Вы находитесь на странице: 1из 13

Seminar Report 1

GRAPHICAL PASSWORD
AUTHENTICATION

Abstract

The most common computer


authentication method is to use alphanumerical
usernames and passwords. This method has been
shown to have significant drawbacks. For example,
users tend to pick passwords that can be easily
guessed. On the other hand, if a password is hard to
guess, then it is often hard to remember.

To address this problem, some


researchers have developed authentication methods
that use pictures as passwords. In this paper, we
conduct a comprehensive survey of the existing
graphical password techniques. We classify these
techniques into two categories: recognition-based
and recall-based approaches. We discuss the
strengths and limitations of each method
and point out the future research directions in this
area.

We also try to answer two important


questions: “Are graphical passwords as secure as
text-based passwords?”; “What are the major design
and implementation issues for graphical passwords”.
In this paper , we are conducting a comprehensive

www.seminarsTopics.com
Seminar Report 2

survey of existing graphical image password


authentication techniques. Also we are here
proposing a new technique for graphical
authentication.
hard to guess or break are
often hard to remember.
Studies showed that since
user can only remember a
limited number of
passwords, they tend to
write them down or will
use the same passwords
for different accounts. To
address the problems with
traditional username-
password authentication,
Introduction: alternative authentication
methods, such as
Human factors are often biometrics, have been
considered the weakest used. In this paper,
link in a computer security however, we will focus on
system. pointout that there another alternative: using
are three major areas pictures as passwords.
where human-computer Graphical password
interaction is important: schemes have been
authentication, security proposed as a possible
operations, and developing alternative to text-based
secure systems. Here we schemes, motivated
focus on the authentication partially by the fact that
problem.On the other humans can remember
hand, passwords that are pictures better than text;

www.seminarsTopics.com
Seminar Report 3

psychological studies method and also point out


supports such assumption. future research directions
Pictures are generally in this area. In this paper,
easier to be remembered we want to answer the
or recognized than text. In following questions:
addition, if the number of  Are graphical
possible pictures is passwords as secure as
sufficiently large, the text passwords?
possible password space  What are the major
design and
of a graphical password implementation issues for
scheme may exceed that graphical passwords?
of text-based schemes and Overview of the
thus presumably offer Authentication
Methods:
better resistance to
Current authentication
dictionary attacks.
methods can be divided
Because of these
into
advantages, there is a
Three main areas:
growing interest in
 Token
graphical password. In
based
addition to workstation
authentication
and web log-in
 Biometric
applications, graphical
based
passwords have also been
authentication
applied to ATM machines
 Knowledge
and mobile devices.
based
In this paper, we conduct a
authentication
comprehensive survey
Token based techniques,
ofthe existing graphical
such as key cards, bank
password techniques. We
cards and smart cards are
will discuss the strengths
widely used. Many token-
and limitations of each

www.seminarsTopics.com
Seminar Report 4

based authentication techniques can be further


systems also use divided into two
knowledge based categories: recognition-
techniques to enhance based and recall-based
security. For example, graphical techniques.
ATM cards are generally Using recognition-based
used together with a PIN techniques, a user is
number. presented with a set of
images and the user passes
Biometric based the authentication by
authentication techniques, recognizing and
such as fingerprints, iris identifying the images he
scan, or facial recognition, or she selected during the
are not yet widely registration stage. Using
adopted. The major recall-based techniques, a
drawback of this approach user is asked to reproduce
is that such systems can be something that he or she
expensive, and the created or selected earlier
identification process can during the registration
be slow and often stage.
unreliable. However, this Recognition Based
type of technique provides Techniques
he highest level of
security. Dhamija and Perrig
Knowledge based proposed a graphical
techniques are the most authentication scheme
widely used authentication based on the
techniques and include HashVisualization
both text-based and technique . In their
picture-based passwords. system, the user is asked
The picture-based to select a certain number

www.seminarsTopics.com
Seminar Report 5

of images from a set of


random pictures generated
by a program . Later, the
user will be required to
identify the pre selected Random images used by
Dhamija and Perrig
images in order to be
authenticated. The results Sobrado and Birget
showed that 90% of all developed a graphical
participants succeeded in password technique that
the authentication using deals with the shoulder-
this technique, while only surfing problem. In the
70% succeeded using text- first scheme, the system
based passwords and will display a number of
PINS. The average log-in pass-objects (pre-selected
time, however, is longer by user) among many
than the traditional other objects. To be
approach. A weakness of authenticated, a user needs
this system is that the to recognize pass-objects
server needs to store the and click inside the
seeds of the portfolio convex hull formed by all
images of each user in the pass-objects.In order
plain text. Also, the to make the password hard
process of selecting a set to guess, Sobrado and
of pictures from the Birget suggested using
picture database can be 1000 objects, which
tedious and time makes the display very
consuming for the user. crowded and the objects
almost indistinguishable,
but using fewer objects
may lead to a smaller
password space, since the

www.seminarsTopics.com
Seminar Report 6

resulting convex hull can number of pictures as


be large. In their second pass-objects. Each pass-
algorithm, a user moves a object has several variants
frame (and the objects and each variant is
within it) until the pass assigned a unique code.
object on the frame lines During authentication, the
up with the other two user is challenged with
pass-objects. The authors several scenes. Each scene
also suggest repeating the contains several pass-
process a few more times objects (each in the form
to minimize the likelihood of a randomly chosen
of logging in by randomly variant) and many decoy-
clicking or rotating. The objects. The user has to
main drawback of these type in a string with the
algorithms is that the log unique codes
in process can be slow. corresponding to the pass-
object variants present in
the scene as well as a code
indicating the relative
location of the pass-
objects in reference to a
pair of eyes. The argument
is that it is very hard to
crack this kind of
A shoulder-surfing
password even if the
resistant
graphical password
whole authentication
scheme process is recorded on
video because where is no
Man, et al. proposed
mouse click to give away
another shoulder-surfing
the pass-object
resistant algorithm. In this
information. However, this
algorithm, a user selects a

www.seminarsTopics.com
Seminar Report 7

method still requires users .

to memorize the
alphanumeric code for
each pass-object variant.
Hong, et al. later extended
this approach to allow the
user to assign their own
photos and then
codes to pass-object
registers a sequence of
variants. However, this
images as a password
method still forces the
.During the
user to memorize many
authentication, the user
text strings and therefore
must enter the registered
suffer from the many
images in the correct
drawbacks of text-based
sequence. One drawback
passwords.
of this technique is that
since the number of
thumb nail images is
limited to 30, the
password space is small.
Each thumbnail image is

An example of
assigned a numerical
Passfaces value, and the sequence
Jansen et al proposed a of selection will
graphical password generate a numerical
mechanism for mobile password. The result
device .during the showed that the image
enrollment stage, a user sequence length was
selects a theme (e.g. sea, generally shorter than
cat, etc.) which consists of the textural password
thumbnail p length. To address this

www.seminarsTopics.com
Seminar Report 8

problem, two pictures order of the drawing.


can be combined to During authentication, the
compose a new alphabet user is asked to re-draw
element, thus expanding the picture. If the drawing
the image alphabet size. touches the same grids in
the same sequence, then
RECALL BASED the user is authenticated.
Reproduce a drawing: Jermyn, et al.
suggested that given
reasonable-length
passwords in a 5 X 5 grid,
the full password space of
DAS is larger than that of
the full text password
space.

A graphical password
scheme
proposed by
Jansen, et al
.
Jermyn, et al. proposed a
technique, called “Draw -
a - secret (DAS)”, which Draw-a-Secret (DAS)
allows the technique proposed by
user to draw their unique Jermyn, et al
password .A user is asked
Nali and Thorpe
to draw a simple picture
conducted further analysis
on a 2D
of the “Draw-A-Secret
grid. The coordinates of
(DAS)” scheme. In their
the grids occupied by the
study, users were asked to
picture are stored in the

www.seminarsTopics.com
Seminar Report 9

draw a DAS password on pixels and also in the


paper in order to correct sequence . This
determine if there are technique is based on the
predictable characteristics discretization method
in the graphical passwords proposed by Birget, et al. .
that people choose. The Because any picture can
study did not find any be used and because a
predictability in the start picture may contain
and end points for DAS hundreds to thousands of
password strokes, but memorable points, the
found that certain possible password space is
symmetries (e.g. crosses quite large.
and rectangles), letters,
and numbers were
common. The “PassPoint”
system by Wiedenbeck, et
al. extended Blonder’s
idea by eliminating the
predefined boundaries and
allowing arbitrary images
to be used. As a result, a An image used in the
user can click on any place Passpoint Sytem,
on an image (as opposed Wiedenbeck, et al
to some pre-defined areas) New Technique For
to create a password. A Graphical Password
tolerance around each Authentication
. Here we are poposing a
chosen pixel is calculated.
new algorithm of
In order to be
authentication using
authenticated, the user
graphical images.when
must click within the
a ;user tries to register
tolerance of their chosen over a network we will ask

www.seminarsTopics.com
Seminar Report 10

him or her to selet a theme


Step 1:User Step 8 User will
or sequence of pictures
will select an allow sufing on
from already given image image from website
frame.The local host data base as
password
downloads an image frame Othe
which contains various r
themes of sequence of wise
Step 2:Image If go
pictures which act as clustering passwor to
passwords,these are given will takes d step
place mathces
by server. Since any image
is made of pixels we have
its gray level Step
3:Distributes the Step 7: image gets
concentration. In this way clusters compared to
the image will be distorted throughout original
and cant be in original image space
form.so it is not easy for
hacker to reproduce the Step 4:password Step 6 Server
original form of image. stores as encrypted reproduce
password encrypted image
The flow chart of the
using neural
proposed technique is networks
given below. Step 5:For login user
wll again asked to
pick up an image
from database

www.seminarsTopics.com
Block diagram for the New The attack programs need to
Technique automatically generate accurate mouse

Is a graphical password as motion to imitate human input, which is


secure as text-based password? particularly difficult for recall based

Very little research has been done to graphical passwords. Overall, we believe

study the difficulty of cracking graphical a graphical password is less vulnerable

passwords. Because graphical passwords to brute force attacks than a text-based

are not widely used in practice, there is password.


Dictionary attacks
no report on real cases of breaking
graphical passwords. Here we briefly Since recognition based graphical
exam some of the possible techniques passwords involve mouse input instead
for breaking graphical passwords and try of keyboard input, it will be impractical
to do a comparison with text-based to carry out dictionary attacks against
passwords. this type of graphical passwords. For
Brute force search some recall basedgraphical passwords it

The main defense against brute force is possible to use a

search is to have a sufficiently large dictionary attack but an automated

password space. Text-based passwords dictionary attack will be much more

have a password space of 94^N, where complex than a text based dictionary

N is the length of the password, 94 is the attack. More research is needed in this

number of Printable characters area. Overall, we believe graphical

excluding SPACE. Some graphical passwords are less vulnerable to

password techniques have been shown dictionary attacks than text-based

to provide a password space similar to or passwords.


Guessing
larger than that of text-based passwords.
Unfortunately, it seems that graphical
Recognition based graphical passwords
passwords are often predictable, a
tend to have smaller password spaces
serious problem typically associated
than the recall based methods.
with text-based passwords. For example,
It is more difficult to carry out a brute
studies on the Passface technique have
force attack against graphical
shown that people often choose weak
passwords than text-based passwords.
and predictable graphical passwords. involving only a small number of users.
Nali and Thorpe’s study revealed We still do not have convincing
similar predictability among the evidence demonstrating that graphical
graphical passwords created with the passwords are easier to remember than
DAS technique . More research efforts text based passwords.
are needed to understand the nature of
graphical passwords created by real A major complaint among the users of
world users. graphical passwords is that the password
registration and log-in process take too
Shoulder surfing
Like text based passwords, most of long, especially in recognition-based

the graphical passwords are vulnerable approaches. For example, during the

to shoulder surfing. At this point, only a registration stage,a user has to pick

few recognition-based techniques are images from a large set of selections.

designed to resist shoulder-surfing . During authentication stage, a user has

None of the recall-based based to scan many images to identify a few

techniques are considered pass-images.

should-surfing resistant. Users may find this process long and


tedious. Because of this and also
What are the major design and because most users are not familiar with
implementation issues of
the graphical passwords, they often find
graphical passwords?
graphical passwords less convenient
Security than text based passwords.
In the above section, we have briefly Reliability
examined thesecurity issues with The major design issue for recall-based
graphical passwords.
methods is the reliability and accuracy
Usability
One of the main arguments for graphical of user input recognition. In this type of
passwords is that pictures are easier to method, the error tolerances have to be
remember than text strings. Preliminary set
user studies presented in some research carefully – overly high tolerances may
papers seem to support this. However, lead to many false positives while overly
current user studies are still very limited, low tolerances may lead to many false
negatives. In addition, the more error and there is not yet convincing evidence
tolerant the program, the more to support this argument. Our
vulnerable it is to attacks. preliminary analysis suggests that it is
Storage and communication more difficult to break graphical
Graphical passwords require much more
passwords using the traditional attack
storage spacethan text based passwords.
methods such as brute force search,
Tens of thousands of pictures may have
dictionary attack,or spyware. However,
to be maintained in a centralized
since there is not yet wide deployment
database. Network transfer delay is also
of graphical password systems, the
a concern for graphical passwords,
vulnerabilities of graphical passwords
especially for recognition-based
are still not fully understood.
techniques in which a large number of
Overall, the current graphical password
pictures may need to be displayed for
techniques are still immature. Much
each round of verification.
more research and user studies are
Conclusion: needed for graphical password
The past decade has seen a techniques to achieve higher levels of
growing interest in using graphical maturity and usefulness.
passwords as an alternative to the References:
traditional text-based passwords. In this
paper, we have conducted a [1] A. S. Patrick, A. C. Long, and S.
Flinn, "HCI and
comprehensive survey of existing Security Systems," presented at CHI,
graphical password techniques. The Extended
Abstracts (Workshops). Ft. Lauderdale,
current graphicalpassword techniques Florida, USA.,
can be classified into two categories: 2003.
[2] A. Adams and M. A. Sasse, "Users
recognition-based and recall-based are not the enemy:
techniques.. why users compromise computer
security mechanisms
Although the main argument for and how to take remedial measures,"
graphical passwords is that people are Communications
of the ACM, vol. 42, pp. 41-46, 1999.
better at memorizing graphical [3] K. Gilhooly, "Biometrics: Getting
passwords than text-based passwords, Back to Business," in
Computerworld, May 09, 2000.
the existing user studies are very limited

Вам также может понравиться