Graphical Password Authentication using Cued Click Points (CCP)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
21-04-2010, 11:39 PM


Various graphical password schemes have been proposed as alternatives to text-based passwords. Research and experience have shown that text-based passwords are fraught with both usability and security problems that make them less than desirable solutions. Psychology studies have revealed that the human brain is better at recognizing and recalling images than text graphical passwords are intended to capitalize on this human characteristic in hopes that by reducing the memory burden on users, coupled with a larger full password space offered by images, more secure passwords can be produced and users will not resort to unsafe practices in order to cope speakers of any language.

We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of images.The next image is based on the previous click-point. We present the results of an initial user study which revealed positive results. Performance was very good in terms of speed, accuracy, and number of errors. Users preferred CCP to Pass Points (Wiedenbecketal., 2005), saying that selecting and remembering only one point per image was easier, and that seeing each image triggered their memory of where the corresponding point was located. We also suggest that CCP provides greater security than Pass Points because the number of images increases the workload for attackers or a sequence of images. The next image displayed is based on the previous click-point so users receive immediate implicit feedback as to whether they are on the correct path when logging in. CCP offers both improved usability and security.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#2
01-01-2011, 12:05 PM




Chhavi Saxena
Hemu Sharma
Mini Saxena
Sonal Chittranshi



.doc   GRAPHICAL PASSWORD AUTHENTICATION USING CUED POINT TECHNOLOGY.doc (Size: 302.5 KB / Downloads: 489)


ABSTRACT:-
Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots – portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks.



INTRODUCTION:-
People select predictable passwords. This occurs with both textbased and graphical passwords. Users tend to choose passwords that are memorable in some way, which unfortunately often means that the passwords tend to follow predictable patterns that are easier for attackers to exploit. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. An authentication system should encourage strong passwords while still maintaining memorability.


PROPOSED WORK:_
Graphical passwords offer an alternative to text-based passwords that is intended to be more memorable and usable because graphical passwords rely on our ability to more accurately remember images than text . Several forms of graphical passwords have been proposed. Our proposed system allows user choice while attempting to influence users to select stronger passwords. It also makes the task of selecting a weak password (easy for attackers to predict) more tedious, in order to discourage users from making such choices. In effect, our scheme makes choosing a more secure password the “path-of-leastresistance”.
In this passwords are created by positioning a “template” over a background image so that the user’s secret areas fall within the cut-out portions of the template. They found that users had difficulty remembering the position of their template and selected similar areas of the images. We focus primarily on click-based graphical passwords. In PassPoints passwords consist of a sequence of five clickpoints on a given image. Users may select any pixels in the image as click-points for their password. To log in, they repeat the sequence of clicks in the correct order. Each click must be within a system-defined tolerance region of the original click-point. It was found that although relatively usable, security concerns remain. The primary security problem is hotspots: different users tend to select similar click-points as part of their passwords. Attackers who gain knowledge of these hotspots through harvesting sample passwords or through automated image processing techniques can build attack dictionaries and more successfully guess PassPoints passwords . A dictionary attack consists of using a list of potential passwords (ideally in decreasing order of likelihood) and trying each on the system in turn to see if it leads to a correct login for a given account. Attacks can target a single account, or can try guessing passwords on a large number of accounts in hopes of breaking into any of them.
To reduce the security impact of hotspots and further improve usability, we proposed an alternative click-based graphical password scheme called Cued Click-Points .






Reply
priyatweety
Active In SP
**

Posts: 5
Joined: Mar 2010
#3
16-03-2011, 10:27 PM

can u send the document and ppt for Graphical Password Authentication using Cued Click Points (CCP)

it is urgent.............................
Reply
coolboy007
Active In SP
**

Posts: 1
Joined: Mar 2011
#4
31-03-2011, 07:43 AM

I too need ppts on this topic plz frwd me......................
its very urgent
(coolrokz21@hotmail.com)
Reply
divyang05
Active In SP
**

Posts: 1
Joined: Aug 2011
#5
24-08-2011, 11:56 PM

Hi!
I am Divyang Shah.
I am Final Year Engg Student.
I like this topic and decided to do this project and implimentation.
So can i get the detailed info on this.
My email id is- divyang05@gmail.com
Thank You,

With regards,
Divyang.
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#6
25-08-2011, 09:36 AM




To get more information about the topic " Graphical Password Authentication using Cued Click Points" please refer the link below

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815
Reply
harish1234
Active In SP
**

Posts: 4
Joined: Feb 2012
#7
09-02-2012, 07:30 PM

Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#8
10-02-2012, 10:53 AM

to get information about the topic Graphical Password Authentication using Cued Click Points full report ,ppt and related topic refer the link bellow

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815

topicideashow-to-controlling-data-dictionary-attacks-using-graphical-password-and-data-hiding-in-video
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#9
13-03-2012, 10:55 AM

to get information about the topic Graphical Password Authentication using Cued Click Points full report ,ppt and related topic refer the link bellow

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815

topicideashow-to-controlling-data-dictionary-attacks-using-graphical-password-and-data-hiding-in-video
Reply
seminar ideas
Super Moderator
******

Posts: 10,003
Joined: Apr 2012
#10
12-07-2012, 09:57 AM

to get information about the topic Graphical Password Authentication using Cued Click Points full report ,ppt and related topic refer the link bellow

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815

topicideashow-to-controlling-data-dictionary-attacks-using-graphical-password-and-data-hiding-in-video
Reply
Guest
Thinking To Register

 
#11
08-08-2013, 11:10 AM

pls mail the source code at yogu.karekar@gmail.com
Reply
study tips
Super Moderator
******

Posts: 10,180
Joined: Feb 2013
#12
09-08-2013, 09:32 AM

To get full information or details of Graphical Password Authentication using Cued Click Points please have a look on the pages

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp--16815

topicideashow-to-graphical-password-authentication-using-cued-click-points-full-report

topicideashow-to-graphical-password-authentication-using-cued-click-points--83305

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp

topicideashow-to-graphical-password-authentication-using-cued-click-points-ccp-ppt

if you again feel trouble on Graphical Password Authentication using Cued Click Points please reply in that page and ask specific fields
Reply
abdulmaalik
Active In SP
**

Posts: 1
Joined: Nov 2015
#13
13-11-2015, 03:15 PM

(01-01-2011, 12:05 PM)seminar surveyer Wrote:



Chhavi Saxena
                                                  Hemu Sharma
                                         Mini Saxena
                                         Sonal Chittranshi


can u plz email me its source code at abmaalik@yahoo.com


ABSTRACT:-
Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective password space. In click-based graphical passwords, poorly chosen passwords lead to the emergence of hotspots – portions of the image where users are more likely to select click-points, allowing attackers to mount more successful dictionary attacks.  



INTRODUCTION:-
People select predictable passwords. This occurs with both textbased and graphical passwords. Users tend to choose passwords that are memorable in some way, which unfortunately often means that the passwords tend to follow predictable patterns that are easier for attackers to exploit. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. An authentication system should encourage strong passwords while still maintaining memorability.


PROPOSED WORK:_
Graphical passwords offer an alternative to text-based passwords that is intended to be more memorable and usable because graphical passwords rely on our ability to more accurately remember images than text . Several forms of graphical passwords have been proposed. Our proposed system allows user choice while attempting to influence users to select stronger passwords. It also makes the task of selecting a weak password (easy for attackers to predict) more tedious, in order to discourage users from making such choices. In effect, our scheme makes choosing a more secure password the “path-of-leastresistance”.    
In this passwords are created by positioning a “template” over a background image so that the user’s secret areas fall within the cut-out portions of the template. They found that users had difficulty remembering the position of their template and selected similar areas of the images. We focus primarily on click-based graphical passwords. In PassPoints passwords consist of a sequence of five clickpoints on a given image. Users may select any pixels in the image as click-points for their password. To log in, they repeat the sequence of clicks in the correct order. Each click must be within a system-defined tolerance region of the original click-point. It was found that although relatively usable, security concerns remain. The primary security problem is hotspots: different users tend to select similar click-points as part of their passwords. Attackers who gain knowledge of these hotspots through harvesting sample passwords or through automated image processing techniques can build attack dictionaries and more successfully guess PassPoints passwords . A dictionary attack consists of using a list of potential passwords (ideally in decreasing order of likelihood) and trying each on the system in turn to see if it leads to a correct login for a given account. Attacks can target a single account, or can try guessing passwords on a large number of accounts in hopes of breaking into any of them.  
To reduce the security impact of hotspots and further improve usability, we proposed an alternative click-based graphical password scheme called Cued Click-Points .







Reply
Guest
Thinking To Register

 
#14
06-02-2016, 10:04 PM

hi i need the source code for cued click point concept....
can you send me the document as soon as possible...
Reply
Dhanabhagya
Super Moderator
******

Posts: 660
Joined: May 2016
#15
31-10-2016, 02:06 PM

Abstract
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of images. The next image is based on the previous click-point. We present the results of an initial user study which revealed positive results. Performance was very good in terms of speed, accuracy, and number of errors. Users preferred CCP to PassPoints (Wiedenbeck et al., 2005), saying that selecting and remembering only one point per image was easier, and that seeing each image triggered their memory of where the corresponding point was located. We also suggest that CCP provides greater security than PassPoints because the number of images increases the workload for attackers.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MABS: Multicast Authentication Based on Batch Signature seminar class 20 12,316 03-07-2014, 06:19 PM
Last Post: Guest
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 722 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  Graphical Password authentication system seminar poster 0 604 29-10-2013, 12:05 PM
Last Post: seminar poster
  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering report seminar projects maker 0 455 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 429 29-08-2013, 02:15 PM
Last Post: study tips
  IMAGE BASED PASSWORD AUTHENTICATION FOR ILLITERATES WITH TOUCH SCREEN REPORT study tips 0 388 17-08-2013, 01:10 PM
Last Post: study tips
  A Secret-Sharing-Based Method for Authentication of Grayscale Document Images pdf study tips 0 421 19-07-2013, 02:09 PM
Last Post: study tips
  Implementation of Secured password for Web applications using two server model pdf study tips 0 382 12-07-2013, 02:04 PM
Last Post: study tips
  MOBILE CLOUD COMPUTING SECURITY USING TRANSIENT AUTHENTICATION SYSTEM REPORT study tips 0 571 20-06-2013, 04:39 PM
Last Post: study tips
  IMAGE RETRIEVAL USING BOTH COLOR AND TEXTUAL FEATURES USING GLCM ABSTRACT study tips 0 417 08-06-2013, 02:13 PM
Last Post: study tips