SlideShare a Scribd company logo
1 of 3
Download to read offline
A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25
www.ijera.com 23 | P a g e
Color Based Authentication Scheme for Publically Disclosable
Entities
A. S. Syed Shahul Hameed*
*(III – Year, UG Student, Department of Computer Science Engineering, Perunthalaivar Kamarajar Institute of
Engineering and Technology, Nedungadu, Karaikal - 03)
ABSTRACT
Traditional password authentication system are not strong enough to cope up with the current age of cyber-
crime. It’s high time that new password authentication schemes are explored and studied. This paper aims to
provide an authentication system based on color recognition which would provide a way to encrypt both the
username and password. The Color based authentication system would provide an efficient way to encrypt
account details for sensitive applications like defense and banking.
Keywords – Authentication, Encryption, Security, Color.
I. INTRODUCTION
With the introduction of internet banking the
problem of achieving a secure transaction has always
been a concern. The modern age of cyber-crime also
triggers the search towards achieving a crack proof
encryption scheme for passwords. The most common
belief about security is that, it is the password which
is the most important entity in all computer
applications which has to be safe guarded at any
extent. However people tend to ignore the importance
of username. People are unaware of the fact that an
account is a combination of both username and
password. Further, most of the websites and banks
educate their customers on how to choose the
password and how to safeguard them, but almost no
emphasize is given for the username. This turns out
to be great fallback in security applications like
defense.
To hack any account, the attacker would try to
obtain the username first and not the password, which
turns out to be a very easy task. It could be very well
understood that the first step in hacking is to gain
access to the username of the victim. It can also be
observed that people, are naturally more susceptible
to disclose their username/user-id very easily.
Color based authentication could serve as a
viable solution to this generally unattended issue.
II. EXISTING METHODS
The most commonly followed authentication
techniques are: Card Based, Biometric Based and
Memory Based techniques. The usage of various
cards like ATM cards, credit cards, and smart cards
comes under the first category. Biometric techniques
such as iris scan and finger print are some of the most
secure authentication methods under biometric
authentication schemes in the world, but with a
severe consequence of expensiveness [1]. The
installment and maintenance of biometric device
requires huge cost. Further, they are unreliable at
times. Memory based technique is the most
commonly used method. One such memory based
technique is text based password, which are being
used since olden times. Currently picture based
passwords are also in use. The main drawback with
this method is, it is extremely prone to human errors.
III. COLOR BASED
AUTHENTICATICATION
In this authentication scheme an additional layer
of encryption is added using color as a parameter for
every character in the username and password. When
a user fills the login form, for each character he
types, he should be prompted to choose a color for it.
Essentially the user is associating a color for each and
every character he is typing in his username and
password. During account registration besides
choosing username and password the user should be
directed to choose a specific color for each and every
character of his username and password.
The text fields for username and password are
assigned with a CLR (Color) Listener, which would
record the color stroke, the user chooses for each
character. This data would be encrypted and sent to
the server. The server decrypts this data, and
compares it with the data stored in it already. Login
attempt succeeds if and only if, both the username,
password and the color of each character of the
username and password matches.
IV. ALGORITHM
Read Username and Password.
Read color stroke of every character.
If (Username AND Password AND color of each
character MATCHES value in server)
Proceed
Stop ().
RESEARCH ARTICLE OPEN ACCESS
A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25
www.ijera.com 24 | P a g e
V. DESIGN AND IMPLEMENTATION
Figure 1: Sample login screen
It could be easily inferred that this scheme of
authentication is not so easy and thus not suitable for
general uses like social networking. But for sensitive
application where security is more important this
authentication scheme would serve the purpose.
To implement this scheme of authentication the
login screen has to be redesigned to a certain level.
An intuitive way has to be provided to the user, so
that he can choose the color for every character of his
username and password.
Besides the text field for username and
password, another field for color has to be provided.
The color field has to be coded in such a way that it
resets for, every fresh characters the user enters either
in his username or password.
One possible user screen is shown in the Fig 1.
Here a dropdown box is used to choose the color for
each character the user enters.
VI. PRACTICALITY ANALYSIS
The usage of this scheme of authentication by
technical experts should not pose any problem and
can be very easily incorporated into sensitive areas
like defense and industrial applications. Another
important aspect is the login time. It could be seen
very well that the login time naturally tends to be
lengthier in this scheme of authentication. Further,
the user has an added responsibility of remembering
the color code he chose for each character in his
username and password. But this won’t be a concern
where security prioritizes over time and easiness.
Thus it could be concluded that this scheme of
authentication is less suited for day to day
applications (like e-mails) and more appropriate for
banking and defense.
VII. SECURITY ANALYSIS
Now let’s explore the various possible methods
that are generally employed to break a password.
7.1. Brute Force Search
A conventional text based password has a
sufficiently large password space of 94^N [1], where
N is the length of password, and 94 is the number of
printable characters excluding SPACE. It could be
observed that, this itself is a very huge space and only
very powerful programs can break a password
through this method [1]. But this color based
authentication scheme increases the password space
several times because the different color for each
character itself forms its own password space.
Ultimately the password space, in this scheme of
authentication would turn out to be (94*K)^N, where
K is the number of color options given for the user
and N is the length of the password.
7.2. Key logger
Key logger is one of the most commonly used
programs by attackers, to steal username and
passwords. A well coded basic key logger would
stealthily steal the username and password easily. But
with this color based scheme of authentication, this
problem could be encountered. Though the attacker
may gain access to the username and password of the
victim there’s no way that the attacker can gain
knowledge of the color code the victim used for
every character in his username and password.
7.3. Shoulder Surfing
Almost all of the text-based password scheme
are susceptible to shoulder surfing, which itself is
developing as a potentious problem. Though this
scheme of authentication is not completely resistant
to shoulder surfing it definitely makes things
complex for the attacker. It’s difficult for the attacker
to concentrate on both the character and the color
code of each character.
VIII. CONCLUSION
Color based password authentication may
provide better security than traditional text based
password schemes. It provides an efficient way to
protect publically disclosable entities like username.
Its best suited for sensitive applications like defense
and banking. To make this scheme complete, much
more research and studies are needed for a successful
implementation.
IX. ACKNOWLEDGEMENTS
I wish to thank my mother for her continuous
support through this paper. I would like to express my
gratitude to professor Maneckshaw. B (Department of
Mathematics, Karaikal Polytechnic College) for
recognising my idea, and helping me for completing
this paper. I would also like to thank my brother-in-
law Mr. R. Shaik Ali Maricair for helping me to
prepare the image resource for this paper.
A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25
www.ijera.com 25 | P a g e
REFERENCES
[1] ARUN PRAKASH. M., GOKUL. T.R.,
2011 Network Security-Overcome Password
Hacking Through Graphical Password
Authentication. Proceedings of the National
Conference on Innovations in Emerging
Technology-2011 Kongu Engineering
College, Perundurai, Erode, Tamilnadu,
India.17 & 18 February, 2011.pp.43-48.
[2] BIRGET, J., HONG, D., AND MEMON, N.
2003. Robust discretization, with an
application to graphical passwords.
Cryptology ePrint Archive, Report
2003/168.

More Related Content

What's hot

Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityIJCSEA Journal
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 

What's hot (20)

Vshantaram
VshantaramVshantaram
Vshantaram
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 

Viewers also liked

crossroads newsletter
crossroads newslettercrossroads newsletter
crossroads newsletterKara Smoker
 
CanPrev-Natural-Medicine-Guide-2017-compressed
CanPrev-Natural-Medicine-Guide-2017-compressedCanPrev-Natural-Medicine-Guide-2017-compressed
CanPrev-Natural-Medicine-Guide-2017-compressedbluecricket
 
Estuardo Santos Porras - Senior Pilot Technician Competence
Estuardo Santos Porras - Senior Pilot Technician CompetenceEstuardo Santos Porras - Senior Pilot Technician Competence
Estuardo Santos Porras - Senior Pilot Technician CompetenceEstuardo Santos
 
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...lcosteiu2005
 
eng.dalia genedy pic
eng.dalia genedy piceng.dalia genedy pic
eng.dalia genedy picdalia genedy
 
Vistup vectors
Vistup vectorsVistup vectors
Vistup vectorsVlasyukA
 
SPJ ~Sports Policy for Japan~ Presentation
SPJ ~Sports Policy for Japan~  PresentationSPJ ~Sports Policy for Japan~  Presentation
SPJ ~Sports Policy for Japan~ Presentationkooooodai
 
Building Your Freelance Business: From a freelancer to an entrepreneur
Building Your Freelance Business: From a freelancer to an entrepreneur Building Your Freelance Business: From a freelancer to an entrepreneur
Building Your Freelance Business: From a freelancer to an entrepreneur Madiha Hamid
 
Epic research weekly derivatives market report on 9 february 2015
Epic research weekly derivatives market report on 9 february 2015Epic research weekly derivatives market report on 9 february 2015
Epic research weekly derivatives market report on 9 february 2015Epic Research Limited
 
How Teams Work team based conflict management approaches
How Teams Work team based conflict management approachesHow Teams Work team based conflict management approaches
How Teams Work team based conflict management approachesMike Cardus
 
Reprodução humana alunos
Reprodução humana alunosReprodução humana alunos
Reprodução humana alunosLuís Miranda
 
Linux avancado
Linux avancadoLinux avancado
Linux avancadoTiago
 
Buzzing Stocks in D-Street before European Opening
Buzzing Stocks in D-Street before European OpeningBuzzing Stocks in D-Street before European Opening
Buzzing Stocks in D-Street before European OpeningShailesh Saraf
 

Viewers also liked (16)

RCV
RCVRCV
RCV
 
crossroads newsletter
crossroads newslettercrossroads newsletter
crossroads newsletter
 
CanPrev-Natural-Medicine-Guide-2017-compressed
CanPrev-Natural-Medicine-Guide-2017-compressedCanPrev-Natural-Medicine-Guide-2017-compressed
CanPrev-Natural-Medicine-Guide-2017-compressed
 
Estuardo Santos Porras - Senior Pilot Technician Competence
Estuardo Santos Porras - Senior Pilot Technician CompetenceEstuardo Santos Porras - Senior Pilot Technician Competence
Estuardo Santos Porras - Senior Pilot Technician Competence
 
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...
238801761 200633552-190749611-carti-800-de-exercitii-si-probleme-clasa-3-ed-a...
 
eng.dalia genedy pic
eng.dalia genedy piceng.dalia genedy pic
eng.dalia genedy pic
 
La nativita'
La nativita'La nativita'
La nativita'
 
Nick Michalopoulos Resume
Nick Michalopoulos ResumeNick Michalopoulos Resume
Nick Michalopoulos Resume
 
Vistup vectors
Vistup vectorsVistup vectors
Vistup vectors
 
SPJ ~Sports Policy for Japan~ Presentation
SPJ ~Sports Policy for Japan~  PresentationSPJ ~Sports Policy for Japan~  Presentation
SPJ ~Sports Policy for Japan~ Presentation
 
Building Your Freelance Business: From a freelancer to an entrepreneur
Building Your Freelance Business: From a freelancer to an entrepreneur Building Your Freelance Business: From a freelancer to an entrepreneur
Building Your Freelance Business: From a freelancer to an entrepreneur
 
Epic research weekly derivatives market report on 9 february 2015
Epic research weekly derivatives market report on 9 february 2015Epic research weekly derivatives market report on 9 february 2015
Epic research weekly derivatives market report on 9 february 2015
 
How Teams Work team based conflict management approaches
How Teams Work team based conflict management approachesHow Teams Work team based conflict management approaches
How Teams Work team based conflict management approaches
 
Reprodução humana alunos
Reprodução humana alunosReprodução humana alunos
Reprodução humana alunos
 
Linux avancado
Linux avancadoLinux avancado
Linux avancado
 
Buzzing Stocks in D-Street before European Opening
Buzzing Stocks in D-Street before European OpeningBuzzing Stocks in D-Street before European Opening
Buzzing Stocks in D-Street before European Opening
 

Similar to Color Based Authentication Scheme for Publically Disclosable Entities

Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication Systempaperpublications3
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyIRJET Journal
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET Journal
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...IRJET Journal
 

Similar to Color Based Authentication Scheme for Publically Disclosable Entities (20)

Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication System
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
3D Password
3D Password3D Password
3D Password
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Color Based Authentication Scheme for Publically Disclosable Entities

  • 1. A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25 www.ijera.com 23 | P a g e Color Based Authentication Scheme for Publically Disclosable Entities A. S. Syed Shahul Hameed* *(III – Year, UG Student, Department of Computer Science Engineering, Perunthalaivar Kamarajar Institute of Engineering and Technology, Nedungadu, Karaikal - 03) ABSTRACT Traditional password authentication system are not strong enough to cope up with the current age of cyber- crime. It’s high time that new password authentication schemes are explored and studied. This paper aims to provide an authentication system based on color recognition which would provide a way to encrypt both the username and password. The Color based authentication system would provide an efficient way to encrypt account details for sensitive applications like defense and banking. Keywords – Authentication, Encryption, Security, Color. I. INTRODUCTION With the introduction of internet banking the problem of achieving a secure transaction has always been a concern. The modern age of cyber-crime also triggers the search towards achieving a crack proof encryption scheme for passwords. The most common belief about security is that, it is the password which is the most important entity in all computer applications which has to be safe guarded at any extent. However people tend to ignore the importance of username. People are unaware of the fact that an account is a combination of both username and password. Further, most of the websites and banks educate their customers on how to choose the password and how to safeguard them, but almost no emphasize is given for the username. This turns out to be great fallback in security applications like defense. To hack any account, the attacker would try to obtain the username first and not the password, which turns out to be a very easy task. It could be very well understood that the first step in hacking is to gain access to the username of the victim. It can also be observed that people, are naturally more susceptible to disclose their username/user-id very easily. Color based authentication could serve as a viable solution to this generally unattended issue. II. EXISTING METHODS The most commonly followed authentication techniques are: Card Based, Biometric Based and Memory Based techniques. The usage of various cards like ATM cards, credit cards, and smart cards comes under the first category. Biometric techniques such as iris scan and finger print are some of the most secure authentication methods under biometric authentication schemes in the world, but with a severe consequence of expensiveness [1]. The installment and maintenance of biometric device requires huge cost. Further, they are unreliable at times. Memory based technique is the most commonly used method. One such memory based technique is text based password, which are being used since olden times. Currently picture based passwords are also in use. The main drawback with this method is, it is extremely prone to human errors. III. COLOR BASED AUTHENTICATICATION In this authentication scheme an additional layer of encryption is added using color as a parameter for every character in the username and password. When a user fills the login form, for each character he types, he should be prompted to choose a color for it. Essentially the user is associating a color for each and every character he is typing in his username and password. During account registration besides choosing username and password the user should be directed to choose a specific color for each and every character of his username and password. The text fields for username and password are assigned with a CLR (Color) Listener, which would record the color stroke, the user chooses for each character. This data would be encrypted and sent to the server. The server decrypts this data, and compares it with the data stored in it already. Login attempt succeeds if and only if, both the username, password and the color of each character of the username and password matches. IV. ALGORITHM Read Username and Password. Read color stroke of every character. If (Username AND Password AND color of each character MATCHES value in server) Proceed Stop (). RESEARCH ARTICLE OPEN ACCESS
  • 2. A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25 www.ijera.com 24 | P a g e V. DESIGN AND IMPLEMENTATION Figure 1: Sample login screen It could be easily inferred that this scheme of authentication is not so easy and thus not suitable for general uses like social networking. But for sensitive application where security is more important this authentication scheme would serve the purpose. To implement this scheme of authentication the login screen has to be redesigned to a certain level. An intuitive way has to be provided to the user, so that he can choose the color for every character of his username and password. Besides the text field for username and password, another field for color has to be provided. The color field has to be coded in such a way that it resets for, every fresh characters the user enters either in his username or password. One possible user screen is shown in the Fig 1. Here a dropdown box is used to choose the color for each character the user enters. VI. PRACTICALITY ANALYSIS The usage of this scheme of authentication by technical experts should not pose any problem and can be very easily incorporated into sensitive areas like defense and industrial applications. Another important aspect is the login time. It could be seen very well that the login time naturally tends to be lengthier in this scheme of authentication. Further, the user has an added responsibility of remembering the color code he chose for each character in his username and password. But this won’t be a concern where security prioritizes over time and easiness. Thus it could be concluded that this scheme of authentication is less suited for day to day applications (like e-mails) and more appropriate for banking and defense. VII. SECURITY ANALYSIS Now let’s explore the various possible methods that are generally employed to break a password. 7.1. Brute Force Search A conventional text based password has a sufficiently large password space of 94^N [1], where N is the length of password, and 94 is the number of printable characters excluding SPACE. It could be observed that, this itself is a very huge space and only very powerful programs can break a password through this method [1]. But this color based authentication scheme increases the password space several times because the different color for each character itself forms its own password space. Ultimately the password space, in this scheme of authentication would turn out to be (94*K)^N, where K is the number of color options given for the user and N is the length of the password. 7.2. Key logger Key logger is one of the most commonly used programs by attackers, to steal username and passwords. A well coded basic key logger would stealthily steal the username and password easily. But with this color based scheme of authentication, this problem could be encountered. Though the attacker may gain access to the username and password of the victim there’s no way that the attacker can gain knowledge of the color code the victim used for every character in his username and password. 7.3. Shoulder Surfing Almost all of the text-based password scheme are susceptible to shoulder surfing, which itself is developing as a potentious problem. Though this scheme of authentication is not completely resistant to shoulder surfing it definitely makes things complex for the attacker. It’s difficult for the attacker to concentrate on both the character and the color code of each character. VIII. CONCLUSION Color based password authentication may provide better security than traditional text based password schemes. It provides an efficient way to protect publically disclosable entities like username. Its best suited for sensitive applications like defense and banking. To make this scheme complete, much more research and studies are needed for a successful implementation. IX. ACKNOWLEDGEMENTS I wish to thank my mother for her continuous support through this paper. I would like to express my gratitude to professor Maneckshaw. B (Department of Mathematics, Karaikal Polytechnic College) for recognising my idea, and helping me for completing this paper. I would also like to thank my brother-in- law Mr. R. Shaik Ali Maricair for helping me to prepare the image resource for this paper.
  • 3. A. S. Syed Shahul Hameed Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1, ( Part -6) January 2015, pp.23-25 www.ijera.com 25 | P a g e REFERENCES [1] ARUN PRAKASH. M., GOKUL. T.R., 2011 Network Security-Overcome Password Hacking Through Graphical Password Authentication. Proceedings of the National Conference on Innovations in Emerging Technology-2011 Kongu Engineering College, Perundurai, Erode, Tamilnadu, India.17 & 18 February, 2011.pp.43-48. [2] BIRGET, J., HONG, D., AND MEMON, N. 2003. Robust discretization, with an application to graphical passwords. Cryptology ePrint Archive, Report 2003/168.