Graphical Password Authentication
 Introduction
 Overview of the Authentication Methods
 Text Password and drawbacks.
 Graphical Passwords.
 The Types Of Graphical Survey:
 Recognition Based Techniques
 Recall Based Techniques
 Discussion
 Advantages
 Disadvantages
 Conclusion
INTRODUCTION:
Access to computer systems is most often based on the use of alphanumeric
passwords. However, users have difficulty remembering a password that is
long and random-appearing. Instead, they create short, simple, and insecure
passwords.

Graphical passwords have been designed to try to make passwords more
memorable and easier for people to use and, therefore, more secure.
Using a graphical password, users click on images rather than type
alphanumeric characters.
Until recently computer and network security has been
formulated as a technical problem. A key area in security
research is authentication, the determination of whether a user
should be allowed access to a given system or resource.
Traditionally, alphanumeric passwords have been used for
authentication, but they are known to have security and usability
problems.
Today other methods, including graphical passwords, are
possible alternatives.
What is PASSWORD?

PASSWORD is a secret word or string of characters that is used for user

authentication to prove his identity and gain access to resources.
-> T H E M O S T C O M M O N L Y U S E D F O R M O F U S E R A U T H E N T I C A T I O N .
->THE WEAKEST LINKS OF COMPUTER SECURITY SYSTEMS.
- > T W O C O N F L I C T I N G R E QU I R E M E N T S O F A L P H A N U M E R I C PA S S W O R D S :
(1) EASY TO REMEMBER AND
(2) HARD TO GUESS.
MANY PEOPLE TEND TO IGNORE THE SECOND REQUIREMENT WHICH
L E A D T O W E A K PA S S W O R D S . M A N Y S O L U T I O N S H AV E B E E N P R O P O S E D.
G R A P H I C A L PA S S W O R D I S O N E O F T H E S O L U T I O N S .
PASSWORDS are used for?
 Logging into accounts.
 Retrieving emails.
 Accessing applications.
 Networks.
 Websites
 Databases
 workstations
Token based authentication:
key cards, band cards, smart card.

Biometric based authentication:
Fingerprints, iris scan, facial recognition.

Knowledge based authentication:
text-based passwords, picture-based passwords
most widely used authentication techniques.
GRAPHICAL PASSWORDS

is an authentication system that works by having the user select from
images, in a specific order, presented in a graphical user interface
(GUI). For this reason, the graphical-password approach is
sometimes called graphical user authentication (GUA).
•



Graphical passwords were originally described by BLONDER in
1996.
It can be used in:
– web log-in application
– ATM machines
– mobile devices
An example of a graphical password uses an image on the screen
and lets the user choose a few click points;

these click points are the "password",
and the user has to click closely to these points again in order to
log in.
Two Categories Of Graphical Passwords:
Recall Based Techniques:

A user is asked to reproduce something that he created or selected
earlier during the registration stage
Recognition Based Techniques:
A user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he selected
during the registration stage.
Recall Based Techniques:
“PassPoint” Scheme:

User click on any place on an image to
create a password. A tolerance around
each chosen pixel is calculated. In order to
be authenticated, user must click within the
tolerances in correct sequence.
Password Space: N^K
( N -the number of pixels or smallest
units of a picture, K - the number of
Point to be clicked on ).
Recognition Based Techniques
Sobrado and Birget Scheme
System display a number of pass-objects
(pre selected by user) among many other
objects,user click inside the convex hull
bounded by pass-objects.
– authors suggested using 1000 objects,
which makes the display very crowed
and the objects almost indistinguishable.
password space: N!/K! (N-K)!
( N-total number of picture objects
K-number of pre-registered objects)
 Other Schemes

Pass faces..



Using human faces as password.
Difficult to attack.

Select a sequence of
images as password
COMPARISION BETWEEN ALPHANUMERIC & GRAPHICAL PASSWORDS:
Commonly used guidelines for alpha-numeric passwords are:
 The password should be at least 8 characters long.
 The password should not be easy to relate to the user (e.g., last name,
birth date).
 Ideally, the user should combine upper and lower case letters and
digits.
Graphical passwords
 The password consists of some actions that the user performs on an
image.
 Such passwords are easier to remember & hard to guess.
GRAPHICAL PASSWORDS WHAT A CONCEPT!
 Here you pick several icons to represent
the password.
 Then when you want to authenticate it,
a screen is drawn as a challenge to which
you must respond.
 The screen has numerous icons, at some
of which are your private password icons.
 You must locate your icons visually on
the screen and click on the screen to the
password.
A SIMPLE GRAPHICAL
PA S S W O R D S C H E M E
The user choose these regions when
he or she created the
password . The choice for the
four regions is arbitrary, but the user
will pick places that he or she finds
easy to remember. The user can
introduce his/her own pictures for
creating graphical passwords. Also, for
stronger security, more than four click
points could be chosen.
A D VA N TA G E S O F G R A P H I C A L
PA S S W O R D S
 Graphical password schemes provide a way of making more
human-friendly passwords .
 Here the security of the system is very high.
 Here we use a series of selectable images on successive
screen pages.
 Dictionary attacks are infeasible.
DRAWBACKS
 Password registration and log-in process take too long.
 Require much more storage space than text based
passwords.
 Shoulder Surfing: It means watching over people's
shoulders as they process information. Examples include
observing the keyboard as a person types his or her password,
enters a PIN number, or views personal information.Because
of their graphic nature, nearly all graphical password schemes
are quite vulnerable to shoulder surfing.
S O L U T I O N TO S H O U L D E R S U R F I N G
PROBLEM
(1) TRIANGLE SCHEME
(2)

MOVABLE FRAME SCHEME
CONCLUSION
 Graphical passwords are an alternative to textual alphanumeric password.
 It satisfies both conflicting requirements i.e. it is easy to remember & it is
hard to guess.
 By the solution of the shoulder surfing problem, it becomes more secure &
easier password scheme.
By implementing other special geometric configurations like triangle &
movable frame, one can achieve more security.
 It is more difficult to break graphical passwords using the
traditional attack methods such as :
burte force search, dictionary attack or spyware.

Not yet widely used, current graphical password techniques
are still immature.
Graphical Password Authentication

More Related Content

PPTX
Graphical Password Authentication
PPTX
Graphical password authentication system ppts
PPTX
Graphical User Authentication
PPTX
Graphical Password Authentication
PPT
graphical password authentication
PPTX
Graphical password authentication
PPT
Graphical password
PPT
Graphical password authentication
Graphical Password Authentication
Graphical password authentication system ppts
Graphical User Authentication
Graphical Password Authentication
graphical password authentication
Graphical password authentication
Graphical password
Graphical password authentication

What's hot (20)

PPT
Graphical password
PPTX
Graphical password authentication system with association of sound
PPT
Graphical password authentication
PPTX
Graphical password authentication
PPTX
Graphical password authentication
PDF
3d password - Report
PPTX
Ppt on use of biomatrix in secure e trasaction
PPTX
3D Password
RTF
Graphical password minor report
PPT
3D-Password: A More Secure Authentication
PPT
3d password ppt
PPT
3 d password
PDF
SEMINAR REPORT ON 3D PASSWORD
PDF
3D Password PPT
DOCX
Biometric Authentication Technology - Report
PPT
Graphical Password Authentication
PPTX
3D PASSWORD SEMINAR
PPTX
3D Password and its importance
PPTX
Atm using fingerprint
PPT
3D PASSWORD
Graphical password
Graphical password authentication system with association of sound
Graphical password authentication
Graphical password authentication
Graphical password authentication
3d password - Report
Ppt on use of biomatrix in secure e trasaction
3D Password
Graphical password minor report
3D-Password: A More Secure Authentication
3d password ppt
3 d password
SEMINAR REPORT ON 3D PASSWORD
3D Password PPT
Biometric Authentication Technology - Report
Graphical Password Authentication
3D PASSWORD SEMINAR
3D Password and its importance
Atm using fingerprint
3D PASSWORD
Ad

Viewers also liked (16)

PPTX
Ppt for graphical password authentication using cued click points
PPTX
Authentication scheme for session password using Images and color
PDF
A graphical password authentication system (ieee 2011) 1
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PPTX
Graphical password ppt
PPTX
Graphical password authentication system ppts
PPTX
Slideshare ppt
PPTX
Graphical password
PPSX
Shoulder surfing resistant graphical and image based login system
PPTX
Pptforpicturepasswordauthentication 130125073736-phpapp02
PPT
558 120127064951-phpapp01
DOCX
Vshantaram
PDF
Psdot 2 design and implementation of persuasive cued click-points and evalua...
PDF
Ieeepro techno solutions ieee 2014 embedded project talking assistance ab...
PPTX
Wise real estate planning
PPT
Digital signature Brief Introduction
Ppt for graphical password authentication using cued click points
Authentication scheme for session password using Images and color
A graphical password authentication system (ieee 2011) 1
Authentication Scheme for Session Password using matrix Colour and Text
Graphical password ppt
Graphical password authentication system ppts
Slideshare ppt
Graphical password
Shoulder surfing resistant graphical and image based login system
Pptforpicturepasswordauthentication 130125073736-phpapp02
558 120127064951-phpapp01
Vshantaram
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Ieeepro techno solutions ieee 2014 embedded project talking assistance ab...
Wise real estate planning
Digital signature Brief Introduction
Ad

Similar to Graphical Password Authentication (20)

PDF
graphicalpswrdauth-130518230955-phpapp02.pdf
PPTX
graphicalpswrdauth-130518230955-phpapp02.pptx
PPTX
Graphical authentication system.pptx
PDF
Graphical Password Authentication
PDF
Technical.pdf
PPTX
A presentation on graphical passwords
PPTX
finale.ppt.pptx
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PDF
Graphical password authentication using Pass faces
PPTX
Comprehensive study of the usability features of the Graphical Password
PPTX
Graphical password
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PPT
Graphicalpasswordauthentication 130907104619-
PPTX
Nilesh
PDF
Generic Authentication System
PDF
Sudhanshu Raman
PDF
Jc2516111615
PDF
Jc2516111615
PDF
Folder Security Using Graphical Password Authentication Scheme
PPTX
Review 1 (1) (1).pptx
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pptx
Graphical authentication system.pptx
Graphical Password Authentication
Technical.pdf
A presentation on graphical passwords
finale.ppt.pptx
IRJET- Graphical user Authentication for an Alphanumeric OTP
Graphical password authentication using Pass faces
Comprehensive study of the usability features of the Graphical Password
Graphical password
Count based hybrid graphical password to prevent brute force attack and shoul...
Graphicalpasswordauthentication 130907104619-
Nilesh
Generic Authentication System
Sudhanshu Raman
Jc2516111615
Jc2516111615
Folder Security Using Graphical Password Authentication Scheme
Review 1 (1) (1).pptx

Recently uploaded (20)

PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Hybrid model detection and classification of lung cancer
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Tartificialntelligence_presentation.pptx
PPT
Geologic Time for studying geology for geologist
PPT
What is a Computer? Input Devices /output devices
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Architecture types and enterprise applications.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
DOCX
search engine optimization ppt fir known well about this
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
WOOl fibre morphology and structure.pdf for textiles
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Hybrid model detection and classification of lung cancer
A comparative study of natural language inference in Swahili using monolingua...
Tartificialntelligence_presentation.pptx
Geologic Time for studying geology for geologist
What is a Computer? Input Devices /output devices
Hindi spoken digit analysis for native and non-native speakers
Architecture types and enterprise applications.pdf
Getting started with AI Agents and Multi-Agent Systems
search engine optimization ppt fir known well about this
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Developing a website for English-speaking practice to English as a foreign la...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Benefits of Physical activity for teenagers.pptx
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx

Graphical Password Authentication

  • 2.  Introduction  Overview of the Authentication Methods  Text Password and drawbacks.  Graphical Passwords.  The Types Of Graphical Survey:  Recognition Based Techniques  Recall Based Techniques  Discussion  Advantages  Disadvantages  Conclusion
  • 3. INTRODUCTION: Access to computer systems is most often based on the use of alphanumeric passwords. However, users have difficulty remembering a password that is long and random-appearing. Instead, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure. Using a graphical password, users click on images rather than type alphanumeric characters.
  • 4. Until recently computer and network security has been formulated as a technical problem. A key area in security research is authentication, the determination of whether a user should be allowed access to a given system or resource. Traditionally, alphanumeric passwords have been used for authentication, but they are known to have security and usability problems. Today other methods, including graphical passwords, are possible alternatives.
  • 5. What is PASSWORD? PASSWORD is a secret word or string of characters that is used for user authentication to prove his identity and gain access to resources. -> T H E M O S T C O M M O N L Y U S E D F O R M O F U S E R A U T H E N T I C A T I O N . ->THE WEAKEST LINKS OF COMPUTER SECURITY SYSTEMS. - > T W O C O N F L I C T I N G R E QU I R E M E N T S O F A L P H A N U M E R I C PA S S W O R D S : (1) EASY TO REMEMBER AND (2) HARD TO GUESS. MANY PEOPLE TEND TO IGNORE THE SECOND REQUIREMENT WHICH L E A D T O W E A K PA S S W O R D S . M A N Y S O L U T I O N S H AV E B E E N P R O P O S E D. G R A P H I C A L PA S S W O R D I S O N E O F T H E S O L U T I O N S .
  • 6. PASSWORDS are used for?  Logging into accounts.  Retrieving emails.  Accessing applications.  Networks.  Websites  Databases  workstations
  • 7. Token based authentication: key cards, band cards, smart card. Biometric based authentication: Fingerprints, iris scan, facial recognition. Knowledge based authentication: text-based passwords, picture-based passwords most widely used authentication techniques.
  • 8. GRAPHICAL PASSWORDS  is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is sometimes called graphical user authentication (GUA). •  Graphical passwords were originally described by BLONDER in 1996. It can be used in: – web log-in application – ATM machines – mobile devices
  • 9. An example of a graphical password uses an image on the screen and lets the user choose a few click points; these click points are the "password", and the user has to click closely to these points again in order to log in.
  • 10. Two Categories Of Graphical Passwords: Recall Based Techniques: A user is asked to reproduce something that he created or selected earlier during the registration stage Recognition Based Techniques: A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage.
  • 11. Recall Based Techniques: “PassPoint” Scheme: User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence. Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on ).
  • 12. Recognition Based Techniques Sobrado and Birget Scheme System display a number of pass-objects (pre selected by user) among many other objects,user click inside the convex hull bounded by pass-objects. – authors suggested using 1000 objects, which makes the display very crowed and the objects almost indistinguishable. password space: N!/K! (N-K)! ( N-total number of picture objects K-number of pre-registered objects)
  • 13.  Other Schemes Pass faces..   Using human faces as password. Difficult to attack. Select a sequence of images as password
  • 14. COMPARISION BETWEEN ALPHANUMERIC & GRAPHICAL PASSWORDS: Commonly used guidelines for alpha-numeric passwords are:  The password should be at least 8 characters long.  The password should not be easy to relate to the user (e.g., last name, birth date).  Ideally, the user should combine upper and lower case letters and digits. Graphical passwords  The password consists of some actions that the user performs on an image.  Such passwords are easier to remember & hard to guess.
  • 15. GRAPHICAL PASSWORDS WHAT A CONCEPT!  Here you pick several icons to represent the password.  Then when you want to authenticate it, a screen is drawn as a challenge to which you must respond.  The screen has numerous icons, at some of which are your private password icons.  You must locate your icons visually on the screen and click on the screen to the password.
  • 16. A SIMPLE GRAPHICAL PA S S W O R D S C H E M E The user choose these regions when he or she created the password . The choice for the four regions is arbitrary, but the user will pick places that he or she finds easy to remember. The user can introduce his/her own pictures for creating graphical passwords. Also, for stronger security, more than four click points could be chosen.
  • 17. A D VA N TA G E S O F G R A P H I C A L PA S S W O R D S  Graphical password schemes provide a way of making more human-friendly passwords .  Here the security of the system is very high.  Here we use a series of selectable images on successive screen pages.  Dictionary attacks are infeasible.
  • 18. DRAWBACKS  Password registration and log-in process take too long.  Require much more storage space than text based passwords.  Shoulder Surfing: It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information.Because of their graphic nature, nearly all graphical password schemes are quite vulnerable to shoulder surfing.
  • 19. S O L U T I O N TO S H O U L D E R S U R F I N G PROBLEM (1) TRIANGLE SCHEME
  • 21. CONCLUSION  Graphical passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme. By implementing other special geometric configurations like triangle & movable frame, one can achieve more security.
  • 22.  It is more difficult to break graphical passwords using the traditional attack methods such as : burte force search, dictionary attack or spyware. Not yet widely used, current graphical password techniques are still immature.