Graphical Password Authentication System
Graphical Password Authentication System
Guided by:
Presented by:
Outline
Introduction Overview of the Authentication Methods Graphical Password Scheme: Two Categories
Recognition Based Techniques Recall Based Techniques
Introduction
How about text-based passwords ? Difficulty of remembering passwords
easy to remember -> easy to guess hard to guess -> hard to remember
Users tend to write passwords down or use the same passwords for different accounts An alternative: Graphical Passwords Psychological studies: Human can remember pictures better than text
Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )
Signature Scheme
Registration Phase
Verification Phase
N i s h a n
DATAB ASE
PICTURE
PICTURE
DATABASE
OR
DATABASE
Picture + Gridlines
YES
NO
Point and the image will be stored into database. Now the user can select another image and follows the same steps above. User with username
Username U S E R N A M E verification
Reenter the username
DATAB ASE
Correct username
Login Screen
(For clarity, this collection contains only a little over 100 objects. Typical screens can fit over 1000.)
Conclusion
Main argument for graphical passwords:
People are better at memorizing graphical passwords than textbased passwords.
It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. It is more difficult to break graphical passwords using the traditional attack methods such as burte force method, dictionary attack or spyware. Not yet widely used, current graphical password techniques are still immature.
References
[1] A graphical password authentication system, Ahmad Almulhem Computer Engineering DepartmentKing Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia. www. ieeexplore.ieee.org [2] Graphical Passwords: A Survey by Xiaoyuan Suo, Ying Zhu, G. Scott. Owen Department of Computer Science Georgia State University. [3] L. Sobrado and J.-C. Birget, "Graphical passwords,"The Rutgers Scholar, An Electronic Bulletin forUndergraduate Research, vol. 4, 2002. [4] Ian Jermyn Aviel D. Rubin The Design and Analysis of Graphical Passwords.
Thank you
Queries?