SlideShare uma empresa Scribd logo
1 de 22
PRESENTED BY:- 
UMESH KUMAR 
1120161
Outline 
 Introduction 
 Overview of the Authentication Methods 
 Techniques of GPA 
◦ Recognition Based Techniques 
◦ Recall Based Techniques 
 Discussion 
◦ Security 
◦ Usability 
 Conclusion
Introduction
Overview of authentication method
In this presentation what we have 
 A comprehensive study of the existing 
graphical password techniques 
 Discuss the strengths and limitations of 
each method 
 Point out future research directions
The two most commonly used techniques in picture password authentication
RECOGNITIONBASED TECHNIQUES 
A user is presented with a set of images and the user passes the authentication by recognizing and 
identifying the images he selected during the registration stage 
RECALL BASED TECHNIQUES 
A user is asked to reproduce/recreate something that he created or selected earlier during 
the registration stage
Recognition Based Techniques 
 Dhamija and Perrig Scheme 
Pick several pictures out of many choices, identify them later 
in authentication. 
◦ using Hash Visualization, which, 
given a seed, automatically 
generate a set of pictures 
◦ take longer to create graphical 
passwords 
password space: N!/K! (N-K)! 
( N-total number of pictures; K-number of pictures selected as passwords)
Recognition Based Techniques 
 Triangle Scheme 
System display a number of pass-objects (pre-selected by 
user) among many other objects, user click inside the 
convex hull bounded by pass-objects. 
◦ authors suggest using 1000 
objects, which makes the display 
very crowed and the objects almost 
indistinguishable. 
password space: N!/K! (N-K)! 
( N-total number of picture objects; K-number of pre-registered objects)
Recognition Based Techniques 
Pass face scheme 
In this technique human 
faces are used as password.
Recall Based Techniques 
 Draw-A-Secret (DAS) Scheme 
User draws a simple picture on a 2D grid, the 
coordinates of the 
grids occupied by the picture are stored in the order of 
drawing 
 redrawing has to touch the 
same grids in the same 
sequence in authentication 
 user studies showed the 
drawing sequences is hard to 
Remember
Recall Based Techniques 
 “Pass Point/ Click Point ” Scheme 
User click on any place on an image to create a password. A 
tolerance 
around each chosen pixel is calculated. In order to be authenticated, 
user must click within the tolerances in correct sequence. 
 can be hard to remember the 
sequences 
Password Space: N^K 
( N -the number of pixels or smallest 
units of a picture, K - the number of 
Point to be clicked on )
Click point’s as password 
1st click 2nd click 3rd click 4th click 5th click … 
Click point
Recall Based Techniques 
 Other Schemes 
Grid Selection Scheme Signature Scheme
Security 
 Is a graphical password as secure as 
text-based passwords? 
◦ text-based passwords have a password space of 
94^N 
(94 – number of printable characters, N- length of passwords). 
Some graphical password techniques can compete: Draw-A-Secret 
Scheme, Pass Point Scheme. 
Text passwords are Vulnerable/prone to 
attacks like Dictionary attack, Brute 
force attack, spyware .
◦ Brute force search / Dictionary attacks 
The attack programs need to automatically generate accurate mouse motion 
to imitate human input, which is more difficult compared to text passwords. 
◦ Guessing 
◦ Social engineering 
 If the number of possible pictures is sufficiently 
large, the possible password space may exceed that 
of text-based schemes, thus offer better resistance 
to dictionary attacks. 
 can be used to: 
◦ workstation 
◦ web log-in application 
◦ ATM machines 
◦ mobile devices 
◦ databases
Advantages of picture password authentication 
Graphical password schemes provide a way of making more human-friendly 
passwords . 
Here the security of the system is very high. 
Here we use a series of selectable images on successive screen pages. 
 Dictionary attacks and brute force searches are infeasible.
Drawback's of picture password 
 Password registration and log-in process take too long. 
 Require much more storage space than textual/character passwords. 
SHOULDER SURFING 
It means watching over people's shoulders as they process information. 
Examples include observing the keyboard as a person types his or her password, 
enters a PIN number, or views personal information. 
Because of their graphic nature, nearly all graphical password schemes are quite 
vulnerable/unsafe to shoulder surfing.
SOLUTION TO SHOULDER 
SURFING PROBLEM 
(1) TRIANGLE SCHEME
(2) MOVABLE FRAME SCHEME
CONCLUSION 
 Picture passwords are an alternative to textual alphanumeric password. 
 It satisfies both conflicting requirements i.e. it is easy to remember & it is 
hard to guess. 
 By the solution of the shoulder surfing problem, it becomes more secure & 
easier password scheme. 
 By implementing encryption algorithms and hash algorithms for storing and 
retrieving pictures and points, one can achieve more security 
 Picture password is still immature, more research is required in this field.
BY :- 
UMESH KUMAR

Mais conteúdo relacionado

Mais procurados

Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
ijtsrd
 

Mais procurados (20)

Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
11aman
11aman11aman
11aman
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 

Destaque (6)

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
8051 Microcontroller Notes
8051 Microcontroller Notes8051 Microcontroller Notes
8051 Microcontroller Notes
 

Semelhante a Pptforpicturepasswordauthentication 130125073736-phpapp02

graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
Geetha982072
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
Snehal Wankhede
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 

Semelhante a Pptforpicturepasswordauthentication 130125073736-phpapp02 (20)

558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Pptforpicturepasswordauthentication 130125073736-phpapp02

  • 1. PRESENTED BY:- UMESH KUMAR 1120161
  • 2. Outline  Introduction  Overview of the Authentication Methods  Techniques of GPA ◦ Recognition Based Techniques ◦ Recall Based Techniques  Discussion ◦ Security ◦ Usability  Conclusion
  • 5. In this presentation what we have  A comprehensive study of the existing graphical password techniques  Discuss the strengths and limitations of each method  Point out future research directions
  • 6. The two most commonly used techniques in picture password authentication
  • 7. RECOGNITIONBASED TECHNIQUES A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage RECALL BASED TECHNIQUES A user is asked to reproduce/recreate something that he created or selected earlier during the registration stage
  • 8. Recognition Based Techniques  Dhamija and Perrig Scheme Pick several pictures out of many choices, identify them later in authentication. ◦ using Hash Visualization, which, given a seed, automatically generate a set of pictures ◦ take longer to create graphical passwords password space: N!/K! (N-K)! ( N-total number of pictures; K-number of pictures selected as passwords)
  • 9. Recognition Based Techniques  Triangle Scheme System display a number of pass-objects (pre-selected by user) among many other objects, user click inside the convex hull bounded by pass-objects. ◦ authors suggest using 1000 objects, which makes the display very crowed and the objects almost indistinguishable. password space: N!/K! (N-K)! ( N-total number of picture objects; K-number of pre-registered objects)
  • 10. Recognition Based Techniques Pass face scheme In this technique human faces are used as password.
  • 11. Recall Based Techniques  Draw-A-Secret (DAS) Scheme User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing  redrawing has to touch the same grids in the same sequence in authentication  user studies showed the drawing sequences is hard to Remember
  • 12. Recall Based Techniques  “Pass Point/ Click Point ” Scheme User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence.  can be hard to remember the sequences Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )
  • 13. Click point’s as password 1st click 2nd click 3rd click 4th click 5th click … Click point
  • 14. Recall Based Techniques  Other Schemes Grid Selection Scheme Signature Scheme
  • 15. Security  Is a graphical password as secure as text-based passwords? ◦ text-based passwords have a password space of 94^N (94 – number of printable characters, N- length of passwords). Some graphical password techniques can compete: Draw-A-Secret Scheme, Pass Point Scheme. Text passwords are Vulnerable/prone to attacks like Dictionary attack, Brute force attack, spyware .
  • 16. ◦ Brute force search / Dictionary attacks The attack programs need to automatically generate accurate mouse motion to imitate human input, which is more difficult compared to text passwords. ◦ Guessing ◦ Social engineering  If the number of possible pictures is sufficiently large, the possible password space may exceed that of text-based schemes, thus offer better resistance to dictionary attacks.  can be used to: ◦ workstation ◦ web log-in application ◦ ATM machines ◦ mobile devices ◦ databases
  • 17. Advantages of picture password authentication Graphical password schemes provide a way of making more human-friendly passwords . Here the security of the system is very high. Here we use a series of selectable images on successive screen pages.  Dictionary attacks and brute force searches are infeasible.
  • 18. Drawback's of picture password  Password registration and log-in process take too long.  Require much more storage space than textual/character passwords. SHOULDER SURFING It means watching over people's shoulders as they process information. Examples include observing the keyboard as a person types his or her password, enters a PIN number, or views personal information. Because of their graphic nature, nearly all graphical password schemes are quite vulnerable/unsafe to shoulder surfing.
  • 19. SOLUTION TO SHOULDER SURFING PROBLEM (1) TRIANGLE SCHEME
  • 21. CONCLUSION  Picture passwords are an alternative to textual alphanumeric password.  It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess.  By the solution of the shoulder surfing problem, it becomes more secure & easier password scheme.  By implementing encryption algorithms and hash algorithms for storing and retrieving pictures and points, one can achieve more security  Picture password is still immature, more research is required in this field.
  • 22. BY :- UMESH KUMAR