Академический Документы
Профессиональный Документы
Культура Документы
GRAPHICAL PASSWORD
AUTHENTICATION
Abstract
www.seminarsTopics.com
Seminar Report 2
www.seminarsTopics.com
Seminar Report 3
www.seminarsTopics.com
Seminar Report 4
www.seminarsTopics.com
Seminar Report 5
www.seminarsTopics.com
Seminar Report 6
www.seminarsTopics.com
Seminar Report 7
to memorize the
alphanumeric code for
each pass-object variant.
Hong, et al. later extended
this approach to allow the
user to assign their own
photos and then
codes to pass-object
registers a sequence of
variants. However, this
images as a password
method still forces the
.During the
user to memorize many
authentication, the user
text strings and therefore
must enter the registered
suffer from the many
images in the correct
drawbacks of text-based
sequence. One drawback
passwords.
of this technique is that
since the number of
thumb nail images is
limited to 30, the
password space is small.
Each thumbnail image is
An example of
assigned a numerical
Passfaces value, and the sequence
Jansen et al proposed a of selection will
graphical password generate a numerical
mechanism for mobile password. The result
device .during the showed that the image
enrollment stage, a user sequence length was
selects a theme (e.g. sea, generally shorter than
cat, etc.) which consists of the textural password
thumbnail p length. To address this
www.seminarsTopics.com
Seminar Report 8
A graphical password
scheme
proposed by
Jansen, et al
.
Jermyn, et al. proposed a
technique, called “Draw -
a - secret (DAS)”, which Draw-a-Secret (DAS)
allows the technique proposed by
user to draw their unique Jermyn, et al
password .A user is asked
Nali and Thorpe
to draw a simple picture
conducted further analysis
on a 2D
of the “Draw-A-Secret
grid. The coordinates of
(DAS)” scheme. In their
the grids occupied by the
study, users were asked to
picture are stored in the
www.seminarsTopics.com
Seminar Report 9
www.seminarsTopics.com
Seminar Report 10
www.seminarsTopics.com
Block diagram for the New The attack programs need to
Technique automatically generate accurate mouse
Very little research has been done to graphical passwords. Overall, we believe
have a password space of 94^N, where complex than a text based dictionary
N is the length of the password, 94 is the attack. More research is needed in this
the graphical passwords are vulnerable approaches. For example, during the
to shoulder surfing. At this point, only a registration stage,a user has to pick