GRAPHICAL PASSWORD AUTHENTICATION. PRESENTED BY SUDEEP KUMAR PATRA REGD NO-0901223488. Under the guidance of Mrs. Chinmayee Behera. CONTENTS. WHAT IS PASSWORD? OVERVIEW OF AUTHENTICATION METHOD. WHAT IS GRAPHICAL PASSWORD? THE SURVEY.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
GRAPHICAL PASSWORD AUTHENTICATION
SUDEEP KUMAR PATRA
Under the guidance of
Mrs. Chinmayee Behera
(1) Easy to remember and
(2) Hard to guess.
Many people tend to ignore the second requirement which lead to weak passwords. Many solutions have been proposed. Graphical password is one of the solutions.
is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA).
System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects.
password space: N!/K! (N-K)!
( N-total number of picture objects
K-number of pre-registered objects)
User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence.
Password Space: N^K
( N -the number of pixels or smallest
units of a picture, K - the number of
Point to be clicked on )
Commonly used guidelines for alpha-numeric passwords are:
The user chose these regions when he or she created the password. The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.
It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.
Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
(1) TRIANGLE SCHEME
(2) MOVABLE FRAME SCHEME