Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
graphical user based authentication
Post: #1

hi, just need materials and procedures to carry out a project on this topic- graphical user based authentication
Post: #2
user authentication is an important topic in information security. Graphical authentication has been proposed as a possible alternative solution to text-based authentication.Humans can remember images better than text and hence graphical user authentication is advantageous. Drawbacks of normal password appear like stolen
the password, forgetting the password, and weak password.Graphical passwords have two different aspects which are usability and security but none of them have both these qualities together.The graphical passwords must be
a) Password should be easy to remember.
b) Password should be secured.

an image would appear on the screen and the user if clicks on the correct regions were clicked in, the user would be authenticated.

The Picture superiority effect is the basis for these techniques.These can be categorized into three:
1)Recognition-Based Technique
users will choose pictures, icons or
symbols from a collection of images

2) Pure Recall-Based Technique
Here, users need to reproduce their passwords without being given any reminder, hints or gesture.

3)Cued Recall-Based Technique
a framework of reminder, hints and gesture that help the users to reproduce their passwords or help users to make a reproduction.

eight recognitionbased algorithms are described:

Passface Scheme
the users select whether their Passface consist of male or female picture. Then they choose four faces from the database as their future password.For authentication, user must correctly identify their four Passfaces twice in a row with no prompting, entering an
enrolment password.

Déjà vu Scheme
This scheme is implemented by letting users to select specific number of pictures among large images portfolio. For preventing description attack, pictures are created according to random art.

Triangle Scheme
Here, the system randomly put a set of N objects which could be a hundred or
a thousand on the screen. In addition, there is a subset of K
objects previously chosen and memorized by the user. In
other words, these K objects are the user passwords.

Movable Frame Scheme
In this method the user must locate three out of K objects which
these three are user passwords.

Picture Password Scheme
during enrollment, a user selects a theme identifying the thumbnail photos to be applied and then registers a sequence of thumbnail images that are used as a future password. These are mainly used in PDA's.

Story Scheme[u]
the users have to select their passwords from the mixed pictures of nine categories in order to make a story easily to remember.Categories maybe animals, cars,
women, food, children, men, objects, nature and sport.

[u]Jetafida Scheme

during registration, the user will select three pictures as a password and then sort
them according to the way he wanted to see them in login phase.

1)Password Brute Forcing Attack
the attacker tries every possible value for a password until they get the real one.

2)Dictionary Based Password Attack
an attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account.

3)Guessing Attack
As many users try to select their passwords based on
their personal information which can be easily guessed by attackers.

4)Spyware Attack
Spyware is a type of malware which installed on
computers with the aim of collecting sensitive information of
users, using a key logger or key listener

5)Shoulder Surfing Attack
using direct observation techniques, such as looking over someone's shoulder, to get

6)Social Engineering Attack
an attacker uses human interaction
to obtain or compromise information about an organization
or computer systems, so he claimed to be one of employee in
order to gain identity.

Full seminars report download:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: graphical user authentication pdf for free, passfaces, user authentication and kerberos seminar report, user authentication methods, railway reservation in graphical user interface, php user authentication ppt, user authentication in jsp,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  graphical password authentication by cued click points harish1234 2 1,074 23-01-2013 01:17 PM
Last Post: Guest
  Timetable generation (user will input subjects, faculty times, class room times) : Us srihari3090 5 3,608 01-11-2012 02:04 PM
Last Post: seminar details
  Multicast authentication using batch signature kruthikaannapur 1 864 09-03-2012 11:41 AM
Last Post: seminar paper
Last Post: seminar paper
  Graphical password authentication using cued click points Guest 1 791 01-03-2012 09:53 AM
Last Post: seminar paper
  integration of sound signature with graphical password authentication ilakkia 0 397 24-02-2012 11:39 PM
Last Post: ilakkia
  Integration of Sound Signature in Graphical Password Authentication System jp16586 1 2,048 24-02-2012 07:18 PM
Last Post: Guest
  agent An Agent Based Intrusion Detection, Response and Blocking using based intrusion Guest 0 465 23-02-2012 10:58 AM
Last Post: Guest
Thumbs Up A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative T Bindu.S 4 1,384 21-02-2012 06:41 PM
Last Post: Alexander_john
  efficient relevance feedback for content based image retreival by mining user navigat kalaivani shila 0 462 19-01-2012 04:05 PM
Last Post: kalaivani shila