100% found this document useful (2 votes)
103 views17 pages

Graphical Password

This presentation summarizes a student project on graphical passwords. The project used Java and Swing to implement image submission, fragmentation, jumbling of image parts, storage of parts, and authentication. It demonstrated taking a user-selected image, breaking it into parts, scrambling the parts, and authenticating by reordering the parts. The graphical password approach provides stronger security than text passwords against bots and hackers while being easier for users to remember than random passwords.

Uploaded by

Samra Afzal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
100% found this document useful (2 votes)
103 views17 pages

Graphical Password

This presentation summarizes a student project on graphical passwords. The project used Java and Swing to implement image submission, fragmentation, jumbling of image parts, storage of parts, and authentication. It demonstrated taking a user-selected image, breaking it into parts, scrambling the parts, and authenticating by reordering the parts. The graphical password approach provides stronger security than text passwords against bots and hackers while being easier for users to remember than random passwords.

Uploaded by

Samra Afzal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 17

FINAL

PRESENTATION
This presentation will demonstrates what we have done in our
project.
G R A P H I C A L
PA S S W O R D

Under The Guidance Of- Presented by-


Dr. Abdus Samad Aiman Naseem
Dr. Jahangir Alam And
Mr. Misbah-ur-rehman Samra Afzal
Mr. Tariq Ahmad
Mr.Mohd. Vasim
Mrs.Hiba Khan
Contents
 Overview
 Achievement
 Tools Used
 Demonstration of our project
 Advantages and Disadvantages
 Conclusion
 References
Overview

 The main objective of our project is to create


Graphical Password.
 A Password that Provides strong security against
bot attacks or hackers.
Achievement

We have been able to


perform Image 100 100 100 100 100
Submission, Image
Fragmentation, Image
parts jumbling, Image
parts storage and
Authentication in our
project using Java
language.

Image Submission Image Fragmentation Image Parts Image storage Authentication


Jumbling
Tools/Software Used

 Front End- Java Creator


(J Creator).
 Java Swing.
Demonstration

Phase 1

Image
Submission
Demonstration cont.
Browsing Image Configure Image
Demonstration cont.

Submit Image
as your
password .
Demonstration cont.
Phase 2- Log-in User-Selection
Demonstration cont.
Login Jumbled Image
Demonstration cont.
Ordered Image Authentication
Advantages
 The system is user friendly and has simple
interface.
 Provides strong security against bot attacks or
hackers.
 Protect system vulnerable to attacks.
Disadvantage
 The only disadvantage is if users forget the
password, it can not retrieve it.
 Password registration and log-in process take too
long.
Conclusion
 It satisfies both conflicting requirements i.e. it
is easy to remember & it is hard to guess.
 More secure and easier password scheme.
 More difficult to break the graphical
passwords from traditional attack methods
References

 http://techyrajeev.blogspot.in/2012/08/java-program
-to-divide-image-into.html
 stackoverflow.com/questions/30067819/how-to-scr
amble-image-in-java
 The_Java_Swing_tutorial PDF

You might also like