SlideShare a Scribd company logo
1 of 30
loading
THREE LEVEL SECURITY SYSTEM
USING
IMAGE BASED AUTHENTICATION
What is Security
CONTENTS
 Introduction
 Existing System
 Propose System
 Hardware Specification
 Software Specification
 SECURITY LEVEL 1
 SECURITY LEVEL 2
 SECURITY LEVEL 3
 FLOW CHART
INTRODUCTION
 Texts passwords are the most commonly used
technique for authentication and have
several drawbacks.
 Graphical passwords provide a promising
alternative to traditional alphanumeric
passwords due to the fact that humans can
remember pictures better than text.
 In this paper, we propose a simple graphical
password authentication system that
consists of a sequence of ‘n’ images and the
user have to select the click points
associated with one of the ‘n’ image in
correct sequence for successful login.
 This authentication system employs the user’s
personal handheld device as the second factor of
authentication.
 With the increasing popularity of handheld
devices such as cell phones, our approach can
be leveraged by many organizations to
overcome threats such as key-loggers,
shoulder surfing, weak passwords.
 Click cued points is a click-based graphical password
scheme, a cued-recall graphical password technique.
 Users Click on one point per image for a sequence
of images.
Existing System
 Security-sensitive environments protect their access
control mechanisms. resources against
unauthorized access by enforcing
 Text based passwords are not secure enough for
such applications.
 User authentication can be improved by using both
 text passwords and structured images.
 The existing system is Pass Points.
 It proposed Passwords which could be
composed of several points anywhere on
an Image.
 They also proposed a scheme with
three overlapping grids, allowing for
login attempts that were approximately
correct to be accepted
Propose System
 A password authentication system should
encourage strong
 passwords while maintaining memo ability.
 We propose that authentication schemes allow
user choice while influencing users toward
stronger passwords
 In our system, the task of selecting weak
passwords (which are easy for attackers to
predict) is more tedious, discouraging users
from making such choices. In effect, this
approach
HARDWARE
SPECIFICATION
PROCESSOR : Dual Core
HARD DISK : 256 GB
RAM : 1 GB
KEYBOARD : 104 keys Standard Keyboard
MONITOR : 15” Color Monitor
MOUSE : Standard 3 Button Mouse
SOFTWARE
SPECIFICATION
Operating System : Windows XP,
-Windows8
Front end : JAVA Swing
Back end : MYSQL
SECURITY LEVEL 1
Username Password & Color Patten
SECURITY LEVEL 1
SECURITY LEVEL 2
Axis identifying the image
SECURITY LEVEL 2
SECURITY LEVEL 3
Opt code & Character button
SECURITY LEVEL 3
FLOW CHART
ANY QUERIES…..
?????
by
TEAM MEMBERS
END

More Related Content

What's hot

Qa 00501--online ticket-booking_pvr_cinemas
Qa 00501--online ticket-booking_pvr_cinemasQa 00501--online ticket-booking_pvr_cinemas
Qa 00501--online ticket-booking_pvr_cinemas
sokkary
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
Krishnasai Gudavalli
 

What's hot (20)

Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
Employee Management System UML Diagrams Use Case Diagram, Activity Diagram, S...
 
Qa 00501--online ticket-booking_pvr_cinemas
Qa 00501--online ticket-booking_pvr_cinemasQa 00501--online ticket-booking_pvr_cinemas
Qa 00501--online ticket-booking_pvr_cinemas
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 
Bluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docxBluetooth based-chatting-system-using-android-docx
Bluetooth based-chatting-system-using-android-docx
 
Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015Health Prediction System - an Artificial Intelligence Project 2015
Health Prediction System - an Artificial Intelligence Project 2015
 
Software requirements specification (srs) by Dan Dharma
Software requirements specification (srs) by  Dan DharmaSoftware requirements specification (srs) by  Dan Dharma
Software requirements specification (srs) by Dan Dharma
 
ONLINE VOTING SYSTEM.PPT.pptx
ONLINE VOTING SYSTEM.PPT.pptxONLINE VOTING SYSTEM.PPT.pptx
ONLINE VOTING SYSTEM.PPT.pptx
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine ppt
 
online quiz application project presentation
online quiz application project presentationonline quiz application project presentation
online quiz application project presentation
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
Restaurant management presentation
Restaurant management presentationRestaurant management presentation
Restaurant management presentation
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management System
 
What do the "Cool Kids" know about DevOps?
What do the "Cool Kids" know about DevOps?What do the "Cool Kids" know about DevOps?
What do the "Cool Kids" know about DevOps?
 
biometrics
biometricsbiometrics
biometrics
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 
Blackberry os
Blackberry osBlackberry os
Blackberry os
 
Hotel management
Hotel managementHotel management
Hotel management
 

Viewers also liked

Hypotheekbond Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
Hypotheekbond   Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...Hypotheekbond   Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
Hypotheekbond Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
Jeroen Oversteegen
 
Tríptico presentación curso 15 16
Tríptico presentación curso 15 16Tríptico presentación curso 15 16
Tríptico presentación curso 15 16
sanjosehhcc
 
Revolusiperancis 140526235942-phpapp02
Revolusiperancis 140526235942-phpapp02Revolusiperancis 140526235942-phpapp02
Revolusiperancis 140526235942-phpapp02
Warto Susastro
 
Lista libros publicar blog
Lista libros publicar blogLista libros publicar blog
Lista libros publicar blog
sanjosehhcc
 
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
Warto Susastro
 

Viewers also liked (18)

Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Hypotheekbond Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
Hypotheekbond   Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...Hypotheekbond   Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
Hypotheekbond Jeroen Dijsselbloem_kamerbrief_inzake_boetevrij_oversluiten_h...
 
Tríptico presentación curso 15 16
Tríptico presentación curso 15 16Tríptico presentación curso 15 16
Tríptico presentación curso 15 16
 
Revolusiperancis 140526235942-phpapp02
Revolusiperancis 140526235942-phpapp02Revolusiperancis 140526235942-phpapp02
Revolusiperancis 140526235942-phpapp02
 
Cuestionario iii
Cuestionario iiiCuestionario iii
Cuestionario iii
 
Presentacion blog de blogger
Presentacion blog de bloggerPresentacion blog de blogger
Presentacion blog de blogger
 
Jalan menuju sukses
Jalan menuju suksesJalan menuju sukses
Jalan menuju sukses
 
Pancreatite Aguda
Pancreatite AgudaPancreatite Aguda
Pancreatite Aguda
 
El turismo en Barcelona con Llega y Vuela
El turismo en Barcelona con Llega y VuelaEl turismo en Barcelona con Llega y Vuela
El turismo en Barcelona con Llega y Vuela
 
REST Architecture with use case and example
REST Architecture with use case and exampleREST Architecture with use case and example
REST Architecture with use case and example
 
Lista libros publicar blog
Lista libros publicar blogLista libros publicar blog
Lista libros publicar blog
 
2. основы учения о реактивности
2. основы учения о реактивности2. основы учения о реактивности
2. основы учения о реактивности
 
Ppt kelompok 4 kardinal pend ekonomi a
Ppt kelompok 4 kardinal pend ekonomi aPpt kelompok 4 kardinal pend ekonomi a
Ppt kelompok 4 kardinal pend ekonomi a
 
Cuestionario iv
Cuestionario ivCuestionario iv
Cuestionario iv
 
So 2 tugas 3 marsela
So 2  tugas 3 marselaSo 2  tugas 3 marsela
So 2 tugas 3 marsela
 
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
Perlawananrakyatmenentangkolonialismebarat 130926021129-phpapp01
 
11. болезни миокарда
11. болезни миокарда11. болезни миокарда
11. болезни миокарда
 
Propiedades curativas de la miel
Propiedades curativas de la mielPropiedades curativas de la miel
Propiedades curativas de la miel
 

Similar to Three Level Security System Using Image Based Aunthentication

Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 

Similar to Three Level Security System Using Image Based Aunthentication (20)

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
An03402300234
An03402300234An03402300234
An03402300234
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Research ppr
Research pprResearch ppr
Research ppr
 
J0704055058
J0704055058J0704055058
J0704055058
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Three Level Security System Using Image Based Aunthentication

  • 2.
  • 3. THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION
  • 5. CONTENTS  Introduction  Existing System  Propose System  Hardware Specification  Software Specification  SECURITY LEVEL 1  SECURITY LEVEL 2  SECURITY LEVEL 3  FLOW CHART
  • 7.  Texts passwords are the most commonly used technique for authentication and have several drawbacks.  Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.
  • 8.  In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.  This authentication system employs the user’s personal handheld device as the second factor of authentication.
  • 9.  With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords.  Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique.  Users Click on one point per image for a sequence of images.
  • 11.  Security-sensitive environments protect their access control mechanisms. resources against unauthorized access by enforcing  Text based passwords are not secure enough for such applications.  User authentication can be improved by using both  text passwords and structured images.
  • 12.  The existing system is Pass Points.  It proposed Passwords which could be composed of several points anywhere on an Image.  They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted
  • 14.  A password authentication system should encourage strong  passwords while maintaining memo ability.  We propose that authentication schemes allow user choice while influencing users toward stronger passwords  In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach
  • 16. PROCESSOR : Dual Core HARD DISK : 256 GB RAM : 1 GB KEYBOARD : 104 keys Standard Keyboard MONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse
  • 18. Operating System : Windows XP, -Windows8 Front end : JAVA Swing Back end : MYSQL
  • 20. Username Password & Color Patten SECURITY LEVEL 1
  • 22. Axis identifying the image SECURITY LEVEL 2
  • 24. Opt code & Character button SECURITY LEVEL 3
  • 26.
  • 27.
  • 29.