3. 1) Authentication is the first line of defence and also one of the techniques to
protect against harm including encipherments, routing protocols, digital
signature and data integrity as it ensure and confirm user’s identity [1].
2) Passwords are often used to secure computers and information. A good
password for security should be easy for the user to remember, difficult for
others to steal and hard to guess by impostor [2].
3) Authentication can be divided into three which are token-based
authentication, biometric based authentication and knowledge based
authentication.
4. PROBLEM STATEMENT
Most of the users tend to use weak password because
a long and random password is secure but it is hard
for the users to remember [8].
Weak passwords is easier to remember but it vulnerable by
various attacks such as brute force attack, dictionary attack
and shoulder surfing to succeed in password exploitation.
Hackers can get any password cracking software
for free on the internet that will test most
combination of characters for each user on a
system and retrieve the password.
5. OBJECTIVES
To study and design the
graphical password.
关键词
关键词
关键词
To implement and
combine cued-recall
based technique with
zero knowledge protocol.
To test the efficiency and
the secure of the
graphical password
using cued recall based
techniques combine with
zero knowledge protocol.
6. SCOPE
USER
register for the first visit in the
system.
SYSTEM
Login to the system and select
five images that have been
selected during register process
and click at the same point that
they have clicked before.
view user’s password and
responsible to it
system can verify and
authorize the user by the
password that user’s key in.
7. LIMITATION OF WORK
1) The images can only be selected from database for the registration
phase.
2) This system used for authentication only.
3) The combination of graphical password of cued click point with
zero knowledge protocol might be slower compare to traditional text-
based password authentication system.
9. YEAR AUTHOR TITLE TECHNIQUE DESCRIPTION
2015 Rashmi. K.,
Naaz. S.
Graphical Password
Authentication Using
Cued Click Points
Cued Click
Points
- Cued Click Points provide greater
security than Passpoints because the
number of images increase the
workload for attackers.- Require more
storage for images- Performance was
very good in terms of speed, accuracy,
and number of errors.
2013 Khundrakpam
Johnson
Singh, Usham
Sanjota Chanu
Graphical Password or
Graphical User
Authentication as
Effective Password
Provider
Cued recall
based methods
- User presented with a grid of pictures
or segments of a single picture. -
Graphical password allow users to click
on certain areas.- People are better at
memorizing graphical passwords.- More
difficult to break graphical passwords
using traditional attack such as brute
force attack and dictionary attack.
2015 Majed Sanan ,
Mahmoud
Rammal
,Wassim
Rammal
Graphical Passwords
replacing text
passwords:
Advantages and Cons
Recognition
based and
recall based
methods
- Graphical passwords replace text
passwords- Human can remember
images better than text.- Graphical
password is more secure eventhough it
is slow log-in operation.
10. 2014 Ramanan, S.,
Bindhu. J.
A Survey on Different
Graphical Password
Authentication
Techniques
Recognition
based, pure
recall based,
cued recall
based and
hybrid schemes
- Hybrid schemes and cued recall based
have a great seccurity than recognition
based and pure recall based methods.-
Registration and login process takes a
long time.- improve the security as the
alphanumeric corpus size is limited.
2012 Meng. Y Designing Click-Draw
Based Graphical
PasswordScheme for
Better Authentication
Recall Based
Techniques
- Further enhance the image-based
authentication in both security and
usability- It is hard and expensive for an
authentication system to accurately
recognize.
2007 Dirik, A.E.,
Memon, N., &
Birget, J.C
Modeling user Choice
in the Passpoints
Graphical Password
Scheme
Passpoint
technique
- More secure than text based
passwords but less secure than cued
click point.- Hard to remember more
than two points in one images.
11. EXPECTED RESULTS
KEY WORDS
1) Can replace authentication using textual password as it is more efficient.
2) Produce more secure password.
12. GANTT CHART
Duration
Task FYP 1
September October
1 2 3 4 5 6 7 8
Project Title proposal
Discussion and selection title
Develop gantt chart
State problem statement
State objective
Submission of abstract
State scope
Literature review research
Research for methodology
Preparation proposal
Presentation project proposal
Proposal correction
13. REFERENCES
1) Ms Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty,
Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and
Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64
2) Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme
Based On Color Image Gallery, International Journal of Engineering and Innovative Technology
(IJEIT) Volum2, Issue 4, October 2012.
3) Rashmi. K., Naaz. S., Graphical Password Authentication Using Cued Click Points
, International Journal of Engineering and Innovative Technology (IJEIT) ,2015.
4) Hu, W., X. Wu, and G.Wei, The Security Analysis of Graphical Passwords, in International
Conference on Communications and Intelligence Information Security.2010.
5) A.H. Lashkari, F.T., Graphical User Authentication(GUA).2010: Lambert Academic Publisher.
16. FLOWCHART REGISTRATION
Input: User enter details, select pictures and
click at some point for password.
Output: User receives positive message from
the system which is successfully registered.
17. FLOWCHART LOGIN
Input: User provides username and verify. The
correct username display the image and user
choose five image from database.
Output: The authentication confirmed message.