GRAPHICAL PASSWORD AUTHENTICATION
#1

GRAPHICAL PASSWORD AUTHENTICATION

.doc   GRAPHICAL PASSWORD AUTHENTICATION.doc (Size: 349.5 KB / Downloads: 5)
Abstract
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method
and point out the future research directions in this area.
We also try to answer two important questions: “Are graphical passwords as secure as text-based passwords?”; “What are the major design and implementation issues for graphical passwords”. In this paper , we are conducting a comprehensive survey of existing graphical image password authentication techniques. Also we are here proposing a new technique for graphical authentication.
1.INTRODUCTION
Human factors are often considered the weakest page link in a computer security system. Point out that there are three major areas where human-computer interaction is important: authentication, security operations, and developing secure systems. Here we focus on the authentication problem. On the other hand, passwords that are hard to guess or break are often hard to remember. Studies showed that since user can only remember a limited number of passwords, they tend to write them down or will use the same passwords for different accounts. To address the problems with traditional username-password authentication, alternative authentication methods, such as biometrics, have been used. In this paper, however, we will focus on another alternative: using pictures as passwords.
Graphical password schemes have been proposed as a possible alternative to
Text-based schemes, motivated partially by the fact that humans can
Remember pictures better than text; psychological studies support such assumption. Pictures are generally easier to be remembered or recognized than text. In addition, if the number of possible pictures is sufficiently large, the possible password space of a graphical password scheme may exceed that of text-based schemes and thus presumably offer better resistance to dictionary attacks. Because of these advantages, there is a growing interest in graphical password. In addition to workstation and web log-in applications, graphical passwords have also been applied to ATM machines and mobile devices.
In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We will discuss the strengths and limitations of each method and also point out future research directions in this area. In this paper, we want to answer the following questions:
 Are graphical passwords as secure as text passwords?
 What are the major design and implementation issues for graphical passwords?
1.1Overview of the Authentication Methods
Current authentication methods can be divided into
Three main areas:
 Token based authentication
 Biometric based authentication
 Knowledge based authentication
Token based techniques, such as key cards, bank cards and smart cards are widely used. Many token-based authentication systems also use knowledge based techniques to enhance security. For example, ATM cards are generally used together with a PIN number.
Biometric based authentication techniques, such as fingerprints, iris scan, or facial recognition, are not yet widely adopted. The major drawback of this approach is that such systems can be expensive, and the identification process can be slow and often unreliable. However, this type of technique provides he highest level of security.
Knowledge based techniques are the most widely used authentication techniques and include both text-based and picture-based passwords. The picture-based techniques can be further divided into two categories: recognition-based and recall-based graphical
techniques
Using recognition-based techniques, a user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage. Using recall-based techniques, a user is asked to reproduce something that he or she created or selected earlier during the registration stage.
1.2Recognition Based Techniques
Dhamija and Perrig proposed a graphical authentication scheme based on the Hash Visualization technique . In their system, the user is asked to select a certain number of images from a set of random pictures generated by a program . Later, the user will be required to identify the pre selected images in order to be authenticated. The results showed that 90% of all participants succeeded in the authentication using this technique, while only 70% succeeded using text-based passwords and PINS. The average log-in time, however, is longer than the traditional approach. A weakness of this system is that the server needs to store the seeds of the portfolio images of each user in plain text. Also, the process of selecting a set of pictures from the picture database can be tedious and time consuming for the user
Reply
#2

hi friend you can refer these pages to get the details on graphical password authentication using ccp

http://studentbank.in/report-graphical-p...points-ccp

http://seminarprojectsarchive/index.php/thread-10475.html

http://studentbank.in/report-graphical-p...2#pid32642
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,853 29-07-2015, 02:27 PM
Last Post: Guest
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,795 15-10-2012, 03:25 PM
Last Post: seminar details
  DWT Based Blind Digital Video Watermarking Scheme for Video Authentication seminar details 0 1,264 09-06-2012, 02:33 PM
Last Post: seminar details
  Authentication project uploader 0 939 09-06-2012, 01:19 PM
Last Post: project uploader
  Railway Reservation in Graphical User Interface project uploader 0 1,299 10-03-2012, 03:15 PM
Last Post: project uploader
  APPLICATION SOFTWARE FOR GRAPHICAL INTERFACE ONLINE THEATRE BOOKING SYSTEM project uploader 0 1,032 23-02-2012, 12:29 PM
Last Post: project uploader
  BioCryptosystems for Authentication and Network Security-A Survey project uploader 0 664 23-02-2012, 11:27 AM
Last Post: project uploader
  Biometric Authentication project uploader 0 670 10-02-2012, 03:11 PM
Last Post: project uploader
  Secure and inclusive authentication with a talking mobile one-time-password client seminar paper 0 855 08-02-2012, 04:36 PM
Last Post: seminar paper
  Graphical User Interface Application to Analyze Bluetooth Intrusion project uploader 0 304 03-02-2012, 03:47 PM
Last Post: project uploader

Forum Jump: