SlideShare a Scribd company logo
Nimisha Goel
Rollno:9910103481
Student at JIIT-128
Computer Science
Project 2013-14
 Graphical password is an authentication system that
works by having the user select from images in specific
order, presented in a graphical user interface.
 This approach sometimes called graphical user
authentication.
Token-based
 Based on “Something you possess”. It allows user to enter the username
and password in order to obtain the token. Once the token has been
obtained user can access the resource.
 Example-Smart card, University ID.
Biometric-based
 It means life measure. This implies it is a system which recognizes human-
based one or more physical and behavioural traits.
 Example-Finger Print scan
Knowledge based
 Based on “Something you know”. It is authentication scheme in which user
is asked to answer at least one secret question.
 Example PIN(personal identification number).
Recognition based
 Identifying whether user has seen one image before.
Pure recall based
 User has to reproduce something that he or she created
or selected earlier during the registration stage.
Cued recall based
 A user is provided with a hint so that he or she can
recall his his/her password
Hybrid Systems
 Combination of two or more schemes.
 Identification
Identify the user
 Authentication
User supplies the proof of her/his identity
 Authorization
User can access the resource.
 Originated by Blonder
 User select one point per image for five images. The
interface displays only one image at a time; the image
is replaced by the next image as soon as a user selects a
click point. The system determines the next image to
display based on the user’s click-point on the current
image.
Graphical password authentication system ppts
 User select five images in sequence order and
during login phase user has to select the
selected images one by one in sequence
order from random positions of images in
grid view.
 If user selects wrong image then the selected
images will not display in the grid view. User
get to know user is going in wrong path.
 It is combination of pure recall and cued
recall system.
Graphical password authentication system ppts
 Android SDK
 Eclipse Kepler
 It is graphical password application to unlock
the folder of private or public files.
 Android is the world's most widely used
Smartphone platform.
 Steps basically same as cued click points but
there is one difference i.e. Random function
which changes the position of images in grid
view and user has to select the selected from
them.
Graphical password authentication system ppts
 Guessing Attack
 It includes Brute-force attack and dictionary
attack.
 Capture Attack
 directly obtain passwords by intercepting user-
entered data, or tricking users
 It includes Shoulder-surfing attack.
 users enter login information, an attacker may
gain knowledge about their credentials by direct
observation or external recording devices such as
video cameras.
 Many Graphical based algorithms provide better
security and usability than textual passwords.
 GPAS is more vulnerable to shoulder-surfing and
password capture attacks.
 It is hard to manage the balance between a
system which is user-oriented and also safe from
the hackers.
 Guess attack can be removed by increasing the
load of number of images on system.
 Android has captured a very good market and
used by more than 60% people. It is best to serve
the purpose of the project.
 The advantage of the approach is increasing
security by providing password of higher
security.
 The goal of GPAS is to reduce the probability of
security attacks like guessing attack as well as
encouraging users to select more random, and
difficult password to guess.
 It also increases the workload for the attackers
and system’s flexibility to increase the number of
images by selecting them at random that allows
arbitrarily increases this workload.
 It is effective to reduce the effect of hotspots
analysis.

More Related Content

PPT
graphical password authentication
PPTX
Graphical password authentication
PPTX
Graphical User Authentication
PPT
Graphical Password Authentication
PPTX
Graphical Password Authentication
PPT
Graphical password
PPT
Graphical password authentication
PPTX
Graphical Password Authentication
graphical password authentication
Graphical password authentication
Graphical User Authentication
Graphical Password Authentication
Graphical Password Authentication
Graphical password
Graphical password authentication
Graphical Password Authentication

What's hot (20)

PPTX
Graphical password authentication
PPT
Graphical password
PPT
Graphical password authentication
PPTX
Graphical password authentication
PPTX
Graphical Password Authentication
PPT
3D-Password: A More Secure Authentication
PPTX
Three Level Security System Using Image Based Aunthentication
PPTX
Graphical Password Authentication ppt.pptx
PPTX
3D Password and its importance
PPTX
Graphical password authentication system with association of sound
PPT
3D Password Presentation
PPTX
Image based authentication
PPTX
Face recognition
PPTX
Authentication scheme for session password using Images and color
PPTX
Biometric Security Systems ppt
PDF
PPTX
Face Recognition
PDF
3D Password PPT
PPT
Face recognition ppt
PPT
Biometric encryption
Graphical password authentication
Graphical password
Graphical password authentication
Graphical password authentication
Graphical Password Authentication
3D-Password: A More Secure Authentication
Three Level Security System Using Image Based Aunthentication
Graphical Password Authentication ppt.pptx
3D Password and its importance
Graphical password authentication system with association of sound
3D Password Presentation
Image based authentication
Face recognition
Authentication scheme for session password using Images and color
Biometric Security Systems ppt
Face Recognition
3D Password PPT
Face recognition ppt
Biometric encryption
Ad

Similar to Graphical password authentication system ppts (20)

PPTX
Comprehensive study of the usability features of the Graphical Password
PDF
Multiple grid based graphical text password authentication
PDF
Sudhanshu Raman
PDF
Technical.pdf
PPTX
graphicalpswrdauth-130518230955-phpapp02.pptx
PDF
Ai4506179185
PPTX
Pptforpicturepasswordauthentication 130125073736-phpapp02
PDF
Graphical password based hybrid authentication system for smart hand held dev...
PDF
11.graphical password based hybrid authentication system for smart hand held ...
PPT
Graphicalpasswordauthentication 130907104619-
PPTX
Nilesh
PDF
Generic Authentication System
DOCX
Shoulder surfing resistant graphical
DOCX
Vshantaram
DOCX
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PDF
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
PDF
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PPTX
Data hiding in graphical password authentication using combination
PPTX
Graphical authentication system.pptx
Comprehensive study of the usability features of the Graphical Password
Multiple grid based graphical text password authentication
Sudhanshu Raman
Technical.pdf
graphicalpswrdauth-130518230955-phpapp02.pptx
Ai4506179185
Pptforpicturepasswordauthentication 130125073736-phpapp02
Graphical password based hybrid authentication system for smart hand held dev...
11.graphical password based hybrid authentication system for smart hand held ...
Graphicalpasswordauthentication 130907104619-
Nilesh
Generic Authentication System
Shoulder surfing resistant graphical
Vshantaram
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Count based hybrid graphical password to prevent brute force attack and shoul...
Data hiding in graphical password authentication using combination
Graphical authentication system.pptx
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Graphical password authentication system ppts

  • 1. Nimisha Goel Rollno:9910103481 Student at JIIT-128 Computer Science Project 2013-14
  • 2.  Graphical password is an authentication system that works by having the user select from images in specific order, presented in a graphical user interface.  This approach sometimes called graphical user authentication.
  • 3. Token-based  Based on “Something you possess”. It allows user to enter the username and password in order to obtain the token. Once the token has been obtained user can access the resource.  Example-Smart card, University ID. Biometric-based  It means life measure. This implies it is a system which recognizes human- based one or more physical and behavioural traits.  Example-Finger Print scan Knowledge based  Based on “Something you know”. It is authentication scheme in which user is asked to answer at least one secret question.  Example PIN(personal identification number).
  • 4. Recognition based  Identifying whether user has seen one image before. Pure recall based  User has to reproduce something that he or she created or selected earlier during the registration stage. Cued recall based  A user is provided with a hint so that he or she can recall his his/her password Hybrid Systems  Combination of two or more schemes.
  • 5.  Identification Identify the user  Authentication User supplies the proof of her/his identity  Authorization User can access the resource.
  • 6.  Originated by Blonder  User select one point per image for five images. The interface displays only one image at a time; the image is replaced by the next image as soon as a user selects a click point. The system determines the next image to display based on the user’s click-point on the current image.
  • 8.  User select five images in sequence order and during login phase user has to select the selected images one by one in sequence order from random positions of images in grid view.  If user selects wrong image then the selected images will not display in the grid view. User get to know user is going in wrong path.  It is combination of pure recall and cued recall system.
  • 10.  Android SDK  Eclipse Kepler
  • 11.  It is graphical password application to unlock the folder of private or public files.  Android is the world's most widely used Smartphone platform.  Steps basically same as cued click points but there is one difference i.e. Random function which changes the position of images in grid view and user has to select the selected from them.
  • 13.  Guessing Attack  It includes Brute-force attack and dictionary attack.  Capture Attack  directly obtain passwords by intercepting user- entered data, or tricking users  It includes Shoulder-surfing attack.  users enter login information, an attacker may gain knowledge about their credentials by direct observation or external recording devices such as video cameras.
  • 14.  Many Graphical based algorithms provide better security and usability than textual passwords.  GPAS is more vulnerable to shoulder-surfing and password capture attacks.  It is hard to manage the balance between a system which is user-oriented and also safe from the hackers.  Guess attack can be removed by increasing the load of number of images on system.  Android has captured a very good market and used by more than 60% people. It is best to serve the purpose of the project.
  • 15.  The advantage of the approach is increasing security by providing password of higher security.  The goal of GPAS is to reduce the probability of security attacks like guessing attack as well as encouraging users to select more random, and difficult password to guess.  It also increases the workload for the attackers and system’s flexibility to increase the number of images by selecting them at random that allows arbitrarily increases this workload.  It is effective to reduce the effect of hotspots analysis.