SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computational Engineering Research||Vol, 03||Issue, 4||
www.ijceronline.com ||April||2013|| Page 230
Graphical Password Authentication System with Integrated
Sound Signature
1,
Anu Singh , 2,
Kiran Kshirsagar, 3,
Lipti Pradhan
1
(Department of Computer Engineering, Pune University, India
I. INTRODUCTION
Basically passwords are used for
[1] Authentication (verifying an imposter from actual user).
[2] Authorization (process to decide if the valid person is allowed to access the data)
[3] Access Control (Restricting the user to access the secured data).
Usually passwords are selected by the users are predictable. This happens with both graphical and text
based passwords. Users tend to choose password which are easy to remember, unfortunately it means that the
passwords tend to follow predictable patterns that are easier for attackers to hack. While the predictability
problem can be solved by disallowing user choice and assigning passwords to the users, this usually leads to
usability problems since it’s difficult for the user to remember such passwords. Many graphical password
systems have been developed; research shows that a text-based password suffers with both usability and security
problems. According to a recently published article, a security team at a company ran a network password
cracker and within 30 seconds and they identified about 80% of the passwords. According to the practical
research, it is well known that the human brain is better at recognizing and recalling the pictorial content,
graphical passwords exploit this human characteristic.
II. RELATED WORK
Considerable work has been done in this field, the best known of these systems are Pass faces [1][4].
Brostoff and Sasse (2000) carried out an empirical study of Pass faces, which demonstrate well how a graphical
password recognition system typically works. Blonder-style passwords are based on cued click recalls. A user
clicks on several previously chosen locations in a single image for logging in. As implemented by Passlogix.
Corporation (Boroditsky, 2002), the user chooses some predefined regions in an image as a password. To log in
the user has to click on the same regions selected at the time of creation of the password. The problem with this
system is that the number of predefined regions is small for selecting, perhaps around 10-12 regions in a picture.
The password may have to be up to 12 clicks for adequate security, which again tedious for the user to operate.
Another problem of this system is the need for the predefined regions to be readily recognizable. In effect, this
requires artificial, cartoon-like images rather than complex, real-world scenes [2][3].
Cued Click Points (CCP) is a
proposed alternative to previous graphical authentication system. In the proposed system, users click one point
on each of 5 images rather than on five points on one image.
III. PROPOSED WORK
In the proposed work along with the cued click point we have integrated sound signature to help in
recalling the password easily. No system has been designed so far which uses sound signature in graphical
password authentication. As per the research it has been said that sound effect or tone can be used to recall facts
like images, text etc [3].
Our idea is inspired by this novel human ability. Using this sound signature and click
points the user can be intimated if he or she is going in a write direction. It also makes the task of the hackers
Abstract
We are proposing a system for graphical password authentication with the integration of
sound signature. In this work, Cued Click Point scheme is used. Here a password is formed by a
sequence of some images in which user can select one click-point per image. Also for further security
user selects a sound signature corresponding to each click point, this sound signature will help the user
in recalling the click points. The system showed better performance in terms of usability, accuracy and
speed. Many users preferred this system over other authentication systems saying that selecting and
remembering only one point per image was aided by sound signature recall.
Keywords: Sound signature, Authentication, Cued Click points
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 231
more challenging. As shown in Figure 1, each click is directing the user to the next image, in effect leading
users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with
an explicit indication of authentication failure only after the final click. In the proposed system, users click one
point on each of 5 images rather than clicking on five points on one image. A wrong click leads down an
incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose
their images only to the extent that their click-point dictates the next image. If they dislike the resulting images,
they could create a new password involving different click-points to get different images.
Fig 1.Click Point per image
Two vectors are created for in this system:
3.1. Profile Vectors
The proposed system creates user profile as follows-
3.2 Master vector
(User ID, Sound Signature frequency, Tolerance)
3.3 Detailed Vector (Image, Click Points)
As an example of vectors – Master vector (Smith, 2689, 50)
Detailed Vector
( )Image Click points
I1 (123,678)
I2 (176,134)
I3 (450,297)
I4 (761,164)
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 232
Fig.2 System Flow
3.4 System Tolerance
After creation of the login vector, system calculates the Euclidian distance between login vector and
profile vectors stored. Euclidian distance between two vectors p and q is given by-
Above distance is calculated for each image if this distance comes out less than a tolerance value D. The value
of D is decided according to the application. In our system this value is selected by the user.
This is the registration form which shows that the userID is given by the system itself.
Fig 3.Registration Step 1
d(p q)=√ (p1-q1)2
+(p2-q2)2
+….+ (pn-qn)2
= √∑(p1-q1)2
i=1 to n
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 233
This is the selection of sound signature and the click points for creating the password.
Fig 3.Registration Step 2
IV. PROJECT SCOPE
In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is
presented. In this system a password consists of sequence of some images in which user can select one click-
point per image. Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point
hotspot analysis more challenging. Each click results in showing a next-image, in effect leading users down on
each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that
instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they
can cancel their attempt and retry from the beginning). It also makes attacks based on a “path” as they click on
their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of
authentication failure only after the final click. Users can choose their images only to the extent that their click-
point dictates the next image. If they dislike the resulting images, they could create a new password involving
different click-points to get different images.In addition user is asked to select a sound signature corresponding
to each click point this sound signature will be used to help the user in recalling the click point on an image.
System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred
CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound
signature helps considerably in recalling the click points.In the proposed work we have integrated sound
signature to help in recalling the password. No system has been devolved so far which uses sound signature in
graphical password authentication.
4.1 Authentication:
The only significant user study on the security of graphical passwords for authentication was
performed by Davis[2]
and the present authors[3]
in that work; we studied the security of two schemes based on
image recognition, denoted “Face” and “Story,” which are described shortly. This study focused specifically on
the impact of user selection of passwords in these schemes, and the security of the passwords that resulted. We
recount some of the notable results from this study, and the methodologies used to reach them, as an illustration
of some of the challenges that graphical passwords can face. In particular, this study demonstrated that graphical
password schemes can be far weaker than textual passwords when users are permitted to choose their password.
V. CONCLUSION AND FUTURE WORK
We have proposed a novel approach which uses sound signature to recall graphical password click
points. No previously developed system used this approach this system is helpful when user is logging after a
long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows
that these patterns are very useful in recalling the associated objects like images or text.
REFERENCES
[1] Cranor, L.F., S. Garfinkel. Security and Usability. O’Reilly Media, 2005.
[2] Davis, D., F. Monrose, and M.K. Reiter. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium,
2004.
[3] R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol.
6, pp. 156-163, 1967.
4] A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999
International Workshop on Cryptographic Techniques and E-Commerce, 1999.
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 234
AUTHOR PROFILES
[1] Anu Singh pursuing the bachelor degree in computer science from Pune University, in 2013.
[2] Kiran Kshirsagar pursuing the bachelor degree in computer science from Pune University, in 2013.
[3] Lipti Pradhan pursuing the bachelor degree in computer science from Pune University, in 2013.

More Related Content

What's hot

An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...AbhilashPasupula
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksdhanyashree11
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attackSaurav Sinha
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 

What's hot (19)

An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3 d password
3 d password3 d password
3 d password
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 

Viewers also liked

Redes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completaRedes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completaredesinforma
 
Los derechos humanos
Los derechos humanosLos derechos humanos
Los derechos humanosCarlos Matta
 
Ikt Ren Inguruko Txostena
Ikt Ren Inguruko TxostenaIkt Ren Inguruko Txostena
Ikt Ren Inguruko Txostenajoxemi
 
Presentación1
Presentación1Presentación1
Presentación1Dako123
 
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây DựngKỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây DựngTường Đặng
 
Zuzen Bidean proposamena
Zuzen Bidean proposamenaZuzen Bidean proposamena
Zuzen Bidean proposamenaIrekia - EJGV
 
Enseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - TresEnseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - TresWar RC
 
Localización de Unidades de Emergencia
Localización de Unidades de EmergenciaLocalización de Unidades de Emergencia
Localización de Unidades de EmergenciaMETALL1CA
 
Los físicos de la historia
Los físicos de la historiaLos físicos de la historia
Los físicos de la historiaKarina Miranda
 
Présentation Google Drive
Présentation Google DrivePrésentation Google Drive
Présentation Google DriveAVNT
 
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle GuechtouliManagement de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle GuechtouliMarc Bourhis
 
Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.Nekuchan
 
Aynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanosAynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanosIS Bolivia
 

Viewers also liked (20)

Redes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completaRedes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completa
 
Freud, PasióN Secret Aeunate
Freud, PasióN Secret AeunateFreud, PasióN Secret Aeunate
Freud, PasióN Secret Aeunate
 
Los derechos humanos
Los derechos humanosLos derechos humanos
Los derechos humanos
 
Gtc Workshop
Gtc WorkshopGtc Workshop
Gtc Workshop
 
Ikt Ren Inguruko Txostena
Ikt Ren Inguruko TxostenaIkt Ren Inguruko Txostena
Ikt Ren Inguruko Txostena
 
Presentación1
Presentación1Presentación1
Presentación1
 
Sindrome Coronario Agudo
Sindrome Coronario AgudoSindrome Coronario Agudo
Sindrome Coronario Agudo
 
Educacao social
Educacao socialEducacao social
Educacao social
 
Tema4
Tema4Tema4
Tema4
 
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây DựngKỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
 
Zuzen Bidean proposamena
Zuzen Bidean proposamenaZuzen Bidean proposamena
Zuzen Bidean proposamena
 
Enseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - TresEnseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - Tres
 
PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.
 
Localización de Unidades de Emergencia
Localización de Unidades de EmergenciaLocalización de Unidades de Emergencia
Localización de Unidades de Emergencia
 
Los físicos de la historia
Los físicos de la historiaLos físicos de la historia
Los físicos de la historia
 
Présentation Google Drive
Présentation Google DrivePrésentation Google Drive
Présentation Google Drive
 
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle GuechtouliManagement de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
 
Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.
 
1. generacion n
1. generacion n1. generacion n
1. generacion n
 
Aynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanosAynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanos
 

Similar to An03402300234

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityijsptm
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsIRJET Journal
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
 

Similar to An03402300234 (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

An03402300234

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 4|| www.ijceronline.com ||April||2013|| Page 230 Graphical Password Authentication System with Integrated Sound Signature 1, Anu Singh , 2, Kiran Kshirsagar, 3, Lipti Pradhan 1 (Department of Computer Engineering, Pune University, India I. INTRODUCTION Basically passwords are used for [1] Authentication (verifying an imposter from actual user). [2] Authorization (process to decide if the valid person is allowed to access the data) [3] Access Control (Restricting the user to access the secured data). Usually passwords are selected by the users are predictable. This happens with both graphical and text based passwords. Users tend to choose password which are easy to remember, unfortunately it means that the passwords tend to follow predictable patterns that are easier for attackers to hack. While the predictability problem can be solved by disallowing user choice and assigning passwords to the users, this usually leads to usability problems since it’s difficult for the user to remember such passwords. Many graphical password systems have been developed; research shows that a text-based password suffers with both usability and security problems. According to a recently published article, a security team at a company ran a network password cracker and within 30 seconds and they identified about 80% of the passwords. According to the practical research, it is well known that the human brain is better at recognizing and recalling the pictorial content, graphical passwords exploit this human characteristic. II. RELATED WORK Considerable work has been done in this field, the best known of these systems are Pass faces [1][4]. Brostoff and Sasse (2000) carried out an empirical study of Pass faces, which demonstrate well how a graphical password recognition system typically works. Blonder-style passwords are based on cued click recalls. A user clicks on several previously chosen locations in a single image for logging in. As implemented by Passlogix. Corporation (Boroditsky, 2002), the user chooses some predefined regions in an image as a password. To log in the user has to click on the same regions selected at the time of creation of the password. The problem with this system is that the number of predefined regions is small for selecting, perhaps around 10-12 regions in a picture. The password may have to be up to 12 clicks for adequate security, which again tedious for the user to operate. Another problem of this system is the need for the predefined regions to be readily recognizable. In effect, this requires artificial, cartoon-like images rather than complex, real-world scenes [2][3]. Cued Click Points (CCP) is a proposed alternative to previous graphical authentication system. In the proposed system, users click one point on each of 5 images rather than on five points on one image. III. PROPOSED WORK In the proposed work along with the cued click point we have integrated sound signature to help in recalling the password easily. No system has been designed so far which uses sound signature in graphical password authentication. As per the research it has been said that sound effect or tone can be used to recall facts like images, text etc [3]. Our idea is inspired by this novel human ability. Using this sound signature and click points the user can be intimated if he or she is going in a write direction. It also makes the task of the hackers Abstract We are proposing a system for graphical password authentication with the integration of sound signature. In this work, Cued Click Point scheme is used. Here a password is formed by a sequence of some images in which user can select one click-point per image. Also for further security user selects a sound signature corresponding to each click point, this sound signature will help the user in recalling the click points. The system showed better performance in terms of usability, accuracy and speed. Many users preferred this system over other authentication systems saying that selecting and remembering only one point per image was aided by sound signature recall. Keywords: Sound signature, Authentication, Cued Click points
  • 2. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 231 more challenging. As shown in Figure 1, each click is directing the user to the next image, in effect leading users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. In the proposed system, users click one point on each of 5 images rather than clicking on five points on one image. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images. Fig 1.Click Point per image Two vectors are created for in this system: 3.1. Profile Vectors The proposed system creates user profile as follows- 3.2 Master vector (User ID, Sound Signature frequency, Tolerance) 3.3 Detailed Vector (Image, Click Points) As an example of vectors – Master vector (Smith, 2689, 50) Detailed Vector ( )Image Click points I1 (123,678) I2 (176,134) I3 (450,297) I4 (761,164)
  • 3. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 232 Fig.2 System Flow 3.4 System Tolerance After creation of the login vector, system calculates the Euclidian distance between login vector and profile vectors stored. Euclidian distance between two vectors p and q is given by- Above distance is calculated for each image if this distance comes out less than a tolerance value D. The value of D is decided according to the application. In our system this value is selected by the user. This is the registration form which shows that the userID is given by the system itself. Fig 3.Registration Step 1 d(p q)=√ (p1-q1)2 +(p2-q2)2 +….+ (pn-qn)2 = √∑(p1-q1)2 i=1 to n
  • 4. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 233 This is the selection of sound signature and the click points for creating the password. Fig 3.Registration Step 2 IV. PROJECT SCOPE In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click- point per image. Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point hotspot analysis more challenging. Each click results in showing a next-image, in effect leading users down on each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning). It also makes attacks based on a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click- point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images.In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. 4.1 Authentication: The only significant user study on the security of graphical passwords for authentication was performed by Davis[2] and the present authors[3] in that work; we studied the security of two schemes based on image recognition, denoted “Face” and “Story,” which are described shortly. This study focused specifically on the impact of user selection of passwords in these schemes, and the security of the passwords that resulted. We recount some of the notable results from this study, and the methodologies used to reach them, as an illustration of some of the challenges that graphical passwords can face. In particular, this study demonstrated that graphical password schemes can be far weaker than textual passwords when users are permitted to choose their password. V. CONCLUSION AND FUTURE WORK We have proposed a novel approach which uses sound signature to recall graphical password click points. No previously developed system used this approach this system is helpful when user is logging after a long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text. REFERENCES [1] Cranor, L.F., S. Garfinkel. Security and Usability. O’Reilly Media, 2005. [2] Davis, D., F. Monrose, and M.K. Reiter. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium, 2004. [3] R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163, 1967. 4] A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  • 5. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 234 AUTHOR PROFILES [1] Anu Singh pursuing the bachelor degree in computer science from Pune University, in 2013. [2] Kiran Kshirsagar pursuing the bachelor degree in computer science from Pune University, in 2013. [3] Lipti Pradhan pursuing the bachelor degree in computer science from Pune University, in 2013.