Ppt for graphical password authentication using cued click points

Post on 14-Jan-2015

24340 Views

Category:

Education

6 Downloads

Preview:

Click to see full reader

DESCRIPTION

this ppt will give you more information abt. graphical password authentication using cued click points. email id: harikrishnan89@yahoo.co.in download and edit it..the upload had some problem with fonts.

Transcript

AUTHENT ICAT ION

USING CUED CLICK

POINTS

PICTURE PASSWORD

PRESENTED BY:

HARIKRISHNAN NAIR

PICTURE PASSWORD AUTHENTICATION

RECOGINITION BASED

TECHNIQUES

RECALL BASED TECHNIQUES

The two most commonly used techniques in picture password authentication

RECOGNITION BASED TECHNIQUESA user is presented with a set of images and the user passes

the authentication by recognizing and identifying the images

he selected during the registration stage

RECALL BASED TECHNIQUES

A user is asked to reproduce something that he created

or selected earlier during the registration stage

THIS PROJECT IS BASED ON RECALL BASED

TECHNIQUE.

RECOGNITION AND RECALL

Picture Password Authentication

U s i n g c u e d c l i c k p o i n t sM

OD

ULE

S USER REGISTRATION PROCESS

PICTURE SELECTION PROCESS

SYSTEM LOGIN PROCESS

FINAL REGISTRATION

PROCESS

MODULE 1

USER REGISTRATION PROCESS

NEW USER REGISTER

User Registration Process

DATABASE

U S E R N A M E

New user registration process.

Enter the username in the username field

Click on NEW USER REGISTER button

Verifies the username and store into the database

//EXAMPLE:

r o c k y

MODULE 2

PICTURE SELECTION PROCESS

Creating the Picture Password

How to Select picture’s?

User Defined Picture’s

System Defined Picture’s

There are two ways for selecting an picture for password authentication

User Defined Picture’sPicture’s are selected by the user from the hard disk or any other image supported devices.

PICTURE

Button For Selecting a Picture

Select any one of the image

System Defined Picture’sPicture’s are selected by the user from the database of the

password system

PICTURE

Button For Selecting a Picture

Select any one of the image

DATABASE

DATABASE

USER DEFINED PICTURE

SYSTEM DEFINED PICTURE

OR

THE PICTURE SELECTED FROM ONE

OF THE SYSTEM

Picture + Gridlines

User click on the point

MESSAGE BOX:

DO YOU WISH TO CONTINUE WITH THIS POINT

YES NO

DATABASE

Point and the image will be stored into database .Now the user can select another image and follows the sameSteps above.

Select another point

User with username

Click point’s as password

1st click 2nd click 3rd click 4th click 5th click …

Click point

MODULE 3

FINAL REGISTRATION PROCESS

F INAL REG ISTRAT ION PROCESS

USER REGISTRATION PROCESS + PICTURE SELECTION PROCESS

STEP1: User enters the username and click on NRB.

STEP2: Click on PICTURE button for selecting an picture for password.

STEP3: Select a point on the picture and click to next picture.

STEP4: The point on the last picture will be calculated as the last point for opening the desired system.

Note: all the points and the pictures along with the username will be stored into database

MODULE 4

SYSTEM LOGIN PROCESS

USERNAME VERIFICATION PROCESS

DATABASE

U S E R N A M E

User enters the username

Verifies the usernameUsername verification

Checks the usernamein the database

Correct username

Incorrect username

Reenter the username

If username not matched

Generates an message“ username doesn't match ““Please Reenter the username”

NOTE The user can enter the username only 5

times if the username is wrong.

If the incorrect username exists 5 times the PASSWORD SYSTEM SHUTS DOWN.

CLICK POINT VERIFICATION PROCESS

DATABASE

Database contains saved pictures and points.

Correct username

First picture stored in database during registration

Correct click pointGives the next image

Verification of click point

System gives 3 chances to The user for incorrect password

If the user exists 3 chances then the password system displays another picture which will be unrelated to the picture selected by the user during password creation

Last picture

Last picture in the database

Opens the system protected with password

FINAL STAGE

The change password can be done after logging into the main system.

The change password follow’s the same create password steps.

Advantages of picture password authentication

Graphical password schemes provide a way of making more human-friendly passwords .

Here the security of the system is very high.

Here we use a series of selectable images on successive screen pages.

Dictionary attacks are infeasible.

Password registration and log-in process take too long.

Require much more storage space than text based passwords.

SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.

Drawback's of picture password

HOW TO MAKE PICTURE PASSWORD

SYSTEM MORE SECURED?

Grid Square Size The security of this

system depends on the size of the picture

As the size of the picture increases Simultaneously the grid square Increases.

Thus, making the system highly Secured.

We can also use encryption alg. For storing the points and pictures Making system unbreakable.

Do’s and Don’ts for secured password

Do’s1. use easy to remember pictures but hard crack.

2. Avoid hotspots on the picture while selecting click point.

3. Always remember the click point and picture which will become helpful for knowledge based authentication.

4. Choose minimum 3 pictures or maximum 5 pictures for this password system.

5. As no Of pictures increases the password becomes that tight.

Don’ts 6. Do not use too much bright and black pictures for password

T H E A P P L I C A T I O N O F P I C T U R E PA S S W O R D S Y S T E M

1. HARD DISK LOCKING.

2. SYSTEM LOG IN AND LOG OUT PROCESS.

3. FOLDER LOCKING.

4. WEB LOG-IN APLLICATION

TECHNIQUE PROPOSED AND IMPLEMENTED BYBlonder , Passlogix , Wiedenbeck

AUTHENTICATION PROCESS Click on several pre- registered locations of a picture in the right sequence.

MEMORABILITYCan be hard to remember

PASSWORD SPACEN^K (N is the number of pixels or smallest units of a picture, K is the number of locations to be clicked on)

POSSIBLE ATTACK METHODSGuess, shoulder surfing

Picture passwords are an alternative to textual alphanumeric password.

It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.

By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.

By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security

Picture password is still immature, more research is required in this field.

CONCLUSION

THANK YOU

top related