graphical user based authentication
#1

hi, just need materials and procedures to carry out a project on this topic- graphical user based authentication
Reply
#2
Abstract
user authentication is an important topic in information security. Graphical authentication has been proposed as a possible alternative solution to text-based authentication.Humans can remember images better than text and hence graphical user authentication is advantageous. Drawbacks of normal password appear like stolen
the password, forgetting the password, and weak password.Graphical passwords have two different aspects which are usability and security but none of them have both these qualities together.The graphical passwords must be
a) Password should be easy to remember.
b) Password should be secured.

an image would appear on the screen and the user if clicks on the correct regions were clicked in, the user would be authenticated.

GRAPHICAL PASSWORDS METHODS
The Picture superiority effect is the basis for these techniques.These can be categorized into three:
1)Recognition-Based Technique
users will choose pictures, icons or
symbols from a collection of images

2) Pure Recall-Based Technique
Here, users need to reproduce their passwords without being given any reminder, hints or gesture.

3)Cued Recall-Based Technique
a framework of reminder, hints and gesture that help the users to reproduce their passwords or help users to make a reproduction.

RECOGNITION-BASED ALGORITHMS
eight recognitionbased algorithms are described:


Passface Scheme
the users select whether their Passface consist of male or female picture. Then they choose four faces from the database as their future password.For authentication, user must correctly identify their four Passfaces twice in a row with no prompting, entering an
enrolment password.

Déjà vu Scheme
This scheme is implemented by letting users to select specific number of pictures among large images portfolio. For preventing description attack, pictures are created according to random art.

Triangle Scheme
Here, the system randomly put a set of N objects which could be a hundred or
a thousand on the screen. In addition, there is a subset of K
objects previously chosen and memorized by the user. In
other words, these K objects are the user passwords.

Movable Frame Scheme
In this method the user must locate three out of K objects which
these three are user passwords.


Picture Password Scheme
during enrollment, a user selects a theme identifying the thumbnail photos to be applied and then registers a sequence of thumbnail images that are used as a future password. These are mainly used in PDA's.

Story Scheme[u]
the users have to select their passwords from the mixed pictures of nine categories in order to make a story easily to remember.Categories maybe animals, cars,
women, food, children, men, objects, nature and sport.

[u]Jetafida Scheme

during registration, the user will select three pictures as a password and then sort
them according to the way he wanted to see them in login phase.

COMMON ATTACKS IN GRAPHICAL PASSWORD SCHEMES
1)Password Brute Forcing Attack
the attacker tries every possible value for a password until they get the real one.

2)Dictionary Based Password Attack
an attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account.

3)Guessing Attack
As many users try to select their passwords based on
their personal information which can be easily guessed by attackers.

4)Spyware Attack
Spyware is a type of malware which installed on
computers with the aim of collecting sensitive information of
users, using a key logger or key listener

5)Shoulder Surfing Attack
using direct observation techniques, such as looking over someone's shoulder, to get
information.

6)Social Engineering Attack
an attacker uses human interaction
to obtain or compromise information about an organization
or computer systems, so he claimed to be one of employee in
order to gain identity.


Full seminar report download:
[attachment=909]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: passfaces, railway reservation in graphical user interface, passpoint method in graphical authentication, user authentication in jsp, user authentication in java, graphical user interface seminar report doc, user authentication in php,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  graphical password authentication by cued click points harish1234 2 1,820 23-01-2013, 01:17 PM
Last Post: Guest
  Timetable generation (user will input subjects, faculty times, class room times) : Us srihari3090 5 4,384 01-11-2012, 02:04 PM
Last Post: seminar details
  Multicast authentication using batch signature kruthikaannapur 1 1,305 09-03-2012, 11:41 AM
Last Post: seminar paper
  3D PASSWORD FOR MORE SECURE AUTHENTICATION SUMEDH 6 4,007 01-03-2012, 03:23 PM
Last Post: seminar paper
  Graphical password authentication using cued click points 1 1,291 01-03-2012, 09:53 AM
Last Post: seminar paper
  integration of sound signature with graphical password authentication ilakkia 0 840 24-02-2012, 11:39 PM
Last Post: ilakkia
  agent An Agent Based Intrusion Detection, Response and Blocking using based intrusion 0 1,066 23-02-2012, 10:58 AM
Last Post: Guest
Thumbs Up A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative T Bindu.S 3 2,008 20-02-2012, 10:10 PM
Last Post: Guest
  efficient relevance feedback for content based image retreival by mining user navigat kalaivani shila 0 810 19-01-2012, 04:05 PM
Last Post: kalaivani shila
  Two Factor Authentication 08seminarproject 0 714 13-01-2012, 10:42 PM
Last Post: 08seminarproject

Forum Jump: