Data security with Images through clickpoints

saria11 207 views 20 slides Mar 21, 2016
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

No description available for this slideshow.


Slide Content

Data Security with images through Click Points PRESENTED BY- SARIA AFZAL and MANSI GUPTA

Picture password authentication The two most commonly used techniques in picture password authentication are- Recognition based techniques Recall based techniques

Recognition and recall Recognition based techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. Recall based techniques A user is asked to reproduce something that he created or selected during the registration stage .

PICTURE PASSWORD AUTHENTICATION

MODULE 1 USER REGISTRATION PROCESS

User registration process REGISTER Click on REGISTER button Enter the general entries in their respective fields user Verify the entries and enter in the database

Module 2 picture selection process

How to select the picture?

After selecting a picture User click on the point Select another point Point and the image will be stored in the database

Module 3 system login process

Username verification process Username verification Checks the username in the database Correct image If username not matched Incorrect username User enters the username Reenter the username

Click point verification process Database contains saved picture and point Correct username

Correct click point opens the system protected with password

Advantages of picture password Pictures are easy to remember. Graphical password schemes provide a way of making more human friendly passwords. Security of the system is very high. Dictionary attacks are infeasible.

Drawbacks of picture password Password registration and log-in process are long. Require much more storage space than text based passwords. Not suitable for visually disabled people . Shoulder surfing.

Do’s and don’ts for secured password Do’s Use easy to remember picture. Avoid dark spots on the picture while selecting the click point. Choose 3 to 5 pictures for more stronger password. As the number of pictures increases the password become more tight. Don’ts Do not use too much bright and black pictures for password.

Technique used- Recall based techniques Technology used- Java Tools- Netbeans6.9.1 Oracle database A pache Possible A tta cks- Guessing Shoulder surfing

Applications of picture password system Hard disk locking. System login and logout process. Folder locking. Web login applications.

conclusions Picture password is an alternative to an textual alphanumeric passwords. It satisfies both conflicting requirements i.e. it is easy to remember & it is hard to guess. picture password is still immature, more research is required in this field.

Thank you…
Tags