SlideShare a Scribd company logo
3
Most read
6
Most read
GRAPHICAL PASSWORD
AUTHENTICATION
PRESENTED BY
LIPSA PANIGRAHI
ROLL NO-10cs08
CONTENTS
1. WHAT IS PASSWORD?
2. WHAT IS GRAPHICAL PASSWORD?
3. THE SURVEY.
4. COMPARISION BETWEEN ALPHA-NUMERIC &
GRAPHICAL PASSWORDS.
5. A SIMPLE GRAPHICAL PASSWORD SCHEME.
6. GRAPHICAL PASSWORD-WHAT A CONCEPT.
7. ADVANTAGES OF GRAPHICAL PASSWORDS.
8. DRAWBACKS.
9. CONCLUSION
PASSWORDS
 The most commonly used form of user authentication.
 The weakest links of computer security systems.
 Two conflicting requirements of alphanumeric
passwords
(1) Easy to remember and
(2) Hard to guess.
Many people tend to ignore the second requirement which
lead to weak passwords. Many solutions have been proposed.
Graphical password is one of the solutions.
GRAPHICAL PASSWORDS
 A GRAPHICAL PASSWORD
is an authentication system that works by having the user select from
images, in a specific order, presented in a graphical user interface
(GUI). For this reason, the graphical-password approach is sometimes
called graphical user authentication (GUA).
 It can be used in:
– web log-in application
– ATM machines
– mobile devices
The survey : Two categories
 Recognition Based Techniques
– a user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he
selected during the registration stage
 Recall Based Techniques
– A user is asked to reproduce something that he created or
selected earlier during the registration stage
Password is the set of areas on big
images:
 Here user has to select a
background picture from the
given library and have to
provide points of control over
image.
 The sequence of points will
be used as authentication.
 During authentication user
has to give right click on all
the points in the right
sequence.
Recognition Based Techniques
 Sobrado and Birget Scheme
System display a number of pass-objects
(pre-selected by user) among many other
objects, user click inside the convex hull
bounded by pass-objects.
– authors suggested using 1000 objects,
which makes the display very crowed and
the objects almost indistinguishable.
password space: N!/K! (N-K)!
( N-total number of picture objects
K-number of pre-registered objects)
Recall Based Techniques
 DAS-Draw A Secret: Input plane
break down on fields, so each field has
its own position in matrix with
dimensionally n*n.
 By creating password user pass
through different fields.
 During authentication user has to repeat
his drawing on creating step as close as
possible and pass through same field.
COMPARISION BETWEEN ALPHA-NUMERIC &
GRAPHICAL PASSWORDS:
Commonly used guidelines for alpha-numeric passwords are:
 The password should be at least 8 characters long.
 The password should not be easy to relate to the user (e.g., last name,
birth date).
 Ideally, the user should combine upper and lower case letters and
digits.
Graphical passwords
 The password consists of some actions that the user performs on an
image.
 Such passwords are easier to remember & hard to guess.
Graphical Passwords - What A Concept!
 Here you pick several icons to
represent the password.
 Then when you want to
authenticate it, a screen is
drawn as a challenge to which
you must respond.
 The screen has numerous icons,
at some of which are your
private password icons.
 You must locate your
icons visually on the
screen and click on the screen
to the password.
A SIMPLE GRAPHICAL PASSWORD
SCHEME
The user chose these regions when
he or she created the password.
The choice for the four regions is
arbitrary, but the user will pick
places that he or she finds easy to
remember. The user can introduce
his/her own pictures for creating
graphical passwords. Also, for
stronger security, more than four
click points could be chosen.
ADVATAGES OF GRAPHICAL PASSWORDS
 Graphical password schemes provide a way of making more human-
friendly passwords .
 Here the security of the system is very high.
 Here we use a series of selectable images on successive screen pages.
 Dictionary attacks are infeasible.
DRAWBACKS
 Password registration and log-in process take too long.
 Require much more storage space than text based passwords.
 Shoulder Surfing
It means watching over people's shoulders as they process
information. Examples include observing the keyboard as a person
types his or her password, enters a PIN number, or views personal
information.
Because of their graphic nature, nearly all graphical password
schemes are quite vulnerable to shoulder surfing.
SOLUTION TO SHOULDER SURFING
PROBLEM
(1) TRIANGLE SCHEME
(2) MOVABLE FRAME SCHEME
CONCLUSION
 Graphical passwords are an alternative to textual alphanumeric
password.
 It satisfies both conflicting requirements i.e. it is easy to remember &
it is hard to guess.
 By the solution of the shoulder surfing problem, it becomes more
secure & easier password scheme.
 By implementing other special geometric configurations like triangle
& movable frame, one can achieve more security.
ANY QURIES?

More Related Content

PPT
graphical password authentication
PPTX
Graphical Password Authentication
PPT
Graphical password authentication
PPTX
Graphical password authentication
PPT
3D Password Presentation
PPT
Graphical Password Authentication
PPTX
3D Password and its importance
PPT
3D-Password: A More Secure Authentication
graphical password authentication
Graphical Password Authentication
Graphical password authentication
Graphical password authentication
3D Password Presentation
Graphical Password Authentication
3D Password and its importance
3D-Password: A More Secure Authentication

What's hot (20)

PPTX
Graphical User Authentication
PPTX
Graphical password authentication system ppts
PPTX
Graphical password authentication
PPTX
Graphical password authentication
PDF
A graphical password authentication system (ieee 2011) 1
PPTX
Graphical Password Authentication
PPT
Graphical password
PDF
Graphical password authentication using pccp with sound signature
PPTX
Graphical Password Authentication
PPT
Graphical password authentication
PPTX
Image Based Password Authentication for Illiterate using Touch screen by Deep...
PPTX
Three Level Security System Using Image Based Aunthentication
PPTX
cryptography ppt free download
PPTX
3D PASSWORD SEMINAR
PPTX
Graphical password ppt
PDF
3d password - Report
PPTX
Image encryption and decryption
PDF
3D Password PPT
PPTX
Online Bus Reservatiom System
PPTX
Graphical Password Authentication ppt.pptx
Graphical User Authentication
Graphical password authentication system ppts
Graphical password authentication
Graphical password authentication
A graphical password authentication system (ieee 2011) 1
Graphical Password Authentication
Graphical password
Graphical password authentication using pccp with sound signature
Graphical Password Authentication
Graphical password authentication
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Three Level Security System Using Image Based Aunthentication
cryptography ppt free download
3D PASSWORD SEMINAR
Graphical password ppt
3d password - Report
Image encryption and decryption
3D Password PPT
Online Bus Reservatiom System
Graphical Password Authentication ppt.pptx
Ad

Viewers also liked (15)

PPTX
Ppt for graphical password authentication using cued click points
PPTX
Graphical password authentication system with association of sound
PPTX
Authentication scheme for session password using Images and color
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PPSX
Shoulder surfing resistant graphical and image based login system
PPTX
Graphical password authentication system ppts
PPTX
Image based authentication
PPT
11aman
PDF
Graphical Password Authenticationimp.docx2
PPTX
Integration of sound signature in graphical password
PDF
Psdot 2 design and implementation of persuasive cued click-points and evalua...
PPTX
Shoulder Surfing as future technology
PPTX
Captcha as graphical password
PPTX
Slideshare ppt
DOCX
Applications of 8051 microcontrollers
Ppt for graphical password authentication using cued click points
Graphical password authentication system with association of sound
Authentication scheme for session password using Images and color
Authentication Scheme for Session Password using matrix Colour and Text
Shoulder surfing resistant graphical and image based login system
Graphical password authentication system ppts
Image based authentication
11aman
Graphical Password Authenticationimp.docx2
Integration of sound signature in graphical password
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Shoulder Surfing as future technology
Captcha as graphical password
Slideshare ppt
Applications of 8051 microcontrollers
Ad

Similar to Graphical password (20)

PPTX
Pptforpicturepasswordauthentication 130125073736-phpapp02
PDF
graphicalpswrdauth-130518230955-phpapp02.pdf
PPTX
A presentation on graphical passwords
PPTX
graphicalpswrdauth-130518230955-phpapp02.pptx
PDF
Graphical Password Authentication
PDF
Folder Security Using Graphical Password Authentication Scheme
PPTX
Comprehensive study of the usability features of the Graphical Password
PPT
558 120127064951-phpapp01
PDF
Graphical password authentication using Pass faces
PPTX
Graphical authentication system.pptx
PDF
Technical.pdf
PPTX
finale.ppt.pptx
PPTX
Nilesh
PPTX
Graphical password
PDF
Graphical Password by Image Segmentation
PPTX
Data hiding in graphical password authentication using combination
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PDF
Multiple grid based graphical text password authentication
PDF
Sudhanshu Raman
PPT
Graphicalpasswordauthentication 130907104619-
Pptforpicturepasswordauthentication 130125073736-phpapp02
graphicalpswrdauth-130518230955-phpapp02.pdf
A presentation on graphical passwords
graphicalpswrdauth-130518230955-phpapp02.pptx
Graphical Password Authentication
Folder Security Using Graphical Password Authentication Scheme
Comprehensive study of the usability features of the Graphical Password
558 120127064951-phpapp01
Graphical password authentication using Pass faces
Graphical authentication system.pptx
Technical.pdf
finale.ppt.pptx
Nilesh
Graphical password
Graphical Password by Image Segmentation
Data hiding in graphical password authentication using combination
Count based hybrid graphical password to prevent brute force attack and shoul...
Multiple grid based graphical text password authentication
Sudhanshu Raman
Graphicalpasswordauthentication 130907104619-

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.

Graphical password

  • 2. CONTENTS 1. WHAT IS PASSWORD? 2. WHAT IS GRAPHICAL PASSWORD? 3. THE SURVEY. 4. COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS. 5. A SIMPLE GRAPHICAL PASSWORD SCHEME. 6. GRAPHICAL PASSWORD-WHAT A CONCEPT. 7. ADVANTAGES OF GRAPHICAL PASSWORDS. 8. DRAWBACKS. 9. CONCLUSION
  • 3. PASSWORDS  The most commonly used form of user authentication.  The weakest links of computer security systems.  Two conflicting requirements of alphanumeric passwords (1) Easy to remember and (2) Hard to guess. Many people tend to ignore the second requirement which lead to weak passwords. Many solutions have been proposed. Graphical password is one of the solutions.
  • 4. GRAPHICAL PASSWORDS  A GRAPHICAL PASSWORD is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).  It can be used in: – web log-in application – ATM machines – mobile devices
  • 5. The survey : Two categories  Recognition Based Techniques – a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage  Recall Based Techniques – A user is asked to reproduce something that he created or selected earlier during the registration stage
  • 6. Password is the set of areas on big images:  Here user has to select a background picture from the given library and have to provide points of control over image.  The sequence of points will be used as authentication.  During authentication user has to give right click on all the points in the right sequence.
  • 7. Recognition Based Techniques  Sobrado and Birget Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects. – authors suggested using 1000 objects, which makes the display very crowed and the objects almost indistinguishable. password space: N!/K! (N-K)! ( N-total number of picture objects K-number of pre-registered objects)
  • 8. Recall Based Techniques  DAS-Draw A Secret: Input plane break down on fields, so each field has its own position in matrix with dimensionally n*n.  By creating password user pass through different fields.  During authentication user has to repeat his drawing on creating step as close as possible and pass through same field.
  • 9. COMPARISION BETWEEN ALPHA-NUMERIC & GRAPHICAL PASSWORDS: Commonly used guidelines for alpha-numeric passwords are:  The password should be at least 8 characters long.  The password should not be easy to relate to the user (e.g., last name, birth date).  Ideally, the user should combine upper and lower case letters and digits. Graphical passwords  The password consists of some actions that the user performs on an image.  Such passwords are easier to remember & hard to guess.
  • 10. Graphical Passwords - What A Concept!  Here you pick several icons to represent the password.  Then when you want to authenticate it, a screen is drawn as a challenge to which you must respond.  The screen has numerous icons, at some of which are your private password icons.  You must locate your icons visually on the screen and click on the screen to the password.
  • 11. A SIMPLE GRAPHICAL PASSWORD SCHEME The user chose these regions when he or she created the password. The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.
  • 12. ADVATAGES OF GRAPHICAL PASSWORDS  Graphical password schemes provide a way of making more human- friendly passwords .  Here the security of the system is very high.  Here we use a series of selectable images on successive screen pages.  Dictionary attacks are infeasible.
  • 13. DRAWBACKS  Password registration and log-in process take too long.  Require much more storage space than text based passwords.  Shoulder Surfing It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
  • 14. SOLUTION TO SHOULDER SURFING PROBLEM (1) TRIANGLE SCHEME
  • 16. CONCLUSION  Graphical passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.