SlideShare a Scribd company logo
Graphical Password 
Authentication 
PRESENTED BY: 
DHVANI SHAH
OUTLINE 
Summary: 
1.Introduction 
-Password 
-Authentication 
-Methods of Authentication 
2. Text-based password 
-Drawbacks of text-based passwords 
3.Problem Definition 
4.Graphical Password 
5.Existing Model 
6.Proposed Model 
7.Conclusion
INTRODUCTION 
What is PASSWORD?
PASSWORD 
PASSWORD is a secret word or string of characters that 
is used for user authentication to prove his/her identity 
and going to access resources 
Used for? 
Logging into accounts 
Retrieving emails 
Accessing applications 
Used In? 
 Networks. 
 Websites 
 Databases
What is AUTHENTICATION? 
Conformation of a person’s identity
Methods for authentication 
Token-based 
Biometric-based 
Knowledge-based 
Key cards, smart 
cards 
Face recognition, finger print 
Text-based, image-based
Text-based Password
Drawbacks 
1) Difficulty of remembering 
passwords 
Easy to remember : easy 
to guess 
Hard to guess : hard to 
remember 
2)Users tend to write the 
passwords down or use the 
same passwords by 
different accounts
Drawbacks 
3)Brute force attack 
4) Dictionary attack
PROBLEM DEFINITION 
Alpha-numeric passwords have various 
disadvantages and to overcome this disadvantages 
GRAPHICAL PASSWORD AUTHENTICATION 
model has been proposed.
User Authentication : Graphical Password 
Use graphics (images) instead of alphanumerical 
passwords 
Why? 
 A picture is worth a thousand words 
Humans remember pictures better than words 
More resistant to brute-force attacks (search space is 
practically infinite).
REGISTRATION TASK 
USER TASK: 
U S E R N A M E 
NEW USER REGISTER 
DATABASE 
Click on 
NEW USER 
REGISTER button 
Enter the username in the 
username field 
Verifies the 
username and 
store into the 
database
REGISTRATION TASK 
PASSWORD CREATION 
Browse 
the 
image 
Selected 
image 
DATABA 
SE
LOGIN PHASE 
PASSWORD VERIFICATION 
Registered 
image will 
generated 
image 
Verify 
in 
DATAB 
ASE
Example 
MOM 
LI
Two Approaches 
Recognition based Recall based 
A user is presented 
with the set of images 
and the user passes the 
authentication by 
recognizing and 
identifying the images 
he selected during 
registration stage. 
A user is asked to 
reproduce something 
that user has created or 
selected earlier during 
registration phase
FLOWCHART 
Start 
Upload one image as per 
choice 
Select POI(point of interest),POI is described as 
circle with center and radius 
A word or phrase can be associated with thePOI 
Selecting 
POI 
Enforce order Donot enforce order 
Stop
Advantages 
Easy to remember and hard to guess for 
others. 
Here the security of the system is very 
high. 
Provide a way of making more human-friendly 
passwords . 
 Dictionary attacks are infeasible.
Existing system 
 In existing system, passwords are mostly of 
text oriented. 
 Larger memory space. 
 Some are prone to shoulder surfing attack.
Proposed system 
In proposed system, author uses a multi-factor 
graphical password system. 
During password creation, there is a 
image associated with text
IMPLEMENTATION MODEL 
START 
Upload one image 
as per choice 
Select POI(point of interest),POI is described as 
square 
with center and radius 
Enforce order 
STOP
REGISTRATION TASK 
USER TASK: 
U S E R N A M E 
NEW USER REGISTER 
DATABASE 
Click on 
NEW USER 
REGISTER button 
Enter the username in the 
username field 
Verifies the 
username and 
store into the 
database
REGISTRATION TASK 
PASSWORD CREATION 
Browse 
the 
image 
Selected 
image 
DATABA 
SE
LOGIN PHASE 
PASSWORD VERIFICATION 
Registered 
image will 
generated 
image 
Verify 
in 
DATAB 
ASE
Conclusion 
Search space (system parameters): 
-picture 
-POIs (number and order) 
-words associated with POIs 
Together, the above parameters define a 
very large password space (infinite) 
Multi-factor authentication (graphical, text, 
POI-order, POI-number)in a friendly 
intuitive system
REFERENCES 
A Graphical Password Authentication System 
- Ahmad Almulhem : Computer Engineering Department 
 Graphical Passwords: A Concept Survey 
- Ibrahim Bumin KARA 
William Stallings and Lawrie Brown. Computer Security 
- Principle and Practices. 
Daniel V. Klein. Foiling the Cracker: 
- A Survey of and Improvements to, Password Security.
THANK YOU

More Related Content

PPT
Graphical password authentication
PPT
graphical password authentication
PPTX
Graphical password authentication system ppts
PPTX
Graphical password authentication
PPT
Graphical Password Authentication
PPTX
Graphical Password Authentication
PPTX
Graphical password authentication system with association of sound
PPTX
Graphical User Authentication
Graphical password authentication
graphical password authentication
Graphical password authentication system ppts
Graphical password authentication
Graphical Password Authentication
Graphical Password Authentication
Graphical password authentication system with association of sound
Graphical User Authentication

What's hot (20)

PPT
Graphical password authentication
PPTX
Graphical Password Authentication
PPTX
Graphical password authentication
PDF
Graphical Password Authenticationimp.docx2
PDF
3d password - Report
PPTX
Image Based Password Authentication for Illiterate using Touch screen by Deep...
PPT
Graphical password
PPT
3D-Password: A More Secure Authentication
PPT
Graphical password
PPTX
Graphical password authentication
DOCX
Project synopsis on face recognition in e attendance
PPTX
3D-Password
PPTX
Attendance Management System using Face Recognition
PPTX
Graphical password ppt
PPTX
Three Level Security System Using Image Based Aunthentication
RTF
Graphical password minor report
PPTX
3D PASSWORD
PPTX
Smart Voting System with Face Recognition
PPTX
3D Password
PPT
Browser Security
Graphical password authentication
Graphical Password Authentication
Graphical password authentication
Graphical Password Authenticationimp.docx2
3d password - Report
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Graphical password
3D-Password: A More Secure Authentication
Graphical password
Graphical password authentication
Project synopsis on face recognition in e attendance
3D-Password
Attendance Management System using Face Recognition
Graphical password ppt
Three Level Security System Using Image Based Aunthentication
Graphical password minor report
3D PASSWORD
Smart Voting System with Face Recognition
3D Password
Browser Security
Ad

Viewers also liked (14)

PPTX
Ppt for graphical password authentication using cued click points
PPT
11aman
PPTX
Graphical password authentication system ppts
PPTX
Image based authentication
PPT
Image Based Authentication System
DOCX
Vshantaram
PDF
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
PPTX
Graphical password
PPTX
Comprehensive study of the usability features of the Graphical Password
PPSX
Shoulder surfing resistant graphical and image based login system
PPT
Graphical Password authentication using Hmac
PPTX
Quiery builder
PPTX
Authentication scheme for session password using Images and color
PPTX
Captcha as graphical password
Ppt for graphical password authentication using cued click points
11aman
Graphical password authentication system ppts
Image based authentication
Image Based Authentication System
Vshantaram
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Graphical password
Comprehensive study of the usability features of the Graphical Password
Shoulder surfing resistant graphical and image based login system
Graphical Password authentication using Hmac
Quiery builder
Authentication scheme for session password using Images and color
Captcha as graphical password
Ad

Similar to Graphical Password Authentication (20)

PDF
A graphical password authentication system (ieee 2011) 1
PDF
Technical.pdf
PPTX
finale.ppt.pptx
PPTX
Review 1 (1) (1).pptx
PDF
Generic Authentication System
PPTX
Pptforpicturepasswordauthentication 130125073736-phpapp02
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PPTX
graphicalpswrdauth-130518230955-phpapp02.pptx
PPTX
Data security with Images through clickpoints
DOCX
Engineering Project of Venkata Krishna
PDF
graphicalpswrdauth-130518230955-phpapp02.pdf
PPTX
Nilesh
PPTX
Graphical authentication system.pptx
PPTX
Data hiding in graphical password authentication using combination
PDF
Graphical Password Authentication using Images Sequence
PDF
Graphical Password Authentication
PPT
Graphicalpasswordauthentication 130907104619-
PDF
Ce36484489
PDF
Graphical Password Authentication using Image Segmentation
DOCX
GRAPHICAL PASSWORD SUFFLELING 2222222222
A graphical password authentication system (ieee 2011) 1
Technical.pdf
finale.ppt.pptx
Review 1 (1) (1).pptx
Generic Authentication System
Pptforpicturepasswordauthentication 130125073736-phpapp02
IRJET- Graphical user Authentication for an Alphanumeric OTP
graphicalpswrdauth-130518230955-phpapp02.pptx
Data security with Images through clickpoints
Engineering Project of Venkata Krishna
graphicalpswrdauth-130518230955-phpapp02.pdf
Nilesh
Graphical authentication system.pptx
Data hiding in graphical password authentication using combination
Graphical Password Authentication using Images Sequence
Graphical Password Authentication
Graphicalpasswordauthentication 130907104619-
Ce36484489
Graphical Password Authentication using Image Segmentation
GRAPHICAL PASSWORD SUFFLELING 2222222222

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PDF
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
TR - Agricultural Crops Production NC III.pdf
Basic Mud Logging Guide for educational purpose
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Final Presentation General Medicine 03-08-2024.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Supply Chain Operations Speaking Notes -ICLT Program
Complications of Minimal Access Surgery at WLH
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
Computing-Curriculum for Schools in Ghana

Graphical Password Authentication

  • 1. Graphical Password Authentication PRESENTED BY: DHVANI SHAH
  • 2. OUTLINE Summary: 1.Introduction -Password -Authentication -Methods of Authentication 2. Text-based password -Drawbacks of text-based passwords 3.Problem Definition 4.Graphical Password 5.Existing Model 6.Proposed Model 7.Conclusion
  • 4. PASSWORD PASSWORD is a secret word or string of characters that is used for user authentication to prove his/her identity and going to access resources Used for? Logging into accounts Retrieving emails Accessing applications Used In?  Networks.  Websites  Databases
  • 5. What is AUTHENTICATION? Conformation of a person’s identity
  • 6. Methods for authentication Token-based Biometric-based Knowledge-based Key cards, smart cards Face recognition, finger print Text-based, image-based
  • 8. Drawbacks 1) Difficulty of remembering passwords Easy to remember : easy to guess Hard to guess : hard to remember 2)Users tend to write the passwords down or use the same passwords by different accounts
  • 9. Drawbacks 3)Brute force attack 4) Dictionary attack
  • 10. PROBLEM DEFINITION Alpha-numeric passwords have various disadvantages and to overcome this disadvantages GRAPHICAL PASSWORD AUTHENTICATION model has been proposed.
  • 11. User Authentication : Graphical Password Use graphics (images) instead of alphanumerical passwords Why?  A picture is worth a thousand words Humans remember pictures better than words More resistant to brute-force attacks (search space is practically infinite).
  • 12. REGISTRATION TASK USER TASK: U S E R N A M E NEW USER REGISTER DATABASE Click on NEW USER REGISTER button Enter the username in the username field Verifies the username and store into the database
  • 13. REGISTRATION TASK PASSWORD CREATION Browse the image Selected image DATABA SE
  • 14. LOGIN PHASE PASSWORD VERIFICATION Registered image will generated image Verify in DATAB ASE
  • 16. Two Approaches Recognition based Recall based A user is presented with the set of images and the user passes the authentication by recognizing and identifying the images he selected during registration stage. A user is asked to reproduce something that user has created or selected earlier during registration phase
  • 17. FLOWCHART Start Upload one image as per choice Select POI(point of interest),POI is described as circle with center and radius A word or phrase can be associated with thePOI Selecting POI Enforce order Donot enforce order Stop
  • 18. Advantages Easy to remember and hard to guess for others. Here the security of the system is very high. Provide a way of making more human-friendly passwords .  Dictionary attacks are infeasible.
  • 19. Existing system  In existing system, passwords are mostly of text oriented.  Larger memory space.  Some are prone to shoulder surfing attack.
  • 20. Proposed system In proposed system, author uses a multi-factor graphical password system. During password creation, there is a image associated with text
  • 21. IMPLEMENTATION MODEL START Upload one image as per choice Select POI(point of interest),POI is described as square with center and radius Enforce order STOP
  • 22. REGISTRATION TASK USER TASK: U S E R N A M E NEW USER REGISTER DATABASE Click on NEW USER REGISTER button Enter the username in the username field Verifies the username and store into the database
  • 23. REGISTRATION TASK PASSWORD CREATION Browse the image Selected image DATABA SE
  • 24. LOGIN PHASE PASSWORD VERIFICATION Registered image will generated image Verify in DATAB ASE
  • 25. Conclusion Search space (system parameters): -picture -POIs (number and order) -words associated with POIs Together, the above parameters define a very large password space (infinite) Multi-factor authentication (graphical, text, POI-order, POI-number)in a friendly intuitive system
  • 26. REFERENCES A Graphical Password Authentication System - Ahmad Almulhem : Computer Engineering Department  Graphical Passwords: A Concept Survey - Ibrahim Bumin KARA William Stallings and Lawrie Brown. Computer Security - Principle and Practices. Daniel V. Klein. Foiling the Cracker: - A Survey of and Improvements to, Password Security.