graphical user based authentication
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 3
Joined: Dec 2009
30-12-2009, 01:52 AM

hi, just need materials and procedures to carry out a project and implimentation on this topic- graphical user based authentication

Posts: 213
Joined: Dec 2009
30-12-2009, 11:28 PM

user authentication is an important topic in information security. Graphical authentication has been proposed as a possible alternative solution to text-based authentication.Humans can remember images better than text and hence graphical user authentication is advantageous. Drawbacks of normal password appear like stolen
the password, forgetting the password, and weak password.Graphical passwords have two different aspects which are usability and security but none of them have both these qualities together.The graphical passwords must be
a) Password should be easy to remember.
b) Password should be secured.

an image would appear on the screen and the user if clicks on the correct regions were clicked in, the user would be authenticated.

The Picture superiority effect is the basis for these techniques.These can be categorized into three:
1)Recognition-Based Technique
users will choose pictures, icons or
symbols from a collection of images

2) Pure Recall-Based Technique
Here, users need to reproduce their passwords without being given any reminder, hints or gesture.

3)Cued Recall-Based Technique
a framework of reminder, hints and gesture that help the users to reproduce their passwords or help users to make a reproduction.

eight recognitionbased algorithms are described:

Passface Scheme
the users select whether their Passface consist of male or female picture. Then they choose four faces from the database as their future password.For authentication, user must correctly identify their four Passfaces twice in a row with no prompting, entering an
enrolment password.

Déjà vu Scheme
This scheme is implemented by letting users to select specific number of pictures among large images portfolio. For preventing description attack, pictures are created according to random art.

Triangle Scheme
Here, the system randomly put a set of N objects which could be a hundred or
a thousand on the screen. In addition, there is a subset of K
objects previously chosen and memorized by the user. In
other words, these K objects are the user passwords.

Movable Frame Scheme
In this method the user must locate three out of K objects which
these three are user passwords.

Picture Password Scheme
during enrollment, a user selects a theme identifying the thumbnail photos to be applied and then registers a sequence of thumbnail images that are used as a future password. These are mainly used in PDA's.

Story Scheme[u]
the users have to select their passwords from the mixed pictures of nine categories in order to make a story easily to remember.Categories maybe animals, cars,
women, food, children, men, objects, nature and sport.

[u]Jetafida Scheme

during registration, the user will select three pictures as a password and then sort
them according to the way he wanted to see them in login phase.

1)Password Brute Forcing Attack
the attacker tries every possible value for a password until they get the real one.

2)Dictionary Based Password Attack
an attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account.

3)Guessing Attack
As many users try to select their passwords based on
their personal information which can be easily guessed by attackers.

4)Spyware Attack
Spyware is a type of malware which installed on
computers with the aim of collecting sensitive information of
users, using a key logger or key listener

5)Shoulder Surfing Attack
using direct observation techniques, such as looking over someone's shoulder, to get

6)Social Engineering Attack
an attacker uses human interaction
to obtain or compromise information about an organization
or computer systems, so he claimed to be one of employee in
order to gain identity.

Full seminar and presentation report download:

.pdf   graphical user based authentication.pdf (Size: 1,008.2 KB / Downloads: 127)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Does any one help in interfacing of graphical lcd to lpc2148 arm controller ? vijay.amrutkar 0 325 19-03-2014, 12:56 AM
Last Post: vijay.amrutkar
Wink image based password authentication for illeterates with touch screen Guest 2 1,200 30-09-2013, 02:51 PM
Last Post: seminar projects maker
  Capturing Hand or Wrist Vein Images for Biometric Authentication $rilatha 1 436 22-08-2013, 09:44 AM
Last Post: study tips
  Watermarking for video authentication Guest 1 367 21-08-2013, 09:50 AM
Last Post: study tips
  Organizing User Search Histories Guest 1 334 16-08-2013, 09:33 AM
Last Post: study tips
  graphical password authentication Guest 1 382 13-08-2013, 09:41 AM
Last Post: study tips
  graphical password authentication Guest 0 281 12-08-2013, 07:33 PM
Last Post: Guest
  graphical password authentication Guest 1 364 12-08-2013, 09:22 AM
Last Post: study tips
  A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Site Guest 0 339 05-08-2013, 03:18 PM
Last Post: Guest
Last Post: study tips