Data Security with images through Click Points PRESENTED BY- SARIA AFZAL and MANSI GUPTA
Picture password authentication The two most commonly used techniques in picture password authentication are- Recognition based techniques Recall based techniques
Recognition and recall Recognition based techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. Recall based techniques A user is asked to reproduce something that he created or selected during the registration stage .
PICTURE PASSWORD AUTHENTICATION
MODULE 1 USER REGISTRATION PROCESS
User registration process REGISTER Click on REGISTER button Enter the general entries in their respective fields user Verify the entries and enter in the database
Module 2 picture selection process
How to select the picture?
After selecting a picture User click on the point Select another point Point and the image will be stored in the database
Module 3 system login process
Username verification process Username verification Checks the username in the database Correct image If username not matched Incorrect username User enters the username Reenter the username
Click point verification process Database contains saved picture and point Correct username
Correct click point opens the system protected with password
Advantages of picture password Pictures are easy to remember. Graphical password schemes provide a way of making more human friendly passwords. Security of the system is very high. Dictionary attacks are infeasible.
Drawbacks of picture password Password registration and log-in process are long. Require much more storage space than text based passwords. Not suitable for visually disabled people . Shoulder surfing.
Do’s and don’ts for secured password Do’s Use easy to remember picture. Avoid dark spots on the picture while selecting the click point. Choose 3 to 5 pictures for more stronger password. As the number of pictures increases the password become more tight. Don’ts Do not use too much bright and black pictures for password.
Technique used- Recall based techniques Technology used- Java Tools- Netbeans6.9.1 Oracle database A pache Possible A tta cks- Guessing Shoulder surfing
Applications of picture password system Hard disk locking. System login and logout process. Folder locking. Web login applications.
conclusions Picture password is an alternative to an textual alphanumeric passwords. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. picture password is still immature, more research is required in this field.