SlideShare a Scribd company logo
3
Most read
4
Most read
11
Most read
Image based authentication
   What you are (biometric)

   What you have (token)

   What you know (password)
   Finger attacks

   Word of mouth transfer

   Dictionary attacks

   Image Based Authentication (IBA) can solve all of
    these
IBA is based on a user’s successful
identification of his image password set. After the
username is sent to the authentication module, it
responds by displaying an image set, which consists
of images from the user’s password set mixed with
other images. The user is authenticated by correctly
identifying the password images.
   Image Space(IS): the set of all images used by IBA
    system.

   Individual Image Set (IIS) – the set of images that a
    user (u) chooses to authenticate himself.

   Key Image – any image in a user's IIS.

   Presentation Set (PS) – the set of images
    presented to a user from which the key images
    must be selected for a given authentication attempt.
 Authentication User Agent (AUA)
 Authentication Server (AS)



       The communication between them is encrypted
    using authenticated Diffie-Hellman.


      The AS is assumed to be a part of the Trusted
    Computing Base.
 Image     Set Selection
     Alice selects ‘n’ images (n is set by the
    administrator, Bob)
     Bob stores the image set at the AS


 Presentation      Subsets
     Bob picks one image from IISa and some other
    images from IS-IISa for each PS_i.
     Alice picks the IISa image from each PS_i.
 A→B: Username= Alice
 B→A: Presentation set for Round 1, PS1.

 A→B: Identified image.

 B→A: Presentation set for Round 2, PS2.

 A→B: Identified image.

 …...

 B→A: Presentation set for Round R, PSR.

 A→B: Identified image.

 If all R steps are successful, Bob authenticates
  Alice.
    Image Based Authentication is not foolproof.

    There are four points of vulnerability:
1.    Information stored on the AS.
2.    Information Sent between the AS and AUA.
3.    The output at the AUA.
4.    The input at the AUA.
   Eve can observe or log Alice’s Key stroke and later
    authenticate herself as Alice.




 Display the images in random order.
      Keystrokes are only meaningful for this PS in
this display order.
   Eve can observe Alice’s screen ( during the
    authentication process) and later authenticate
    herself as Alice.


    Counter:
 Display the image when the mouse is over it.
 Otherwise gray out the image.

 If input is hidden, then which image is selected is
  not known- Only get PS_i’s.
   Brute Force Attack

   Frequency Correlation Attack
   Intersection Attack
   Logic Attack

   Countering Frequency Correlation Attack
   Decoy Screen
   Image Buckets
   Fixed PS per Key Image
   Image Set Storage :
     Password schemes normally store only the hash of a
user’s password. By compromising the server, the attacker
cannot recover the password. In our scheme, the server
cannot merely store the hash. The server needs to know
the image set itself in order to present the authentication
screens. If a server is compromised, it will be possible to
retrieve the image set of every user. However, many
authentication schemes depend heavily on the
impenetrability of the Trusted Computing Base and they
have been widely deployed.
Image based authentication
 CAPTCHA stands for Completely Automated
  Public Turing Test to tell Computers and
  Humans Apart.
 CAPTCHA is an automated test that can
  distinguish between machines and humans
  alike.
 It differentiates between humans and bot by
  setting some task that is easy for most humans
  to perform but is more difficult and time
  consuming for current bots to complete.
 Preventing Comment Spam in Blogs.
 Protecting Website Registration.

 Protecting Email Addresses From Scrapers.

 Online Polls.

 Preventing Dictionary Attacks.

 Worms and Spam.
1.   PIX:
 Create a large Database of labeled images.
 Pick a concrete object.

 Pick more random images of the object from the
  image database.
 Distort the images

 Ask user to pick the object for a list of words.
Image based authentication
2. BONGO

   Visual Puzzle

   Computer can generate and display, but not solve

   Bongo is based on a visual pattern recognition
    problem.
   As Figure below shows, a Bongo CAPTCHA uses
    two sets of images; each set has some specific
    characteristic. One set might be boldface, for
    example, while the other is not. The system then
    presents a single image to the user who then must
    specify the set to which the image belongs.
3. Pessimal Print

   Pessimal Print works by pseudo randomly
    combining a word, font, and a set of image
    degradations to generate images like the ones in
    Figure.
Image-based authentication techniques, although currently
in their infancy, might have a wider applicability in future.
We perceive it be a more user-friendly technique that
helps to increase the password quality tremendously
compared to a text-based approach. In this seminar we have
proposed a simple yet secure authentication technique.
We have also identified various issues related with such a
system and proposed a novel concept of Image Buckets in
overcoming some shortcomings.
        Its better to be safe than sorry!!
Image based authentication

More Related Content

What's hot (20)

PPTX
Graphical password authentication system ppts
Nimisha_Goel
 
PPT
Image Based Authentication System
PRINCE PRANAV
 
PPTX
Graphical Password Authentication
Dhvani Shah
 
PPTX
Graphical User Authentication
Sarthak Gupta
 
PPTX
Two Factor Authentication
Nikhil Shaw
 
PPTX
Block cipher modes of operation
harshit chavda
 
PPTX
Password based cryptography
Ishraq Al Fataftah
 
PPTX
Mobile Device Security
Nemwos
 
PPTX
Fingerprint Authentication for ATM
Paras Garg
 
DOCX
Online Railway Reservation System
Prince Kumar
 
PPT
graphical password authentication
Akhil Kumar
 
PPTX
Color model
Imran Hossain
 
PPTX
Trusted systems
ahmad abdelhafeez
 
PDF
Web Security
Dr.Florence Dayana
 
PPT
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
PPTX
User authentication
CAS
 
PPTX
Types of cyber attacks
krishh sivakrishna
 
PPT
Digital certificates
Sheetal Verma
 
PPT
Email Security : PGP & SMIME
Rohit Soni
 
PPTX
Spamming
Yash Shrivastava
 
Graphical password authentication system ppts
Nimisha_Goel
 
Image Based Authentication System
PRINCE PRANAV
 
Graphical Password Authentication
Dhvani Shah
 
Graphical User Authentication
Sarthak Gupta
 
Two Factor Authentication
Nikhil Shaw
 
Block cipher modes of operation
harshit chavda
 
Password based cryptography
Ishraq Al Fataftah
 
Mobile Device Security
Nemwos
 
Fingerprint Authentication for ATM
Paras Garg
 
Online Railway Reservation System
Prince Kumar
 
graphical password authentication
Akhil Kumar
 
Color model
Imran Hossain
 
Trusted systems
ahmad abdelhafeez
 
Web Security
Dr.Florence Dayana
 
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
User authentication
CAS
 
Types of cyber attacks
krishh sivakrishna
 
Digital certificates
Sheetal Verma
 
Email Security : PGP & SMIME
Rohit Soni
 

Viewers also liked (18)

PPTX
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
PPT
Graphical password
vitam,berhampur
 
PPTX
Graphical password authentication system ppts
Nimisha_Goel
 
PPTX
Authentication scheme for session password using Images and color
Nitesh Kumar
 
PPTX
A Novel Watermarking Scheme for Image Authentication in Social Networks
Oresti Banos
 
PDF
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
acijjournal
 
PDF
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
PDF
Review of Various Image Processing Techniques for Currency Note Authentication
IJCERT
 
DOCX
Image based password authentication for illiterates with touch screen
sree438
 
PPTX
Coin recognition using matlab
slmnsvn
 
PDF
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
PPT
11aman
Anu Jamwal
 
PPT
Graphical Password authentication using Hmac
Arpana shree
 
PPTX
Quiery builder
Devireddy Ravindrareddy
 
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
IGEEKS TECHNOLOGIES
 
PPT
Security features of indian banknotes given by rbi
Abhilash Kotawar
 
PPS
Watermark
ravi33s
 
PPTX
Graphical password authentication system with association of sound
Vikram Verma
 
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Graphical password
vitam,berhampur
 
Graphical password authentication system ppts
Nimisha_Goel
 
Authentication scheme for session password using Images and color
Nitesh Kumar
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
Oresti Banos
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
acijjournal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
Review of Various Image Processing Techniques for Currency Note Authentication
IJCERT
 
Image based password authentication for illiterates with touch screen
sree438
 
Coin recognition using matlab
slmnsvn
 
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
11aman
Anu Jamwal
 
Graphical Password authentication using Hmac
Arpana shree
 
Quiery builder
Devireddy Ravindrareddy
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
IGEEKS TECHNOLOGIES
 
Security features of indian banknotes given by rbi
Abhilash Kotawar
 
Watermark
ravi33s
 
Graphical password authentication system with association of sound
Vikram Verma
 
Ad

Similar to Image based authentication (20)

PPT
Image based authentication
Rishabh Gupta
 
PDF
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
 
PDF
Ai4506179185
IJERA Editor
 
PPSX
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
PDF
Graphical Password Authentication using image Segmentation for Web Based Appl...
ijtsrd
 
PPTX
Data security with Images through clickpoints
saria11
 
PDF
Image authentication for secure login
IRJET Journal
 
PDF
J0704055058
IJERD Editor
 
PDF
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
 
PPTX
Efficient Securing System Using Graphical Captcha
Sankar Anand
 
PDF
Captcha as Graphical Password- CaRP
jadhav.vrushali90
 
PDF
Technical.pdf
GirishKA4
 
PDF
SMART ANDROID GRAPHICAL PASSWORD
IRJET Journal
 
PDF
Captcha as graphical passwords a new security primitive based on hard ai prob...
Shakas Technologies
 
PDF
Survey on Graphical Password by Image Segmentation 2021 2022
ijtsrd
 
PDF
Graphical Password by Image Segmentation
IRJET Journal
 
PDF
Evolution of captcha technologies
Monika Keerthi
 
PDF
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
 
PPTX
Captcha as graphical password
Gopinath Ramanna
 
PPT
Graphicalpasswordauthentication 130907104619-
Snehal Wankhede
 
Image based authentication
Rishabh Gupta
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
 
Ai4506179185
IJERA Editor
 
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
ijtsrd
 
Data security with Images through clickpoints
saria11
 
Image authentication for secure login
IRJET Journal
 
J0704055058
IJERD Editor
 
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
 
Efficient Securing System Using Graphical Captcha
Sankar Anand
 
Captcha as Graphical Password- CaRP
jadhav.vrushali90
 
Technical.pdf
GirishKA4
 
SMART ANDROID GRAPHICAL PASSWORD
IRJET Journal
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Shakas Technologies
 
Survey on Graphical Password by Image Segmentation 2021 2022
ijtsrd
 
Graphical Password by Image Segmentation
IRJET Journal
 
Evolution of captcha technologies
Monika Keerthi
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
 
Captcha as graphical password
Gopinath Ramanna
 
Graphicalpasswordauthentication 130907104619-
Snehal Wankhede
 
Ad

More from أحلام انصارى (20)

PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
PPTX
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
PPTX
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
أحلام انصارى
 
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
PPTX
Security issues in cloud database
أحلام انصارى
 
PPTX
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
PPTX
Honey pot in cloud computing
أحلام انصارى
 
PPT
grid authentication
أحلام انصارى
 
PPTX
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
PPT
Dos presentation by ahlam shakeel
أحلام انصارى
 
PPTX
Password craking techniques
أحلام انصارى
 
PPT
Operating system vulnerability and control
أحلام انصارى
 
PPT
Network ssecurity toolkit
أحلام انصارى
 
PPTX
Image forgery and security
أحلام انصارى
 
PPT
Cryptography
أحلام انصارى
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
Security issues in cloud database
أحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
Honey pot in cloud computing
أحلام انصارى
 
grid authentication
أحلام انصارى
 
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Dos presentation by ahlam shakeel
أحلام انصارى
 
Password craking techniques
أحلام انصارى
 
Operating system vulnerability and control
أحلام انصارى
 
Network ssecurity toolkit
أحلام انصارى
 
Image forgery and security
أحلام انصارى
 

Image based authentication

  • 2. What you are (biometric)  What you have (token)  What you know (password)
  • 3. Finger attacks  Word of mouth transfer  Dictionary attacks  Image Based Authentication (IBA) can solve all of these
  • 4. IBA is based on a user’s successful identification of his image password set. After the username is sent to the authentication module, it responds by displaying an image set, which consists of images from the user’s password set mixed with other images. The user is authenticated by correctly identifying the password images.
  • 5. Image Space(IS): the set of all images used by IBA system.  Individual Image Set (IIS) – the set of images that a user (u) chooses to authenticate himself.  Key Image – any image in a user's IIS.  Presentation Set (PS) – the set of images presented to a user from which the key images must be selected for a given authentication attempt.
  • 6.  Authentication User Agent (AUA)  Authentication Server (AS)  The communication between them is encrypted using authenticated Diffie-Hellman.  The AS is assumed to be a part of the Trusted Computing Base.
  • 7.  Image Set Selection  Alice selects ‘n’ images (n is set by the administrator, Bob)  Bob stores the image set at the AS  Presentation Subsets  Bob picks one image from IISa and some other images from IS-IISa for each PS_i.  Alice picks the IISa image from each PS_i.
  • 8.  A→B: Username= Alice  B→A: Presentation set for Round 1, PS1.  A→B: Identified image.  B→A: Presentation set for Round 2, PS2.  A→B: Identified image.  …...  B→A: Presentation set for Round R, PSR.  A→B: Identified image.  If all R steps are successful, Bob authenticates Alice.
  • 9. Image Based Authentication is not foolproof.  There are four points of vulnerability: 1. Information stored on the AS. 2. Information Sent between the AS and AUA. 3. The output at the AUA. 4. The input at the AUA.
  • 10. Eve can observe or log Alice’s Key stroke and later authenticate herself as Alice.  Display the images in random order. Keystrokes are only meaningful for this PS in this display order.
  • 11. Eve can observe Alice’s screen ( during the authentication process) and later authenticate herself as Alice. Counter:  Display the image when the mouse is over it.  Otherwise gray out the image.  If input is hidden, then which image is selected is not known- Only get PS_i’s.
  • 12. Brute Force Attack  Frequency Correlation Attack  Intersection Attack  Logic Attack  Countering Frequency Correlation Attack  Decoy Screen  Image Buckets  Fixed PS per Key Image
  • 13. Image Set Storage : Password schemes normally store only the hash of a user’s password. By compromising the server, the attacker cannot recover the password. In our scheme, the server cannot merely store the hash. The server needs to know the image set itself in order to present the authentication screens. If a server is compromised, it will be possible to retrieve the image set of every user. However, many authentication schemes depend heavily on the impenetrability of the Trusted Computing Base and they have been widely deployed.
  • 15.  CAPTCHA stands for Completely Automated Public Turing Test to tell Computers and Humans Apart.  CAPTCHA is an automated test that can distinguish between machines and humans alike.  It differentiates between humans and bot by setting some task that is easy for most humans to perform but is more difficult and time consuming for current bots to complete.
  • 16.  Preventing Comment Spam in Blogs.  Protecting Website Registration.  Protecting Email Addresses From Scrapers.  Online Polls.  Preventing Dictionary Attacks.  Worms and Spam.
  • 17. 1. PIX:  Create a large Database of labeled images.  Pick a concrete object.  Pick more random images of the object from the image database.  Distort the images  Ask user to pick the object for a list of words.
  • 19. 2. BONGO  Visual Puzzle  Computer can generate and display, but not solve  Bongo is based on a visual pattern recognition problem.
  • 20. As Figure below shows, a Bongo CAPTCHA uses two sets of images; each set has some specific characteristic. One set might be boldface, for example, while the other is not. The system then presents a single image to the user who then must specify the set to which the image belongs.
  • 21. 3. Pessimal Print  Pessimal Print works by pseudo randomly combining a word, font, and a set of image degradations to generate images like the ones in Figure.
  • 22. Image-based authentication techniques, although currently in their infancy, might have a wider applicability in future. We perceive it be a more user-friendly technique that helps to increase the password quality tremendously compared to a text-based approach. In this seminar we have proposed a simple yet secure authentication technique. We have also identified various issues related with such a system and proposed a novel concept of Image Buckets in overcoming some shortcomings. Its better to be safe than sorry!!