GRAPHICAL PASSWORD
BY IMAGE SEGMENTATION
Submitted by:
Samra Afzal
Aiman Naseem
CONTENTS
• Introduction
• Modules
• Applications
• Advantages
• Disadvantages
• Conclusion
Introduction
• The project allows user to input an image as its
password .
• On receiving the image the system segments the
image into an array of images and stores them
accordingly.
• While user logging in the system the image is
shown as broken and in a jumbled order.
• Now if user chooses the parts of image in an
order so as to make the original image he sent
then user is considered authentic.
• Else the user is not granted access.
Modules
Image Submission
Image Fragmentation
Image parts storage
Part jumbling
Authentication
Applications of Graphical Password System
• Folder locking.
• Web log-in application.
Advantages
• The system is user friendly and has simple
interface.
• Provides strong security against bot attacks or
hackers.
• Protect system vulnerable to attacks.
Disadvantages
• The only disadvantage is if users forget the
password, it can not retrieve it.
Conclusion
• More difficult to break the graphical passwords
from traditional attack methods:
Brute Force Search
Dictionary Attacks
Or Spyware
THANKYOU