Graphical Password Authentication System
Graphical Password Authentication System
Abstract- Naturally for human mind it is hard to remember any one grid of that image, then choosing one pixel on that
text based password. Text based passwords are easy to guess selected grid and those chooses pixel set as password.
because the use of general set of numbers, character and During user name creation, the most of the image is
special symbol, for that purpose we implemented the Graphical fragmented in a small view grid area that is randomly
Password Authentication System. In that we had used Image positioned on the image as shown in Figure. Users must
based & Pair based authentication system. Firstly in Imaged
choose it‟s own a click-point within the view grid. If they
based password user can choose pixels on that image as
password. For each image only one pixel is selected. After are choose wrong pixel or to choose a wrong point in the
selection one pixel change the image select second pixel from current view grid, they may click on move button to
second image similarly users select three pixels. randomly reposition the view grid.
In pair based password, user chooses characters from This procedure repeated in three times that is three
columns and rows simultaneously from the grid then getting different images user is choose. After one pixel choosed
that intersection point as a password. We have provided then next image is come and choose second pixel and
shuffling option for interchanging character sequence it helps similarly choose third pixel on next image. If user chooses
to prevent the shoulder suffering attack. So we have improved wrong pixel then system manipulate to user i.e. wrong
security by using PCCP and Imaged based password system
image is come and user doesn‟t authenticate in system.
which having ability of protect from the attacker, crackers etc.
Index Terms—authentication, graphical passwords, The view grid‟s size is intended to offer a variety of
session passwords, usable security, studies. distinct points but still cover only an acceptably small
fraction of all possible points. Users must choose a click-
I. INTRODUCTION point within this highlighted view grid area and cannot click
outside of the view grid area, unless they click on move
The most common and popular method used for button to randomly reposition the view grid area. While
authentication is text password. The vulnerabilities of this users may move as often as desired, this significantly slows
method such eves dropping, dictionary attack, shoulder password creation. The view grid and move button appear
surfing, and burst force attacks are well known. Random and only during password creation. During later password entry,
long text passwords can make the system secure. But the the images are displayed normally, without shading or the
main problem is the hardly to remember those passwords. view grid, and users may click anywhere on the images.
Studies have shown that users enter to small or short
passwords or passwords that are easy to remember. But,
these passwords can be easily guessed or cracked by
attacker. The alternative techniques are graphical passwords.
There are many graphical password schemes that are
proposed in the few last year. But most of them suffer from
shoulder surfing problem which is become quite a major
problem. There are graphical passwords schemes that have
been proposed which are prevent to shoulder-surfing but
they have their own limitations like usability problem issue
or taking more time for user to login or having long
procedure levels.
II. BACKGROUND
Text passwords are the most popular user authentication
method in today, but have security and user friendly
problems. Graphical passwords offer another alternative,
and are the focus of this paper. Graphical password systems
are a type of Image-based authentication that attempt to
understand the human memory for visual information. A
comprehensive review In Pass Points, passwords consist of
sequence pixel click-points on a given image. Users may
choose one pixels in that image as click-points for their
password. To log in process, they repeat the sequence of
clicks in the same order,
I. PERSUASIVE CUED CLICK POINTS (PCCP)
In persuasive cued click point algorithm, image divided
Fig.1: Persuasive Cued Click-Points
in small grid or small parts of view, after that user choose
64
www.ijltemas.in
Volume III, Issue III, March 2014 IJLTEMAS ISSN 2278 - 2540
1.User Registration: User chooses user name and set of 1.User Registration: User chooses user name and pair of
image pixels as password for first time. letters as password for first time.
2.Login: At the time of login user enters same user name 2.Login: At the time of login user enters same user name
and pixel images as password which was stored in database and letters pair as password which was stored in database at
at time of registration to get log-in. time of registration to get log-in.
3.Verification: After submitting set of image pixels 3.Verification: After submitting pairs of letters choosed
choosed they are matched with database for checking they are matched with database for checking whether they
whether they are valid or not. are valid or not.
4.Confirmation:After verification is done on the basis of 4.Confirmation:After verification is done on the basis of
that it is confirmed whether to give access to user or not that it is confirmed whether to give access to user or not.
www.ijltemas.in
Volume III, Issue III, March 2014 IJLTEMAS ISSN 2278 - 2540
PCCP Algorithm Study: image and then proceed for next image for another pixel.
Graphical password systems are a type of knowledge- There are two set of images one set for correct choosen pixel
based authentication that attempt to leverage the human and another set is for wrongly choosen pixel. New password
memory for visual information. A comprehensive review of is generated by selecting different set of images with
graphical passwords is available elsewhere of interest herein different sequence.
are cued-recall click-based graphical passwords [1]. In such
systems, users identify and target previously selected PAIRED BASED
locations within one or more images. The images act as
memory cues to aid recall. Example systems include In during registration ,user can submits his password.
PassPoints and Cued Click-Points. In PassPoints, passwords We have enter maximum length of the password is 6 and it
consist of a sequence of five click-points on a given image. is called as secret password. These secret password should
Users may select any pixels in the image as click-points for contain even number of characters. These session passwords
their password [2]. To log in, they repeat the sequence of are generated based on this secret password. During login
clicks in the correct order, within a system-defined tolerance phase, when the user enters his username and the grid is
square of the original click-points. Although PassPoints is displayed. This grid is of size 6 x 6 and this grid consists of
relatively usable security weaknesses make passwords easier alphabets or character and numbers. These alphabets and
for attackers to predict. Hotspots are areas of the image that number are randomly placed on the grid and the interface
have higher likelihood of being selected by users as changes every time when one character placed. User has to
password click- points. Attackers who gain knowledge of enter the his password is depending upon the secret
these hotspots through harvesting sample passwords can password. User has to consider these secret pass in terms of
build attack dictionaries and more successfully guess pairs. These session password consists of alphabets and
PassPoints passwords. Users also tend to select their click- digits. The first character in the pair is used to select the
points in predictable patterns (e.g., straight lines), which can column and the second character is used to select the row.
also be exploited by attackers even without knowledge of The point of intersection character is part of the session
the background image; indeed, purely automated attacks password. This process is repeated for all pairs of secret
against PassPoints based on image processing techniques password.
and spatial patterns are a threat [3]. A precursor to PCCP,
Cued Click-Points (CCP) was designed to reduce patterns V. RESULT ANALYSIS:
and to reduce the Usefulness of hotspots for attackers.
Rather than their click-points on one image, CCP uses one Effort Estimate Table:
click-point on five different images shown in sequence [1]. In this the system is handed over to number user for
The next image displayed is based on the location of the demo purpose and after there usage results are obtained and
previously entered click-point creating a path through an then result analysis is done for making statement about the
image set. Users select their images only to the extent that system.
their click-point determines the next image. Creating a new
password with different click-points results in a different
image sequence.
Effort Estimate Table:
IV. TEST RESULT:
www.ijltemas.in
Volume III, Issue III, March 2014 IJLTEMAS ISSN 2278 - 2540
Phase Description:
This includes systematically distribution of working VII. ADVANTAGES
phases of the project, in this work is divided into the set of
steps for accomplishment of system. Dictionary Attack: Dictionary attack is carried out on
texual- password. In these type of attack attacker uses set of
dictionary word to crack the password. In these attacker
enters different combination of words and symbol to enter
the system. The dictionary attacks are unable to get succeed
to get authenticated.
As we are implemented dynamic passwords are used for
every login.
Shoulder Surfing: In shoulder surfing attack, attacker stood
behind the user, try to watch password from shoulder of the
user. As we are used secret mechanism at registration time,
the password remains abstract from other.
Shuffling technique is used so even though if attackers
watching behind the shoulder he didn‟t recognized the secret
pass.
Guessing: Guessing is concept in which attacker normally
guesses password on the tendency of user. As normally user
Project Plan: tends to chooses password like birthdates, pat name, account
number etc it become guessable and attacker is possible to
It consists of month wise distribution of the project for its break the system.
processing. Modules are divided and assigned with a date We are used secret pass technique so it can‟t be guessable
that needs to be followed for accomplishment. for any attacker.
Brute force attack: A brute force attack is a trial-and-error
Table 3: Project Plan method used to obtain information such as a user password
or personal identification number (PIN). In a brute force
attack, automated software is used to generate a large
number of consecutive guesses as to the value of the desired
data.
These techniques are particularly resistant to brute force due
to use of the session passwords. The use of these will take
out the traditional brute force attack out of the possibility.
Complexity: The Complexity for Pair-Based Authentication
Scheme is to be carried over the secret pass. For a secret
pass of length 5, the complexity is 368. In the case of the
Image based Authentication Scheme the complexity
depends on colors and ratings. The complexity is 8! if
ratings are unique ,otherwise it is 8^8.
67
Fig.4.Security Analysis
www.ijltemas.in
Volume III, Issue III, March 2014 IJLTEMAS ISSN 2278 - 2540
XI. REFERENCES
www.ijltemas.in