0% found this document useful (0 votes)
220 views19 pages

Graphical Password Authentication - Yamini

This document discusses passwords and graphical passwords. It defines a password as a secret word or string used to authenticate identity. Passwords are commonly used to log into accounts, emails, apps, networks, websites and databases. The document then discusses authentication, including token-based, biometric and knowledge-based methods, with text passwords being the most widely used knowledge-based technique. It introduces graphical passwords as an alternative to text passwords, where users select images or click points on images to authenticate. Types of graphical passwords include recall-based, recognition-based and cued-recall techniques. Specific graphical password schemes like DAS, signatures and passpoints are described. The document concludes that graphical passwords can increase security while making passwords more user

Uploaded by

bonkuri yamini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
220 views19 pages

Graphical Password Authentication - Yamini

This document discusses passwords and graphical passwords. It defines a password as a secret word or string used to authenticate identity. Passwords are commonly used to log into accounts, emails, apps, networks, websites and databases. The document then discusses authentication, including token-based, biometric and knowledge-based methods, with text passwords being the most widely used knowledge-based technique. It introduces graphical passwords as an alternative to text passwords, where users select images or click points on images to authenticate. Types of graphical passwords include recall-based, recognition-based and cued-recall techniques. Specific graphical password schemes like DAS, signatures and passpoints are described. The document concludes that graphical passwords can increase security while making passwords more user

Uploaded by

bonkuri yamini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Presented by:

B.Yamini
17QK5A0502
CSE-B
Introduction:
 What is PASSWORD?
PASSOWRD is a secert word or string of characters that is used for user
authentication to prove his /her identity and gain access to resources.

• Uses of Password:

 Logging into accounts.


 Retrieving emails.
 Accessing applications.
 Networks.
 Websites.
 Database.
Authentication:
Authentication is process of conformation of a person
identity.

Types:
 Token based authentication.
 Key cards, band cards,smart cards,…..

 Biometric based authentication


 Fingerprints, iris scan, facial recognition,…

 Knowledge based authentication


 Text-based passwords, pictures-based passwords,..
 Most widely used authentication techniques.
Text Password:
Text password is a secret word or string of character that
is used for user authentication to prove his/her
identity and gain access to resources.

Difficulty of remembering passwords


 Easy to remember --> easy to guess
 Hard to guess --> hard to remember
Graphical Password:
A graphical password is an authentication system that
works by having the user select from images, in a
specific order, presented in a graphical user
interface(GUI)

For this reason , the graphical-password approach is


sometimes called graphical user authentication(GUA)

An example of a graphical password uses an images on


the screen and lets the user choose a few click points;
these click points are the “password” ,and the user has
to click closely to these points again in order to log in.
Types of Graphical Passwords:
 Recall Based Techniques
 A user is asked to reproduce something that he created or
selected earlier during the registration stage.

 Recognitions Based Techniques


 A user is presented with a set of images and the user passes
the authentication by recognizing and identifying the
images he/her selected during the registration stage.

 Cued-recall Techniques
 An extra cue is provided to users to remember and target
specific locations within a presented image.
Recall Based Techniques:
Draw –A-Secret(DAS)Scheme
User draws a simple pictures on a 2D grid, the coordinate
of the grids occupied by the pictures are stored in the
order drawing

 Redrawing has to touch the same grids in the same


sequence in authentication.
 User studies showed the drawing sequences is hard to
remember.
 Signature scheme.
Here authentication is
conducted by having the
user drawing their
signature using a mouse.
 Pass Point Scheme

User click on any place on an


image to create a password . A
tolerance around each choose
pixel is calculated. In order to
be authentication, user must
click within the tolerance in the
correct sequence .
Recognition Based Techniques:

Dhamija and Perrig


Scheme:

Pick several pictures out of


many choices, identify then
late in authentication.
 Sobrado and Birget Scheme:

System display a number


of pass-objects(pre-
selected by user)among
many other object s ,user
click inside the convex
hull bounded by pass-
objects.
 Pass Face scheme

In this technique
human faces are
used as password.
 Other Schemes

Select a
sequence of the
image as
password.
Advantages:
 Graphical password schemes provide a way of making
more human-friendly passwords while increasing the
level of security.

 Here the security of the system is very high.

 Dictionary attack and brute force search are infeasible.


Disadvantages:
 Password registration and log-in process take too long.
 Require much more storage space than text based
password.
 Shoulder Surfing.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy