Graphical password authentication system with association of sound
Ppt for graphical password authentication using cued click points
-
Upload
hari-krishnan -
Category
Education
-
view
24.356 -
download
6
description
Transcript of Ppt for graphical password authentication using cued click points
AUTHENT ICAT ION
USING CUED CLICK
POINTS
PICTURE PASSWORD
PRESENTED BY:
HARIKRISHNAN NAIR
PICTURE PASSWORD AUTHENTICATION
RECOGINITION BASED
TECHNIQUES
RECALL BASED TECHNIQUES
The two most commonly used techniques in picture password authentication
RECOGNITION BASED TECHNIQUESA user is presented with a set of images and the user passes
the authentication by recognizing and identifying the images
he selected during the registration stage
RECALL BASED TECHNIQUES
A user is asked to reproduce something that he created
or selected earlier during the registration stage
THIS PROJECT IS BASED ON RECALL BASED
TECHNIQUE.
RECOGNITION AND RECALL
Picture Password Authentication
U s i n g c u e d c l i c k p o i n t sM
OD
ULE
S USER REGISTRATION PROCESS
PICTURE SELECTION PROCESS
SYSTEM LOGIN PROCESS
FINAL REGISTRATION
PROCESS
MODULE 1
USER REGISTRATION PROCESS
NEW USER REGISTER
User Registration Process
DATABASE
U S E R N A M E
New user registration process.
Enter the username in the username field
Click on NEW USER REGISTER button
Verifies the username and store into the database
//EXAMPLE:
r o c k y
MODULE 2
PICTURE SELECTION PROCESS
Creating the Picture Password
How to Select picture’s?
User Defined Picture’s
System Defined Picture’s
There are two ways for selecting an picture for password authentication
User Defined Picture’sPicture’s are selected by the user from the hard disk or any other image supported devices.
PICTURE
Button For Selecting a Picture
Select any one of the image
System Defined Picture’sPicture’s are selected by the user from the database of the
password system
PICTURE
Button For Selecting a Picture
Select any one of the image
DATABASE
DATABASE
USER DEFINED PICTURE
SYSTEM DEFINED PICTURE
OR
THE PICTURE SELECTED FROM ONE
OF THE SYSTEM
Picture + Gridlines
User click on the point
MESSAGE BOX:
DO YOU WISH TO CONTINUE WITH THIS POINT
YES NO
DATABASE
Point and the image will be stored into database .Now the user can select another image and follows the sameSteps above.
Select another point
User with username
Click point’s as password
1st click 2nd click 3rd click 4th click 5th click …
Click point
MODULE 3
FINAL REGISTRATION PROCESS
F INAL REG ISTRAT ION PROCESS
USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS
STEP1: User enters the username and click on NRB.
STEP2: Click on PICTURE button for selecting an picture for password.
STEP3: Select a point on the picture and click to next picture.
STEP4: The point on the last picture will be calculated as the last point for opening the desired system.
Note: all the points and the pictures along with the username will be stored into database
MODULE 4
SYSTEM LOGIN PROCESS
USERNAME VERIFICATION PROCESS
DATABASE
U S E R N A M E
User enters the username
Verifies the usernameUsername verification
Checks the usernamein the database
Correct username
Incorrect username
Reenter the username
If username not matched
Generates an message“ username doesn't match ““Please Reenter the username”
NOTE The user can enter the username only 5
times if the username is wrong.
If the incorrect username exists 5 times the PASSWORD SYSTEM SHUTS DOWN.
CLICK POINT VERIFICATION PROCESS
DATABASE
Database contains saved pictures and points.
Correct username
First picture stored in database during registration
Correct click pointGives the next image
Verification of click point
System gives 3 chances to The user for incorrect password
If the user exists 3 chances then the password system displays another picture which will be unrelated to the picture selected by the user during password creation
Last picture
Last picture in the database
Opens the system protected with password
FINAL STAGE
The change password can be done after logging into the main system.
The change password follow’s the same create password steps.
Advantages of picture password authentication
Graphical password schemes provide a way of making more human-friendly passwords .
Here the security of the system is very high.
Here we use a series of selectable images on successive screen pages.
Dictionary attacks are infeasible.
Password registration and log-in process take too long.
Require much more storage space than text based passwords.
SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
Drawback's of picture password
HOW TO MAKE PICTURE PASSWORD
SYSTEM MORE SECURED?
Grid Square Size The security of this
system depends on the size of the picture
As the size of the picture increases Simultaneously the grid square Increases.
Thus, making the system highly Secured.
We can also use encryption alg. For storing the points and pictures Making system unbreakable.
Do’s and Don’ts for secured password
Do’s1. use easy to remember pictures but hard crack.
2. Avoid hotspots on the picture while selecting click point.
3. Always remember the click point and picture which will become helpful for knowledge based authentication.
4. Choose minimum 3 pictures or maximum 5 pictures for this password system.
5. As no Of pictures increases the password becomes that tight.
Don’ts 6. Do not use too much bright and black pictures for password
T H E A P P L I C A T I O N O F P I C T U R E PA S S W O R D S Y S T E M
1. HARD DISK LOCKING.
2. SYSTEM LOG IN AND LOG OUT PROCESS.
3. FOLDER LOCKING.
4. WEB LOG-IN APLLICATION
TECHNIQUE PROPOSED AND IMPLEMENTED BYBlonder , Passlogix , Wiedenbeck
AUTHENTICATION PROCESS Click on several pre- registered locations of a picture in the right sequence.
MEMORABILITYCan be hard to remember
PASSWORD SPACEN^K (N is the number of pixels or smallest units of a picture, K is the number of locations to be clicked on)
POSSIBLE ATTACK METHODSGuess, shoulder surfing
Picture passwords are an alternative to textual alphanumeric password.
It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.
By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.
By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security
Picture password is still immature, more research is required in this field.
CONCLUSION
THANK YOU