Ashwini G S

Baakhira Sultana

Vipul Chandraker

Mr, Paniramprasad
Associate Professor
Dept. of CSE


Page 1

CLCD. To overcome some of the shortcomings of the textual passwords. M T  To provide secured password to the users. Text passwords have to satisfy the requirements like passwords have to be easily remembered by the user and have to be hard to guess by the attacker. A graphical password is an authentication system that works by having the user select from images. It is a fundamental component in most security contexts and provides the basis for access control and user's accountability. in a specific order. presented in a graphical user interface (GUI).  To allow the user to access accounts through image based password. MISSION To implement Graphical Password Authentication System using ARM Processor along with GLCD. While there are various types of user authentication systems. dictionary attack. graphical objects are to be utilized. alphanumerical username/passwords are the most common type of user authentication. shoulder-surfing.GRAPHICAL PASSWORD AUTHENTICATION SYSTEM VISION To Design and Develop an Extremely secure Graphical Password Authentication System using UTLK kit in Normal mode. BITM BELLARY Page 2 . I B  To provide easily memorable password to the users. key loggers. ABSTRACT Authentication in the computer world refers to the act of confirming the authenticity of user's digital identity claim. OBJECTIVES  To design a graphical authentication system. Graphical passwords may offer better security than text-based passwords because MTLC. But the text based username and password is vulnerable to guessing. 7-SEGMENT Display and Console in Normal mode.

in an attempt to memorize text-based passwords. 3.000. They are attractive since people usually remember pictures better than words. In this paper the users are encouraged to select more random. use plain words. A GRAPHICAL PASSWORD AUTHENTICATION SYSTEM Ahmad Almulhem Graphical passwords provide a promising alternative to traditional alphanumeric passwords. An important usability goal for authentication systems is to support users in selecting better passwords. Pankaja Patil AUTHENTICATION I B USING PERSUASIVE The paper focuses on the integrated evaluation of the Persuasive Cued Click Points graphical password authentication system.000. it would take (on average) millions of years to break into the system by hitting it with random image sequences. rather than the recommended jumble of characters. In this project. BITM BELLARY Page 3 . MTLC. because many people. or 10 quadrillion (10. there are 1008. in an attempt to memorize text-based passwords. We describe its operation with some examples. Passwords are more likely to remember and recognized if they are presented as pictures rather than as words. and highlight important aspects of the system. click-points on the image. 2.000. If there are 100 images on each of the 8 pages in an 8-image password.000. GRAPHICAL PASSWORD CUED CLICK POINT Iranna A M. possible combinations that could form the graphical password! If the system has a built-in delay of only 0. Thus. LITERATURE SURVEY 1. In case of graphical password. and hence more difficult to guess. we propose a simple graphical password authentication system. thus increasing security by expanding the effective password space. In this approach the user enters the password by clicking on a set of images followed by specific pixels of image(point of interest). graphical password presumably delivers a higher usability compared to text-based passwords.1 second following the selection of each image until the presentation of the next page. GRAPHICAL PASSWORD Nirbhay kumar jha This paper discuss about Graphical passwords that may offer better security than textbased passwords. use plain words (rather than the recommended jumble of characters). including usability and security. Graphical authentication has been proposed as a user-friendly alternative to password generation and authentication.GRAPHICAL PASSWORD AUTHENTICATION SYSTEM many people. In M T this extended abstract.000).

Universities and Colleges 2. AUTHENTICATION USING GRAPHICAL PASSWORDS: BASIC RESULTS Susan Wiedenbeck. S. 5. The passwords require the following fundamentally requirements so that the problems with passwords arises. SECURITY ANALYSIS OF GRAPHICAL PASSWORDS OVER THE ALPHANUMERIC PASSWORDS G.GRAPHICAL PASSWORD AUTHENTICATION SYSTEM 4. Birget Alex Brodskiy In this paper the Pass-Points system is discussed.S. and the user authentication protocol should be executable quickly and easily by humans. while they have to be hard to be guessed by an impostor MTLC. Shukla M T This paper gives comparison between the different graphical password schemes and the alphanumeric passwords. empirically test its usability. Singh. (b) Passwords should be secure. including graphical passwords.e. Smart phone Users Brain Storming Session on potential Users 1. they should look random and should be hard to guess. Today other methods. Jean-Camille. the determination of whether a user should be allowed access to a given system or resource. I B (a) Passwords should be easy to remember. BITM BELLARY Page 4 . The significance of this research is the provision of a flexible graphical password system with extensive human factors data to support it. Banks-For ATM Usage 3. alphanumeric passwords have been used for authentication. This paper reports on research aimed to design a new kind of graphical password system. and compare it to alphanumeric passwords. i. A key area in security research is authentication. Traditionally. POTENTIAL USERS 1. What are the requirements of alphanumeric password? Alphanumerical passwords are required to satisfy two contradictory requirements. Agarwal1. R. They have to be easily remembered by a user. are possible alternatives. On-line Transactions 4. but they are known to have security and usability problems.

e. and the user authentication protocol M T should be executable quickly and easily by humans.GRAPHICAL PASSWORD AUTHENTICATION SYSTEM 2. What are Graphical Passwords? Graphical passwords refer to using pictures (also drawings) as passwords. they should look random and should be hard to guess. i. simple passwords that are easily guessable. Why Graphical Passwords? Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and. 4. 5. Using a graphical password. Why Graphical Passwords are needed? Graphical Passwords are easier to recall. 8. If a password is not frequently used it will be even more susceptible to forgetting. selecting a series of tiles. therefore. or by drawing a series of lines on the screen. more secure. less likely to be written down and have the potential to provide a richer symbol space than text based passwords. What type of passwords user selects? The recent surveys have shown that users select short. 3. BITM BELLARY Page 5 . I B 6. people regularly forget their passwords. The main problem with the alphanumeric passwords is that once a password has been chosen and learned the user must be able to recall it to log in. 9. What are the fundamental requirements of the passwords? Passwords should be easy to remember. Passwords should be secure. names of pets. What are the problems with Text based passwords. How to use Graphical Passwords? a user might authenticate by clicking a series of points on an image. 7. Does users forget their passwords? But. Graphical passwords are easier to remember. since humans remember pictures better than words. Example personal names of their family members. users click on images rather than type alphanumeric characters MTLC. date of birth etc.

a user is asked to reproduce something that he or she created or selected earlier during the registration stage. What are different types of Graphical Passwords? graphical passwords techniques are classified into two main categories: recognition-based and recall based graphical techniques 11. What is recognition-based technique? In recognition-based techniques. a user is authenticated by challenging him/her to identify one or more images he or she chooses during the registration stage. 13.GRAPHICAL PASSWORD AUTHENTICATION SYSTEM 10. What is recall-based technique? In recall-based techniques. 12. Which method is used for the project? This project is based on recall based Technique M T I B MTLC. BITM BELLARY Page 6 .