![Page 1: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/1.jpg)
Comprehensive study of the usability
features of the Graphical Password
1
![Page 2: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/2.jpg)
1. INTRODUCTION
2. CURRENT AUTHENTICATION METHODS
3.DRAWBACKS OF NORMAL PASSWORD
4.WHY DO WE USE GRAPHICAL PASSWORD?
5. RECOGNITION BASED TECHNIQUES
6.RECALL BASED TECHNIQUES
7.CONCLUSION
8.REFERENCES
9.WORDS OF GRATITUDE
CONTENTS
2
![Page 3: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/3.jpg)
Current authentication methods
Token based authentication ( key cards,bank cards,smart cards)
Biometric based (fingerprint,iris scan,facial recognition)
Knowledge based (text based and picture based passwords)
3
Introduction
![Page 4: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/4.jpg)
4
1Token based authentication
![Page 5: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/5.jpg)
Current authentication methods
Token based authentication
( key cards,bank cards,smart cards) Biometric based
(fingerprint,iris scan,facial recognition) Knowledge based
(text based and picture based passwords)
5
Introduction
![Page 6: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/6.jpg)
6
2,Biometric based
![Page 7: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/7.jpg)
Current authentication methods
Token based authentication
( key cards,bank cards,smart cards) Biometric based
(fingerprint,iris scan,facial recognition) Knowledge based
(text based and picture based passwords)
7
Introduction
![Page 8: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/8.jpg)
8
3,Knowledge baseda) text based
![Page 9: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/9.jpg)
9
3,Knowledge basedb)picture based
![Page 10: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/10.jpg)
Drawbacks of normal password
Easy to guess Harder passwords are not easy to remember Dictionary attack-successively trying all the
words in an exhaustive list called a dictionary Bruteforce attack-tries to use every possible
character combinations as a password Key-space is limited to 64 ASCII characters
10
![Page 11: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/11.jpg)
Why do we use graphical password?
More secure More memorable Easier for people to use A picture worth thousand passwords Offers much larger keyspace Cued recall,which helps users to remember a
password based on picture displayed and not just memory alone
Divided into two-recognition method and recall based methods
11
![Page 12: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/12.jpg)
12
Graphical password?
Divided into two
Recognition method Recall based methods
![Page 13: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/13.jpg)
13
Recognition based technique
A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he or she selected during the registration stage
![Page 14: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/14.jpg)
Methods for recognition based technique
Dhamija and Perrig algorithmSobrado and Birget algorithmJansen et al. algorithmPassface algorithm
14
![Page 15: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/15.jpg)
Dhamija and Perrig algorithm
15
Based on hash visualization technique
![Page 16: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/16.jpg)
16
User will be asked to select certain number of images from a set of random pictures generated by a program
Later, user will be required to identify the pre-selected images to be authenticated
![Page 17: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/17.jpg)
Drawbacks
SHOULDER-SURFING
using direct observation techniques,
such as looking over someone's shoulder,
to get information
Longer login time
17
![Page 18: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/18.jpg)
Sobrado and Birget algorithmOvercome the shoulder-surfing attacks
Login time can be reduced
Several schemes are there, eg.triangle scheme,moveable frame scheme,special geometric configuration scheme
18
![Page 19: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/19.jpg)
Triangle scheme
19
![Page 20: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/20.jpg)
20
A user needs to selects their pass-object among many displayed object
To be authenticated, a user needs to recognize all the pre-selected pass-object which was selected during the registration phase.
The user requires to click inside the convex-hull which formed by the pass-object
![Page 21: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/21.jpg)
21
Moveable frame scheme
![Page 22: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/22.jpg)
22
This scheme is similar to their previous scheme but, only three pass objects were involved in this technique.
One of the pass-objects is placed into the moveable frame.
To be authenticated, the user needs to rotate the frame until all the pass-object is located in a straight line
![Page 23: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/23.jpg)
Jansen et al. algorithm
23
Select a sequence of thumbnail photo to form a password
Designed especially for mobile devices such as PDAs
![Page 24: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/24.jpg)
24
Throughout the password creation, a user has to select the theme first e.g. sea and shore,
Afterward, a user has to selects and registers a sequence of the selected thumbnail photo to form a password .
The user needs to recognize and identify the previously seen photos and touch it by using stylus with the correct sequence in order to be authenticated
![Page 25: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/25.jpg)
Passface algorithm
25
![Page 26: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/26.jpg)
26
Based on the assumption that human can recall human faces easier than other pictures
User are requires to select the previously seen human face picture from a grid of nine faces which one of the face is the known face and the rest is the decoy faces
![Page 27: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/27.jpg)
27
This step continuously repeated until all the four face is identified. User needs to recognize all the face selected during the enrollment stage. User is authenticated if all the correct face is successfully identified.
![Page 28: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/28.jpg)
28
Takada and koike
Allow users to use their favourite image for authentication
First register their favourite images with the server
![Page 29: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/29.jpg)
29
Recall based techniques
A user is asked to reproduce something that he or she created or selected earlier during the registration stage
![Page 30: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/30.jpg)
Methods for recall based techniques
Passlogix scheme DAS scheme Signature scheme
30
![Page 31: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/31.jpg)
Passlogix scheme “Repeating a sequence of actions” Creating a password by a chronological
situation
31
![Page 32: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/32.jpg)
32
User can select their background images based on the environment, for example in the kitchen, bathroom, bedroom or etc
To enter a password, user can click and/or drag on a series of items within that image.
![Page 33: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/33.jpg)
33
For example in the kitchen environment, user can prepare a meal by selecting cooking ingredients, take fast food from fridge and put it in the microwave oven, select some fruits and wash it in washbasin and then put it in the clean bowl.
![Page 34: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/34.jpg)
DAS scheme“Draw-a-secret” based on two dimensional gridUsers can draw a password as long as they wish
34
![Page 35: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/35.jpg)
Signature scheme There is no need to memorize one’s
signature and signatures are hard to fake
35
![Page 36: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/36.jpg)
Conclusion
In this paper, we have conducted a comprehensive study of existing graphical password techniques
We have found that the graphical passwords schemes is more difficult to be cracked by using the traditional attack methods.
36
![Page 37: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/37.jpg)
References
37
Ieee papers
www.graphicalpassword.net
R. Dhamija and A. Perrig. “Déjà vu: A User Study Using Images forAuthentication
wikipedia
![Page 38: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/38.jpg)
THANK YOU
38
![Page 39: Comprehensive study of the usability features of the Graphical Password](https://reader034.vdocuments.us/reader034/viewer/2022051514/54b699e24a795963218b4698/html5/thumbnails/39.jpg)
39