hybrid schemes - Hybrid schemes and cued recall based have a great seccurity than recognition based and pure recall based methods.- Registration and login process takes a long time.- improve the security as the alphanumeric corpus size is limited. 2012 Meng. Y Designing Click-Draw Based Graphical PasswordScheme for Better Authentication Recall Based Techniques - Further enhance the image-based authentication in both security and usability- It is hard and expensive for an authentication system to accurately recognize. 2007 Dirik, A.E., Memon, N., & Birget, J.C Modeling user Choice in the Passpoints Graphical Password Scheme Passpoint technique - More secure than text based passwords but less secure than cued click point.- Hard to remember more than two points in one images.
  • 11. EXPECTED RESULTS KEY WORDS 1) Can replace authentication using textual password as it is more efficient. 2) Produce more secure password.
  • 12. GANTT CHART Duration Task FYP 1 September October 1 2 3 4 5 6 7 8 Project Title proposal Discussion and selection title Develop gantt chart State problem statement State objective Submission of abstract State scope Literature review research Research for methodology Preparation proposal Presentation project proposal Proposal correction
  • 13. REFERENCES 1) Ms Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64 2) Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012. 3) Rashmi. K., Naaz. S., Graphical Password Authentication Using Cued Click Points , International Journal of Engineering and Innovative Technology (IJEIT) ,2015. 4) Hu, W., X. Wu, and G.Wei, The Security Analysis of Graphical Passwords, in International Conference on Communications and Intelligence Information Security.2010. 5) A.H. Lashkari, F.T., Graphical User Authentication(GUA).2010: Lambert Academic Publisher.
  • 16. FLOWCHART REGISTRATION Input: User enter details, select pictures and click at some point for password. Output: User receives positive message from the system which is successfully registered.
  • 17. FLOWCHART LOGIN Input: User provides username and verify. The correct username display the image and user choose five image from database. Output: The authentication confirmed message.
  • 18. FLOWCHART FOR CUED CLICK POINT