Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (3 votes)
486 views9 pages

Graphical Password by Image Segmentation

This document describes a graphical password system based on image segmentation. The system allows a user to select an image as their password. It then segments the image into pieces and stores them. During login, the pieces are shown jumbled and the user must select the correct order to recreate the original image to authenticate. The system has applications for folder locking and web login. Its advantages include a simple interface and strong security, while its only disadvantage is the inability to retrieve a forgotten password.

Uploaded by

Samra Afzal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
100% found this document useful (3 votes)
486 views9 pages

Graphical Password by Image Segmentation

This document describes a graphical password system based on image segmentation. The system allows a user to select an image as their password. It then segments the image into pieces and stores them. During login, the pieces are shown jumbled and the user must select the correct order to recreate the original image to authenticate. The system has applications for folder locking and web login. Its advantages include a simple interface and strong security, while its only disadvantage is the inability to retrieve a forgotten password.

Uploaded by

Samra Afzal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 9

GRAPHICAL PASSWORD

BY IMAGE SEGMENTATION

Submitted by:
Samra Afzal
Aiman Naseem
CONTENTS
• Introduction
• Modules
• Applications
• Advantages
• Disadvantages
• Conclusion
Introduction
• The project allows user to input an image as its
password .
• On receiving the image the system segments the
image into an array of images and stores them
accordingly.
• While user logging in the system the image is
shown as broken and in a jumbled order.
• Now if user chooses the parts of image in an
order so as to make the original image he sent
then user is considered authentic.
• Else the user is not granted access.
Modules
 Image Submission
 Image Fragmentation
 Image parts storage
 Part jumbling
 Authentication
Applications of Graphical Password System
• Folder locking.
• Web log-in application.
Advantages
• The system is user friendly and has simple
interface.
• Provides strong security against bot attacks or
hackers.
• Protect system vulnerable to attacks.
Disadvantages
• The only disadvantage is if users forget the
password, it can not retrieve it.
Conclusion
• More difficult to break the graphical passwords
from traditional attack methods:
Brute Force Search
Dictionary Attacks
Or Spyware
THANKYOU

You might also like