SlideShare a Scribd company logo
1
1. Password 
2. Over view of authentication methods 
3) Graphical passwords 
3.1) recognition based technique. 
3.2) Recall based technique- 
○ Pass points 
○ cued click point(CCP) 
○ persuasive cued click point(PCCP) 
○Improved PCCP (IPCCP) 
○Comparison between IPCCP and PCCP 
2
Most commonly used form of user authentication. 
It is used to prove identity or access approval to gain 
access to a resource. 
Two conflicting requirements of alphanumeric 
passwords- 
1)Easy to remember 
2) hard to guess 
Many people tend to ignore second requirement, 
which lead to weak passwords. So many solutions 
have been proposed one of them is graphical 
passwords. 
3
1) Token Based Authentication : 
Example : Smart cards , Key cards , ATM 
2) Biomatrics: 
Example: Finger print, Iris scan ,face recognition 
3) Knowledge based authentication: 
Example: picture based passwords , most widely used 
authentication techniques. 
. 
4
5 
Two most commonly used techniques in 
picture passwords :
1) Recognition Based Technique: 
A user is presented with a set of images ,for authentication he 
recognize and identify the images he selected during the 
registration stage. 
2) Recall Based Technique: 
User is asked to reproduce something that he created or selected 
earlier during registration. 
6
1) Pass points: user click on any place on the image to create 
password. In order to be authenticated user must click with in 
the tolerances in correct sequence. 
Password space: N^K 
N= the number of pixels, 
K= number of points to be 
clicked on 
7
8 
Click 
Point 
Values 
X-Cordinat 
es 
Y-Cordinat 
es 
a 2 3 
b 3 2 
c 5 9 
d 6 8 
e 9 6
Disadvantage: hotspot problem different users tend to select 
similar click points as a part of their passwords. Attackers who 
yield the knowledge of these hotspots through harvesting can 
build attack dictionaries. 
2) Cued click point(CCP): It is designed to reduce hotspot 
problem, rather than five click points on a single image it takes 
five click points on five different images. 
user can select their images only to extent that their click point 
determines the next image, as it consist of different images, so 
it prevent guessing attacks. 
remembering the order of click points is no longer the 
requirement of user . 
9
10 
Picture authentication using cued click points: 
modules 
User 
registration 
process 
Picture 
selection 
process 
System login 
process
11
12
13
14 
There are two ways for selecting pictures as a password:
15
16
17
Disadvantage: Although pattern based attack seems to be 
ineffective but hotspot problem remained same. 
18 
3)Persuasive technology : technology to motivate and 
impact people to behave in a desired manner.
3.1)Persuasive Cued Click Point(PCCP): 
● persuasive technology is added to CCP . 
● It encourage users to select more secure passwords. 
● here images are slightly shaded except for a viewport. 
● when users created a password, the images were slightly 
shaded except for a randomly positioned viewport. The 
viewport is positioned randomly rather than specifically to 
avoid known hotspots. 
Disadvantage: shoulder surfing problem: watching over 
people’s shoulder as they process information. E.g.. 
Observing keyboard as person typing password like ATM 
password. 19
3.2)Improved Persuasive Cued Click Point(IPCCP): 
It reduce both hotspot problem and shoulder surfing 
problem. 
Processing: 
●By using x-y coordinates it divide image into blocks. 
●Merge the blocks, after merging blur the complete 
image. 
●Activate only one block to set click points during 
registration. 
20
● User create the ID and allocate the set of images to 
select password. 
● It use double click method ,as in first click it take empty 
values ,and in second click it take the values. 
● Double click method is used to prevent shoulder surfing 
problem, as most of the attackers focuses on single click 
method. 
21
1) USABILITY : measured by success rate and password generation time. 
1.1) success rate : Login times for both IPCCP and PCCP 
Successful user 
password creation 
Successful user login 
IPCCP 38/40 (95%) 35/40 (87.5%) 
PCCP 36/40 (90%) 34/40 (85%) 
96 
94 
92 
90 
88 
86 
84 
82 
80 
IPCCP PCCP 
successful user password 
creation 
successful user login 
22
23
24

More Related Content

PPT
Graphical password authentication
PPTX
Graphical password authentication system ppts
PPT
graphical password authentication
PPTX
Graphical password authentication
PPTX
Graphical Password Authentication
PPTX
Graphical Password Authentication
PPT
3D-Password: A More Secure Authentication
PPTX
Graphical User Authentication
Graphical password authentication
Graphical password authentication system ppts
graphical password authentication
Graphical password authentication
Graphical Password Authentication
Graphical Password Authentication
3D-Password: A More Secure Authentication
Graphical User Authentication

What's hot (20)

PPT
Graphical password authentication
PPT
Graphical Password Authentication
PPTX
Three Level Security System Using Image Based Aunthentication
PPTX
Graphical password authentication system with association of sound
PDF
A graphical password authentication system (ieee 2011) 1
PPT
Graphical password
PPT
Graphical password
PPTX
Password Cracking
PDF
Graphical Password Authenticationimp.docx2
PPTX
Graphical Password Authentication
PPTX
3D Password and its importance
PPTX
User authentication
 
PPT
Biometric encryption
PPTX
Password craking techniques
PDF
PDF
3D Password PPT
PPTX
Biometrics security
PDF
3d password - Report
PPTX
Digitalwatermarking
RTF
Graphical password minor report
Graphical password authentication
Graphical Password Authentication
Three Level Security System Using Image Based Aunthentication
Graphical password authentication system with association of sound
A graphical password authentication system (ieee 2011) 1
Graphical password
Graphical password
Password Cracking
Graphical Password Authenticationimp.docx2
Graphical Password Authentication
3D Password and its importance
User authentication
 
Biometric encryption
Password craking techniques
3D Password PPT
Biometrics security
3d password - Report
Digitalwatermarking
Graphical password minor report
Ad

Viewers also liked (16)

PPTX
Graphical password authentication
PPTX
Ppt for graphical password authentication using cued click points
PPTX
Authentication scheme for session password using Images and color
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PPTX
Graphical password ppt
PPSX
Shoulder surfing resistant graphical and image based login system
PPTX
Graphical password authentication system ppts
PDF
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
PPTX
Graphical Based Authentication (S3PAS)
PPTX
Slideshare ppt
PPTX
Graphical Based Authentication (S3PAS)
PPT
Graphical Password authentication using Hmac
PPT
11aman
PPTX
Shoulder Surfing as future technology
PPTX
Screenless displays ppt
PDF
A Graphical Password Scheme using Persuasive Cued Click Points
Graphical password authentication
Ppt for graphical password authentication using cued click points
Authentication scheme for session password using Images and color
Authentication Scheme for Session Password using matrix Colour and Text
Graphical password ppt
Shoulder surfing resistant graphical and image based login system
Graphical password authentication system ppts
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
Graphical Based Authentication (S3PAS)
Slideshare ppt
Graphical Based Authentication (S3PAS)
Graphical Password authentication using Hmac
11aman
Shoulder Surfing as future technology
Screenless displays ppt
A Graphical Password Scheme using Persuasive Cued Click Points
Ad

Similar to Graphical password authentication (20)

PDF
An Effective Authentication Method using Improved Persuasive Cued Click Points
PDF
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
PDF
Research ppr
PDF
Defence against large scale online guessing attacks using persuasive cued cli...
PDF
Persuasive Cued Click Point Password with OTP
PDF
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
PDF
Graphical password authentication using pccp with sound signature
PPT
Defenses against large scale online password guessing attacks
PPTX
Cued Click Point Authentication
PDF
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
PDF
A novel multifactor authentication system ensuring usability and security
PPTX
Securing online password guessing attack
DOCX
Engineering Project of Venkata Krishna
PDF
Ai4506179185
PDF
Cued click point image based kerberos authentication protocol
PDF
CARP: AN IMAGE BASED SECURITY USING I-PAS
PDF
Psdot 2 design and implementation of persuasive cued click-points and evalua...
PDF
Generic Authentication System
PDF
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Effective Authentication Method using Improved Persuasive Cued Click Points
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Research ppr
Defence against large scale online guessing attacks using persuasive cued cli...
Persuasive Cued Click Point Password with OTP
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
Graphical password authentication using pccp with sound signature
Defenses against large scale online password guessing attacks
Cued Click Point Authentication
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
A novel multifactor authentication system ensuring usability and security
Securing online password guessing attack
Engineering Project of Venkata Krishna
Ai4506179185
Cued click point image based kerberos authentication protocol
CARP: AN IMAGE BASED SECURITY USING I-PAS
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Generic Authentication System
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
An Overview on Authentication Approaches and Their Usability in Conjunction w...

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Advanced methodologies resolving dimensionality complications for autism neur...

Graphical password authentication

  • 1. 1
  • 2. 1. Password 2. Over view of authentication methods 3) Graphical passwords 3.1) recognition based technique. 3.2) Recall based technique- ○ Pass points ○ cued click point(CCP) ○ persuasive cued click point(PCCP) ○Improved PCCP (IPCCP) ○Comparison between IPCCP and PCCP 2
  • 3. Most commonly used form of user authentication. It is used to prove identity or access approval to gain access to a resource. Two conflicting requirements of alphanumeric passwords- 1)Easy to remember 2) hard to guess Many people tend to ignore second requirement, which lead to weak passwords. So many solutions have been proposed one of them is graphical passwords. 3
  • 4. 1) Token Based Authentication : Example : Smart cards , Key cards , ATM 2) Biomatrics: Example: Finger print, Iris scan ,face recognition 3) Knowledge based authentication: Example: picture based passwords , most widely used authentication techniques. . 4
  • 5. 5 Two most commonly used techniques in picture passwords :
  • 6. 1) Recognition Based Technique: A user is presented with a set of images ,for authentication he recognize and identify the images he selected during the registration stage. 2) Recall Based Technique: User is asked to reproduce something that he created or selected earlier during registration. 6
  • 7. 1) Pass points: user click on any place on the image to create password. In order to be authenticated user must click with in the tolerances in correct sequence. Password space: N^K N= the number of pixels, K= number of points to be clicked on 7
  • 8. 8 Click Point Values X-Cordinat es Y-Cordinat es a 2 3 b 3 2 c 5 9 d 6 8 e 9 6
  • 9. Disadvantage: hotspot problem different users tend to select similar click points as a part of their passwords. Attackers who yield the knowledge of these hotspots through harvesting can build attack dictionaries. 2) Cued click point(CCP): It is designed to reduce hotspot problem, rather than five click points on a single image it takes five click points on five different images. user can select their images only to extent that their click point determines the next image, as it consist of different images, so it prevent guessing attacks. remembering the order of click points is no longer the requirement of user . 9
  • 10. 10 Picture authentication using cued click points: modules User registration process Picture selection process System login process
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14 There are two ways for selecting pictures as a password:
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. Disadvantage: Although pattern based attack seems to be ineffective but hotspot problem remained same. 18 3)Persuasive technology : technology to motivate and impact people to behave in a desired manner.
  • 19. 3.1)Persuasive Cued Click Point(PCCP): ● persuasive technology is added to CCP . ● It encourage users to select more secure passwords. ● here images are slightly shaded except for a viewport. ● when users created a password, the images were slightly shaded except for a randomly positioned viewport. The viewport is positioned randomly rather than specifically to avoid known hotspots. Disadvantage: shoulder surfing problem: watching over people’s shoulder as they process information. E.g.. Observing keyboard as person typing password like ATM password. 19
  • 20. 3.2)Improved Persuasive Cued Click Point(IPCCP): It reduce both hotspot problem and shoulder surfing problem. Processing: ●By using x-y coordinates it divide image into blocks. ●Merge the blocks, after merging blur the complete image. ●Activate only one block to set click points during registration. 20
  • 21. ● User create the ID and allocate the set of images to select password. ● It use double click method ,as in first click it take empty values ,and in second click it take the values. ● Double click method is used to prevent shoulder surfing problem, as most of the attackers focuses on single click method. 21
  • 22. 1) USABILITY : measured by success rate and password generation time. 1.1) success rate : Login times for both IPCCP and PCCP Successful user password creation Successful user login IPCCP 38/40 (95%) 35/40 (87.5%) PCCP 36/40 (90%) 34/40 (85%) 96 94 92 90 88 86 84 82 80 IPCCP PCCP successful user password creation successful user login 22
  • 23. 23
  • 24. 24