SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 10, Volume 3 (October 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -24
“SELF AUTHENTICATION” AN APPROACH FOR
PASSWORD FREE AUTHENTICATION
Prabhakar Gantela Tefera Adugnaw Lulie
Department of Information Technology, Department of Information Technology
Mizan Tepi University, Mizan Tepi University
Abstract — Authentication has always been a topic that is challenging the researchers and the computer experts as
daily we have news of hacking the sites or the internet accounts. Fifty years passed since we have passwords on the
computers but still security is unsecured. We have many techniques in authenticating a user to his account but still
there has been always a way out for the hackers to log into our account. Even though we have various methods to
cross check the user, the accounts are still not safe. We have lot of cryptographic techniques, digital signatures, OTP
(one-time-passwords) but none is helping us in this regard. There are many reasons that make our account hacked
but what we propose is that the password load that we impose on a user may be one reason that makes our account
unsecured. As any user now a day has many accounts, they try to use an easy to remember password and that’s the
loophole that gives hackers a chance for hacking. In this paper, I propose a new method where there will not be any
password for logging in. The user will be burden free of passwords. This is a trial to make the authentication simple
and secured. We proposed a method called self-authentication in this paper where the user himself becomes a
password for his account. A set of questionnaire is posed on to user will be taken as a sample and the answers given
by him will decide his password for his next login. We think this method helps us in avoiding passwords for
authentication.
Keywords— Authentication, Passwords, Security, Cryptography, brute force attacks, password policy, bystanders,
guessed passwords, man in middle attacks.
I. INTRODUCTION
Since the day authentication has been started, the method used to identify a user has been changing. The word that comes
into mind when we hear authentication is security. As the history says from 1960’s when we started having individual
accounts on a system we started working on these user names and passwords. But the key point is how can we identify a
person in this huge world of Internet. Identifying a user has been always a question mark. The user has to show that he is
the only one separate from this world.
A password is defined as a word or a string of characters used for the user’s authentication to prove identity or access
approval to gain access to a resource which is to be kept secret from those not allowed access. The word secret is the
main problem. To maintain this secrecy, we have been working for years. We have many techniques to maintain these
secrets.
We have text passwords, voice recognition, Bio metric, Iris and also face recognition techniques. Now a day we have
image authentication, video authentication and device authentication techniques. Even though we are stuffed with these
many methods of authentication, still our accounts are not safe. Still we hear hacking news once in a day. There may be
many reasons how our account has been hacked. But one reason I strongly believe is the overload of passwords that we
impose on users may be one key point that helps the hackers in entering into our accounts.
Now a day’s any computer user or any online user may have at least twenty plus accounts which may be their email,
social networking sites like face book, twitter etc, laptop passwords, mobile passwords, bank ATM Pins, email etc. Each
user has more than one account in each site. These make the user overloaded. On a whole, the user is forced to remember
his passwords every time they log in. To remember these passwords, they are using easy to remember, poor strength text
passwords leaving a hole for the hackers to enter. As they have many accounts and many passwords, the users tempt not
to follow a strong password or a password policy.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 10, Volume 3 (October 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -25
We proposed a method called self-authentication in this paper, which we think, helps us in avoiding passwords for
authentication. The main goal of this process is to create a password free world and make users burden free and reduce
their overload of remembering the passwords. As an initiation, we have followed a mechanism of reading the user
psychology for proving himself for authentication.
II. IMPLEMENTATION
Authentication has to be done but without passwords. The main problem here is to identify a user with some information
which is known only to him. This can be his personal data, secret pin or some code that can be used for identification.
Our study in this regard has been for years and finally came up with this self-authentication which we think might help us.
We have used our body parts as passwords such as our voice (voice recognition), eyes (Iris), face (face recognition), and
hands (Bio metric authentication). All these parts are used as passwords for our identification. All we tried is to prove
ourselves to enter into our account. But what we missed here is “it is only you who can prove who you are”. None in this
world can be you except you. None other can think and react exactly like you. It is you who can be you in this world.
“Why can’t be you as your password for your Account-Self Authentication”.
The process begins from the step the user registers into a site or an account. While entering his data during registration he
may be asked to enter his first name, last name, mobile number, date of birth etc. In many of the sites he will be asked to
select a password and retype it for confirmation. Instead of doing this in self-authentication, we will ask few questions
from various angels that may be how he behaves and reacts to a situation or how he behaves with his relatives, friends
and others who are not related to him. On a whole we try to capture the way he thinks and behaves. We study his mind
with these questions. These questions may be nearly ten with which we can get a clear picture of what he is and how he is
and how he behaves and reacts. It is like a psychology game where he will be captured completely by the questions we
pose to him. Even though the process may take time but remember that it is only for the first time he spends his time
while registration.
Later when the user tries to log in with his user name, he will be posed a random question on the screen. This question
will be purely random and even the user doesn’t know what the question and answers are. The question may be any
situation or may be a suggestion to a problem from the user with which we try to match his thinking from the data he
entered while registration. The data which he entered and answered while registration will be correlated with the question
and answer he has given while logging in. The answer will be matching with his way of thinking and only on matching
he will be logged in. If the answer he entered is mismatched, then the system identifies that it is not the exact user who
registered.
Fig 1. Random question displayed on Login screen
Let us take an example of a user who registered himself with a false attitude and who acts smartly and tries to convince
others as if he is a gentleman. But at the time of registration, his mindset will be captured and his original nature is
recorded by the authentication mechanism.
Now for the example figure given above the user tries to act smart and selects a choice proving himself to be loyal to the
traffic rules.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 10, Volume 3 (October 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -26
But as per the authentication mechanisms records he will be rejected on acting wise saying he drives on to the right hand
side (International driving standard) and proves to be strictly following the rules. But as he is wrong to his nature he will
be rejected from logging in. He will be logged in only if he behaves according his true nature and mindset and only on
entering the correct option according to his nature and attitude.
If a hacker tries to enter into others account, even if he knows the user name or has bank ATM with him, the question
which displays on the screen will be new to him. For the question he may answer in his way as he may not know how the
original user thinks, reacts and how the user behaves. It is only the registered user who can answer exactly to the question
displayed on the screen. Even if the hacker tries to manage and think like the registered user, he may be close to the way
the user thinks but not exactly.
The Login process has the following metric. While registration depending on the question and answers the user will be
placed in a set of categorized persons. When he tries to login for the next time the user will be posed a question for which
one category of question and answer is expected. The answer he gives for the question should be between 90-100% of his
mentality and psychology. We took a margin of 10% as grace because even the registered user may not be having the
same sort of mood which he had while registration. So when he tries to login he should be 90% exactly as he is while
registration.
If a hacker tries to login with the user name of others, he will be asked to answer a question for which he has to match the
thinking and behaviour of 90% and above. Even if he manages to behave and think like him, he may be almost up to 50-
70% like the registered user but not 90% or more. This makes the user safe with his account. The system checks the
answer and finds the percentage of correctness in the answer with the registration. If the answer matches he will be
logged in, and if not rejected.
This approach has two advantages – one is the user need not remember his password or need not follow any password
policy and the other is his account will be secured and safe.
III. RESULTS OBTAINED
To work on this, we have taken a sample of few of my students for registration. we have prepared few questionnaires and
asked them to answer. Few days later, we gave them a question randomly and told them to answer it. We correlated the
answer with the key, which we already had with us. Surprisingly this case study works and almost 65% of the student’s
answers were matching with the answer, which we expected. The remaining answers, which were not matched, were
almost close enough to what we expected. This was encouraging us in moving bit forward in this research. When we
have taken students as sample, we were concentrating only to a category of questions related to student’s psychology.
Fig 2. Chart showing results for various categories
Moving further in this we concentrated on co-staff members and started preparing questionnaires for them. This time the
questionnaire was much deeper into the psychology aspects and tried to improve the success rate from 65%. As planned
we gave a list of questions and asked them to answer. Few days later gave a simple question and asked them to answer so
as to take this as a login process. This time there was an increase in the success rate from 65% to 73% i.e. 73%of the staff
member’s answers were matching with what we expected.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 10, Volume 3 (October 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -27
IV.CONCLUSION
In this way we think this might be useful in safe guarding the user’s accounts. This may be a trial in finding a solution for
password free authentication. Overall, we can hope for a world where there won’t be any scope for remembering our
passwords.
This proposal if applied with much more psychology professionals and experts in preparing the questionnaire will give us
a good result in analysing a person. Even if the result obtained is 10% positive in authentication process, we think this
10% can be improved on taking experts advice and can serve our purpose. Based on this analysis we are trying to
develop a software by the final year students and apply this in the intranet used in our college.
REFERENCES
[1].Vipul Sharma, Sunny Kumar, “A New Approach to Hide Text in Images Using Steganography”-International
Journal of Advanced Research in Computer Science and Software Engineering-Volume 3, Issue 4, April 2013-ISSN:
2277 128X
[2].Kelly D Lewis, James E Lewis, “Web single sign-on authentication using SAML”, International Journal of Computer
Science Issues, ISSN: 1694-0784, Vol. 2, 2009, PP 41-48.
[3].Wazir Zada Khan, Mohammed Y Aalsalem, Yang Xiang, “A Graphical password based system for small mobile
devices”, International Journal of Computer Science Issues, e-ISSN: 1694-0814, Vol. 8, Issue 5.
[4].Smita. S., Mudholkar, Pradnya. M. Shende, Milind V Sarode, “Biometrics authentication technique for intrusion
detection systems using finger print recognition”, International Journal of Computer Science, Engineering and
Information Technology, Volume 2, No. 1, February 2001, PP 57-65.
[5].M. Sreelatha, M. Shashi, M. Anirudh, MD. Sultan Ahamer, V. Manoj Kumar, “Authentication schemes for session
passwords using color and images”, International Journal of Network Security and its applications, Vol. 3, No. 3,
May 2011, PP 111-119.

More Related Content

What's hot

An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET Journal
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 
IRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET Journal
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSJournal For Research
 
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET Journal
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accesseSAT Journals
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Serverijtsrd
 
Review of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackReview of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackjournalBEEI
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security BreachGaurav Dubey
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017ijcsbi
 

What's hot (20)

An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Zsun
ZsunZsun
Zsun
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
IRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET-Fake Product Review Monitoring
IRJET-Fake Product Review Monitoring
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
 
H029044050
H029044050H029044050
H029044050
 
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder Surfing
 
C0210014017
C0210014017C0210014017
C0210014017
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 
A new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script accessA new approach “ring” for restricting web pages from script access
A new approach “ring” for restricting web pages from script access
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
 
Review of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attackReview of the machine learning methods in the classification of phishing attack
Review of the machine learning methods in the classification of phishing attack
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security Breach
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
G45023236
G45023236G45023236
G45023236
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017
 

Viewers also liked

Squline Mandarin Intermediate 1 Lesson 17
Squline Mandarin Intermediate 1 Lesson 17Squline Mandarin Intermediate 1 Lesson 17
Squline Mandarin Intermediate 1 Lesson 17squline
 
Experiencias ccu diferenciales usme
Experiencias ccu diferenciales usmeExperiencias ccu diferenciales usme
Experiencias ccu diferenciales usmedaalvale
 
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italiano
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italianoIl Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italiano
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italianoisabella Cusanno
 
Preguntas evaluacion ppegess larizza arando
Preguntas evaluacion  ppegess  larizza arandoPreguntas evaluacion  ppegess  larizza arando
Preguntas evaluacion ppegess larizza arandoparalelo B
 
Squline Mandarin Beginner 1 Lesson 18
Squline Mandarin Beginner 1 Lesson 18Squline Mandarin Beginner 1 Lesson 18
Squline Mandarin Beginner 1 Lesson 18squline
 
12 superalimentos antioxidantes
12 superalimentos antioxidantes12 superalimentos antioxidantes
12 superalimentos antioxidantesaulasaludable
 
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...AM Publications
 
A Low Power Hybrid Partition SRAM based TCAM with a Parity Bit
A Low Power Hybrid Partition SRAM based TCAM with a Parity BitA Low Power Hybrid Partition SRAM based TCAM with a Parity Bit
A Low Power Hybrid Partition SRAM based TCAM with a Parity BitAM Publications
 
1434344793278Resume_Aakash
1434344793278Resume_Aakash1434344793278Resume_Aakash
1434344793278Resume_AakashAakash Verma
 
Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Stephen Kwong
 
Phelp Benjamin Jr resume (1)
Phelp Benjamin Jr resume (1)Phelp Benjamin Jr resume (1)
Phelp Benjamin Jr resume (1)Phelp Benjamin Jr
 

Viewers also liked (20)

Hakikat Nasional
Hakikat NasionalHakikat Nasional
Hakikat Nasional
 
NCPCM 2015 FINAL ppt
NCPCM 2015 FINAL pptNCPCM 2015 FINAL ppt
NCPCM 2015 FINAL ppt
 
Session 1: Natural dispersal as a biosecurity risk - are we prepared?
Session 1: Natural dispersal as a biosecurity risk - are we prepared?Session 1: Natural dispersal as a biosecurity risk - are we prepared?
Session 1: Natural dispersal as a biosecurity risk - are we prepared?
 
Squline Mandarin Intermediate 1 Lesson 17
Squline Mandarin Intermediate 1 Lesson 17Squline Mandarin Intermediate 1 Lesson 17
Squline Mandarin Intermediate 1 Lesson 17
 
Experiencias ccu diferenciales usme
Experiencias ccu diferenciales usmeExperiencias ccu diferenciales usme
Experiencias ccu diferenciales usme
 
Sigurniji internet - Iva Prović 5.a
Sigurniji internet - Iva Prović 5.aSigurniji internet - Iva Prović 5.a
Sigurniji internet - Iva Prović 5.a
 
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italiano
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italianoIl Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italiano
Il Diritto di famiglia nell'evoluzione dell'Unione Europea (testo in italiano
 
Government Welfare
Government WelfareGovernment Welfare
Government Welfare
 
Preguntas evaluacion ppegess larizza arando
Preguntas evaluacion  ppegess  larizza arandoPreguntas evaluacion  ppegess  larizza arando
Preguntas evaluacion ppegess larizza arando
 
Squline Mandarin Beginner 1 Lesson 18
Squline Mandarin Beginner 1 Lesson 18Squline Mandarin Beginner 1 Lesson 18
Squline Mandarin Beginner 1 Lesson 18
 
Session 6: Building collaboration in biosecurity innovation systems
Session 6: Building collaboration in biosecurity innovation systemsSession 6: Building collaboration in biosecurity innovation systems
Session 6: Building collaboration in biosecurity innovation systems
 
12 superalimentos antioxidantes
12 superalimentos antioxidantes12 superalimentos antioxidantes
12 superalimentos antioxidantes
 
Insect surveillance and eradication
Insect surveillance and eradicationInsect surveillance and eradication
Insect surveillance and eradication
 
Micosis
MicosisMicosis
Micosis
 
Welsh Resume
Welsh ResumeWelsh Resume
Welsh Resume
 
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
 
A Low Power Hybrid Partition SRAM based TCAM with a Parity Bit
A Low Power Hybrid Partition SRAM based TCAM with a Parity BitA Low Power Hybrid Partition SRAM based TCAM with a Parity Bit
A Low Power Hybrid Partition SRAM based TCAM with a Parity Bit
 
1434344793278Resume_Aakash
1434344793278Resume_Aakash1434344793278Resume_Aakash
1434344793278Resume_Aakash
 
Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?
 
Phelp Benjamin Jr resume (1)
Phelp Benjamin Jr resume (1)Phelp Benjamin Jr resume (1)
Phelp Benjamin Jr resume (1)
 

Similar to SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION

IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxpriestmanmable
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET Journal
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxDIPESH30
 
Mozart Essays On His Life And Music
Mozart Essays On His Life And MusicMozart Essays On His Life And Music
Mozart Essays On His Life And MusicViviana Principe
 
006 Mit Essays That Worked Essay Example College Ap
006 Mit Essays That Worked Essay Example College Ap006 Mit Essays That Worked Essay Example College Ap
006 Mit Essays That Worked Essay Example College ApJessica Reed
 
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET Journal
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.Samantha Edwards
 
Argumentative Essay Examples For Middle Scho
Argumentative Essay Examples For Middle SchoArgumentative Essay Examples For Middle Scho
Argumentative Essay Examples For Middle SchoJen Williams
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxlynettearnold46882
 
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...ijtsrd
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm securityeSAT Journals
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using SmartphonesIRJET Journal
 

Similar to SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION (20)

IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docx
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Lab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docxLab 4Identity theftIdentity theft is one of the major issues .docx
Lab 4Identity theftIdentity theft is one of the major issues .docx
 
Mozart Essays On His Life And Music
Mozart Essays On His Life And MusicMozart Essays On His Life And Music
Mozart Essays On His Life And Music
 
006 Mit Essays That Worked Essay Example College Ap
006 Mit Essays That Worked Essay Example College Ap006 Mit Essays That Worked Essay Example College Ap
006 Mit Essays That Worked Essay Example College Ap
 
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer System
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.
 
Argumentative Essay Examples For Middle Scho
Argumentative Essay Examples For Middle SchoArgumentative Essay Examples For Middle Scho
Argumentative Essay Examples For Middle Scho
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 10, Volume 3 (October 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -24 “SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION Prabhakar Gantela Tefera Adugnaw Lulie Department of Information Technology, Department of Information Technology Mizan Tepi University, Mizan Tepi University Abstract — Authentication has always been a topic that is challenging the researchers and the computer experts as daily we have news of hacking the sites or the internet accounts. Fifty years passed since we have passwords on the computers but still security is unsecured. We have many techniques in authenticating a user to his account but still there has been always a way out for the hackers to log into our account. Even though we have various methods to cross check the user, the accounts are still not safe. We have lot of cryptographic techniques, digital signatures, OTP (one-time-passwords) but none is helping us in this regard. There are many reasons that make our account hacked but what we propose is that the password load that we impose on a user may be one reason that makes our account unsecured. As any user now a day has many accounts, they try to use an easy to remember password and that’s the loophole that gives hackers a chance for hacking. In this paper, I propose a new method where there will not be any password for logging in. The user will be burden free of passwords. This is a trial to make the authentication simple and secured. We proposed a method called self-authentication in this paper where the user himself becomes a password for his account. A set of questionnaire is posed on to user will be taken as a sample and the answers given by him will decide his password for his next login. We think this method helps us in avoiding passwords for authentication. Keywords— Authentication, Passwords, Security, Cryptography, brute force attacks, password policy, bystanders, guessed passwords, man in middle attacks. I. INTRODUCTION Since the day authentication has been started, the method used to identify a user has been changing. The word that comes into mind when we hear authentication is security. As the history says from 1960’s when we started having individual accounts on a system we started working on these user names and passwords. But the key point is how can we identify a person in this huge world of Internet. Identifying a user has been always a question mark. The user has to show that he is the only one separate from this world. A password is defined as a word or a string of characters used for the user’s authentication to prove identity or access approval to gain access to a resource which is to be kept secret from those not allowed access. The word secret is the main problem. To maintain this secrecy, we have been working for years. We have many techniques to maintain these secrets. We have text passwords, voice recognition, Bio metric, Iris and also face recognition techniques. Now a day we have image authentication, video authentication and device authentication techniques. Even though we are stuffed with these many methods of authentication, still our accounts are not safe. Still we hear hacking news once in a day. There may be many reasons how our account has been hacked. But one reason I strongly believe is the overload of passwords that we impose on users may be one key point that helps the hackers in entering into our accounts. Now a day’s any computer user or any online user may have at least twenty plus accounts which may be their email, social networking sites like face book, twitter etc, laptop passwords, mobile passwords, bank ATM Pins, email etc. Each user has more than one account in each site. These make the user overloaded. On a whole, the user is forced to remember his passwords every time they log in. To remember these passwords, they are using easy to remember, poor strength text passwords leaving a hole for the hackers to enter. As they have many accounts and many passwords, the users tempt not to follow a strong password or a password policy.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 10, Volume 3 (October 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -25 We proposed a method called self-authentication in this paper, which we think, helps us in avoiding passwords for authentication. The main goal of this process is to create a password free world and make users burden free and reduce their overload of remembering the passwords. As an initiation, we have followed a mechanism of reading the user psychology for proving himself for authentication. II. IMPLEMENTATION Authentication has to be done but without passwords. The main problem here is to identify a user with some information which is known only to him. This can be his personal data, secret pin or some code that can be used for identification. Our study in this regard has been for years and finally came up with this self-authentication which we think might help us. We have used our body parts as passwords such as our voice (voice recognition), eyes (Iris), face (face recognition), and hands (Bio metric authentication). All these parts are used as passwords for our identification. All we tried is to prove ourselves to enter into our account. But what we missed here is “it is only you who can prove who you are”. None in this world can be you except you. None other can think and react exactly like you. It is you who can be you in this world. “Why can’t be you as your password for your Account-Self Authentication”. The process begins from the step the user registers into a site or an account. While entering his data during registration he may be asked to enter his first name, last name, mobile number, date of birth etc. In many of the sites he will be asked to select a password and retype it for confirmation. Instead of doing this in self-authentication, we will ask few questions from various angels that may be how he behaves and reacts to a situation or how he behaves with his relatives, friends and others who are not related to him. On a whole we try to capture the way he thinks and behaves. We study his mind with these questions. These questions may be nearly ten with which we can get a clear picture of what he is and how he is and how he behaves and reacts. It is like a psychology game where he will be captured completely by the questions we pose to him. Even though the process may take time but remember that it is only for the first time he spends his time while registration. Later when the user tries to log in with his user name, he will be posed a random question on the screen. This question will be purely random and even the user doesn’t know what the question and answers are. The question may be any situation or may be a suggestion to a problem from the user with which we try to match his thinking from the data he entered while registration. The data which he entered and answered while registration will be correlated with the question and answer he has given while logging in. The answer will be matching with his way of thinking and only on matching he will be logged in. If the answer he entered is mismatched, then the system identifies that it is not the exact user who registered. Fig 1. Random question displayed on Login screen Let us take an example of a user who registered himself with a false attitude and who acts smartly and tries to convince others as if he is a gentleman. But at the time of registration, his mindset will be captured and his original nature is recorded by the authentication mechanism. Now for the example figure given above the user tries to act smart and selects a choice proving himself to be loyal to the traffic rules.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 10, Volume 3 (October 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -26 But as per the authentication mechanisms records he will be rejected on acting wise saying he drives on to the right hand side (International driving standard) and proves to be strictly following the rules. But as he is wrong to his nature he will be rejected from logging in. He will be logged in only if he behaves according his true nature and mindset and only on entering the correct option according to his nature and attitude. If a hacker tries to enter into others account, even if he knows the user name or has bank ATM with him, the question which displays on the screen will be new to him. For the question he may answer in his way as he may not know how the original user thinks, reacts and how the user behaves. It is only the registered user who can answer exactly to the question displayed on the screen. Even if the hacker tries to manage and think like the registered user, he may be close to the way the user thinks but not exactly. The Login process has the following metric. While registration depending on the question and answers the user will be placed in a set of categorized persons. When he tries to login for the next time the user will be posed a question for which one category of question and answer is expected. The answer he gives for the question should be between 90-100% of his mentality and psychology. We took a margin of 10% as grace because even the registered user may not be having the same sort of mood which he had while registration. So when he tries to login he should be 90% exactly as he is while registration. If a hacker tries to login with the user name of others, he will be asked to answer a question for which he has to match the thinking and behaviour of 90% and above. Even if he manages to behave and think like him, he may be almost up to 50- 70% like the registered user but not 90% or more. This makes the user safe with his account. The system checks the answer and finds the percentage of correctness in the answer with the registration. If the answer matches he will be logged in, and if not rejected. This approach has two advantages – one is the user need not remember his password or need not follow any password policy and the other is his account will be secured and safe. III. RESULTS OBTAINED To work on this, we have taken a sample of few of my students for registration. we have prepared few questionnaires and asked them to answer. Few days later, we gave them a question randomly and told them to answer it. We correlated the answer with the key, which we already had with us. Surprisingly this case study works and almost 65% of the student’s answers were matching with the answer, which we expected. The remaining answers, which were not matched, were almost close enough to what we expected. This was encouraging us in moving bit forward in this research. When we have taken students as sample, we were concentrating only to a category of questions related to student’s psychology. Fig 2. Chart showing results for various categories Moving further in this we concentrated on co-staff members and started preparing questionnaires for them. This time the questionnaire was much deeper into the psychology aspects and tried to improve the success rate from 65%. As planned we gave a list of questions and asked them to answer. Few days later gave a simple question and asked them to answer so as to take this as a login process. This time there was an increase in the success rate from 65% to 73% i.e. 73%of the staff member’s answers were matching with what we expected.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 10, Volume 3 (October 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -27 IV.CONCLUSION In this way we think this might be useful in safe guarding the user’s accounts. This may be a trial in finding a solution for password free authentication. Overall, we can hope for a world where there won’t be any scope for remembering our passwords. This proposal if applied with much more psychology professionals and experts in preparing the questionnaire will give us a good result in analysing a person. Even if the result obtained is 10% positive in authentication process, we think this 10% can be improved on taking experts advice and can serve our purpose. Based on this analysis we are trying to develop a software by the final year students and apply this in the intranet used in our college. REFERENCES [1].Vipul Sharma, Sunny Kumar, “A New Approach to Hide Text in Images Using Steganography”-International Journal of Advanced Research in Computer Science and Software Engineering-Volume 3, Issue 4, April 2013-ISSN: 2277 128X [2].Kelly D Lewis, James E Lewis, “Web single sign-on authentication using SAML”, International Journal of Computer Science Issues, ISSN: 1694-0784, Vol. 2, 2009, PP 41-48. [3].Wazir Zada Khan, Mohammed Y Aalsalem, Yang Xiang, “A Graphical password based system for small mobile devices”, International Journal of Computer Science Issues, e-ISSN: 1694-0814, Vol. 8, Issue 5. [4].Smita. S., Mudholkar, Pradnya. M. Shende, Milind V Sarode, “Biometrics authentication technique for intrusion detection systems using finger print recognition”, International Journal of Computer Science, Engineering and Information Technology, Volume 2, No. 1, February 2001, PP 57-65. [5].M. Sreelatha, M. Shashi, M. Anirudh, MD. Sultan Ahamer, V. Manoj Kumar, “Authentication schemes for session passwords using color and images”, International Journal of Network Security and its applications, Vol. 3, No. 3, May 2011, PP 111-119.