SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 554
Rorschach Based Security Application for Android
Arnov Sinha 1
1
Test and Quality Engineer
1
Department of Communication Engineering
Abstract— As the market and demand of smartphones is
growing exponentially day by day. The need for security of
personal and business data increases as well. Today smart
phones are amongst the biggest target by individuals with
malicious intent to gain access to data. The need arises for
new security methods to come up for the protection of
information. The paper presents intuitive and perception
based security using Rorschach inkblot like images. These
are used to authenticate a user to access their personal data
in their android smart phones.
Keywords: Android, Rorschach, Mobile, Security
I. INTRODUCTION
Security breach is a problem that has been consistently
growing by trumping every means that is being applied to
control it. With a phenomenal rise in smartphones and a
consumer culture that instills individuals to have more than
one smartphone, security is a problem that is only getting
worse with time. Even with new methods used for
protection of smart phones, there are lapses in security as
people are using similar or simpler passwords so that they
can remember it easily, thus becoming the weakest link in a
secure environment. The only pragmatic solution to
securityis to come up with new techniques and algorithms
for protection of data.
The main aim of this application is to provide with
a security mechanism not entirely based on memory and
more focused on perception of an individual. The perception
of an individual is based on his experiences throughout his
life and also varies for every individual. This kind of
security helps in avoiding using common and predictable
passwords and passphrases.
II. PERCEPTION BASED SECURITY SYSTEMS
The challenge at hand is to design a system from the
granular level to all the way up that addresses technical
issues, like implementing the Rorschach model for
perceptive security.
It must be designed such that the user remembers
how he had interpreted the inkblot by having a pre-start test.
Psychological studies show that humans can remember
pictorial representation more than textual or verbal
presentation [1].
Thus the goal of this application is to use an
individual’s experience to generate a password which would
not require them to memorize it, and neither would it be
weak, as it would be based solely on perception and not on
rational processing, which would lead to predictive
passwords.
Fig. 1: Two of the original ten Rorschach cards created by
Hermann Rorschach and printed in his book Rorschach test
– Psycho diagnostic Plates [3].
III. EXISTING SYSTEM
The current systems that are in place to provide access
control security are Pin, Password, Pattern Lock and Facial
recognition. Pin protection ranges from 4-16 numeric codes
which are used to protect your phone.
Fig. 2: Pin Based Security [2]
Password based security is your standard security
mechanism used in other apps and devices. It is
alphanumeric in nature and ranges from 4 to 16 characters.
It needs to have at least one character and it becomes
inconvenient when the password is long and complex for
increased security and you have to type it each time you
want to access the phone.
Pattern based security is introduced by Google in
their Android smartphones. It is a 3 X 3 matrix of dots
where 4 or more dots are connected to form a pattern. This
pattern is used instead of a passcode to access and secure the
smartphone. Pattern has rules such as usage of at least 4 dots
and maximum of 9 dots. One dot can be used only one time.
The order of the connection matters, making it a directed
graph and dots are connected with a straight line meaning
that all points on the path of the line gets connected [4].
Each and every system mentioned above have
some drawbacks. Pin based security although secure, the
longer the PIN is, and the harder it will be for someone to
guess. However, the longer it is, the more inconvenience it
Rorschach Based Security Application for Android
(IJSRD/Vol. 2/Issue 07/2014/125)
All rights reserved by www.ijsrd.com 555
is to type in each time you want to unlock your phone. And
remembering numeric codes of 10 digits or more becomes
exponentially difficult for an average user.
Password based security has similar drawbacks of
PIN based security. But it becomes more secure as
alphanumeric passwords are used. Making the probability
lower even further. But with each strong and complex
password comes the added difficulty in remembering the
password and also the inconvenience in typing it. Users end
up using pins or passwords of personal significance like
birthdays and names to avoid the hassle of coming up with
complex pins or passwords.
Fig. 3: Pin Based Security [2]
Pattern based security, though being innovative and
providing ease of use, is the worst among the three security
access protocols provided for android smartphones. For a
given no of dots there are few combination as compared to
the other two security mechanisms. However it is
compensated by limiting the speed and no of tries. The
phone allows 5 tries before suspending the lock screen for
30 seconds. The limit for pattern tries is set to 20 before it
locks out the user completely and asks for Google account
and password [4] [5].
Apart from the standard attackslike brute force,
dictionary, etc., one of the ways the attacker tries to figure
out the password is by checking the smudges made by finger
on the screen. This is clearly viewed in some certain angles
on the smartphone. In the case of Pin/Password code the
attacker is helped out only a little since the length of the
passphrase is still unknown to him and whether the same pin
has been used more than once. Thus increasing the
probability and increasing the no of tries. In the case of
pattern, the dots of the pattern are known if smudges are
checked. Depending on the number and selection of dots the
security can decrease dramatically.
TABLE 1
Pattern security analysis compared to PIN [4]
No of No. of Possibilities No. of pin tries
Dots/No. for same success rate
Pattern PIN as for 20 PIN tries
4
162
4
1.00
E+00
4
123
5
715
2
1.00
E+00
5
280
6
260
16
1.00
E+00
6
769
7
729
12
1.00
E+00
7
274
3
8
140
704
1.00
E+00
8
142
14
9
140
704
1.00
E+00
9
142
142
Σ
389
112
1.11
E+00
9
571
10
Fig. 4: Pattern based Security [2]
Rorschach Based Security Application for Android
(IJSRD/Vol. 2/Issue 07/2014/125)
All rights reserved by www.ijsrd.com 556
IV. PROPOSED SYSTEM
The system is built keeping in mind the drawbacks of the
previous methods and ease of use as a user. The working of
the system is quite simplistic and user oriented. In this
system, the user is greeted with a set of inkblot cards which
is user defined. He has to then give a pre start test for the
number of cards he has chosen i.e. he has to type the
description of what he perceives in the first inkblot in
preferably one word. The user is then showed the other
cards and the process repeats itself till all the cards are
described. The entire test is then repeated for one final time.
This is to ensure that the cognitive memory is able to reason
correctly for the answer you are setting as the passcode.
Once the exercise for the passcode is complete, the
setting screen is next shown. Here variety of changes can be
made to the default application. The user can choose the
number of inkblot cards, the number of tries per card,
randomness of the cards chosen, as well as the selection of
the cards he wants to use for access security.
Fig. 5: Lock Screen shown to the user with one of the
inkblot cards.
When the application settings are done the user can
now start using the security mechanism by locking their
screens. Whenever they wake the phone up they are greeted
by one of the Inkblot cards configured by them. They then
have to click on the textbox to provide the passcode they set
for that inkblot card. Once the passcode is verified the
smartphone can be accessed.
The application will provide random inkblot cards
every time the phone is unlocked from the set of inkblots
chosen by the user. This will ensure that even though
smudges would be visible, the attacker will not only have
problem figuring out the combination of the passcode but
which inkblot to go along with it as well, making the access
security impregnable.
One of the major factors of using perception based
security is that the user does not have to worry about making
complex passcodes strong enough and remembering them.
As it is solely based on perception, what the user sees in the
inkblot cards, will be distinct in nature, based on his
experiences in life. No matter how close the attacker is to
the victim, perception of that person will always be distinct
as that of the user.
Fig. 5: Lock Screen asking for the passcode set by the user.
Fig. 6: one of the inkblot card used in the application.
Here dictionary attack also fails, as the passcode
could also be of any other languages known to the user. For
example in Fig. 6 the inkblot shown could lead the user to
think of a smiling raccoon, and for others it will be a baby
crying in a cradle. Now this interpretation could be in the
user’s native language or of some other language thatthe
user knows. The inkblot cards used are not of the original
ten cards of Hermann Rorschach, so as to avoid the attacker
testing the user for hint of the passcode.
V. CONCLUSION
In this paper an Android based application for providing
perception based access control security is presented. It uses
the cognitive reasoning and experience of the user to create
passcodes which is unique to him and difficult to predict for
attackers.
This application has the potential to have
widespread use as it provides ease of use to the user and
Rorschach Based Security Application for Android
(IJSRD/Vol. 2/Issue 07/2014/125)
All rights reserved by www.ijsrd.com 557
freedom from thinking complex passwords and prevents
from using common passphrases/patterns which are easy to
guess. With the security concerns growing day by the day
the usability of this application only increases with time.
ACKNOWLEDGMENT
PrashantBhushan, thanks for helping me design the UI of
the application.
MananRastogi, thanks for proofreading and helping
me figure out pros and cons of the system to improve upon.
REFERENCES
[1] Inkblot authentication - Adam Stubblefield and
Daniel R. Simon(John Hopkins University)
(Microsoft Researcher)
[2] http://www.maketecheasier.com/android-lock-screen-
with-maximum-security/
[3] http://en.wikipedia.org/wiki/Rorschach_test
[4] http://sinustrom.info/2012/05/21/android-unlock-
pattern-security-analysis/
[5] Quantifying the security of graphical passwords: The
case of android unlock patterns Sebastian Uellenbeck,
Markus Dürmuth, Christopher Wolf, and Thorsten
Holz Horst Görtz Institute for IT-Security, Ruhr-
University Bochum.

More Related Content

What's hot

Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSIJNSA Journal
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 

What's hot (20)

Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 
3D - password
3D - password3D - password
3D - password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3D Password
3D Password3D Password
3D Password
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d passwords
3d passwords 3d passwords
3d passwords
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3 d password
3 d password3 d password
3 d password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D password
3D password3D password
3D password
 

Viewers also liked

Kinetics and Mechanism of Protection of Thiamine from Phosphate Radical
Kinetics and Mechanism of Protection of Thiamine from Phosphate RadicalKinetics and Mechanism of Protection of Thiamine from Phosphate Radical
Kinetics and Mechanism of Protection of Thiamine from Phosphate Radicalijsrd.com
 
Brand Recall in of Color Coated Roofing Sheet Market of Bangalore
Brand Recall in of Color Coated Roofing Sheet Market of BangaloreBrand Recall in of Color Coated Roofing Sheet Market of Bangalore
Brand Recall in of Color Coated Roofing Sheet Market of Bangaloreijsrd.com
 
An Efficient Construction of Online Testable Circuits using Reversible Logic ...
An Efficient Construction of Online Testable Circuits using Reversible Logic ...An Efficient Construction of Online Testable Circuits using Reversible Logic ...
An Efficient Construction of Online Testable Circuits using Reversible Logic ...ijsrd.com
 
Data Mining in Multi-Instance and Multi-Represented Objects
Data Mining in Multi-Instance and Multi-Represented ObjectsData Mining in Multi-Instance and Multi-Represented Objects
Data Mining in Multi-Instance and Multi-Represented Objectsijsrd.com
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Iganfis Data Mining Approach for Forecasting Cancer Threats
Iganfis Data Mining Approach for Forecasting Cancer ThreatsIganfis Data Mining Approach for Forecasting Cancer Threats
Iganfis Data Mining Approach for Forecasting Cancer Threatsijsrd.com
 
High Speed Carryselect Adder
High Speed Carryselect AdderHigh Speed Carryselect Adder
High Speed Carryselect Adderijsrd.com
 
Snow Avalanche and its Impacts, Prevention and Challenges
Snow Avalanche and its Impacts, Prevention and ChallengesSnow Avalanche and its Impacts, Prevention and Challenges
Snow Avalanche and its Impacts, Prevention and Challengesijsrd.com
 
Design and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select AdderDesign and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select Adderijsrd.com
 
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...ijsrd.com
 
Review of Development done in Computerization of Electrical Specifications fo...
Review of Development done in Computerization of Electrical Specifications fo...Review of Development done in Computerization of Electrical Specifications fo...
Review of Development done in Computerization of Electrical Specifications fo...ijsrd.com
 
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy System
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy SystemComparative Analysis of Solid Oxide Fuel Cell with Battery Energy System
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy Systemijsrd.com
 
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...Experimental Study on the Mechanical Properties of Concrete Incorporating PET...
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...ijsrd.com
 
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...ijsrd.com
 
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSESREGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSESijsrd.com
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...ijsrd.com
 
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...ijsrd.com
 

Viewers also liked (18)

Kinetics and Mechanism of Protection of Thiamine from Phosphate Radical
Kinetics and Mechanism of Protection of Thiamine from Phosphate RadicalKinetics and Mechanism of Protection of Thiamine from Phosphate Radical
Kinetics and Mechanism of Protection of Thiamine from Phosphate Radical
 
Brand Recall in of Color Coated Roofing Sheet Market of Bangalore
Brand Recall in of Color Coated Roofing Sheet Market of BangaloreBrand Recall in of Color Coated Roofing Sheet Market of Bangalore
Brand Recall in of Color Coated Roofing Sheet Market of Bangalore
 
An Efficient Construction of Online Testable Circuits using Reversible Logic ...
An Efficient Construction of Online Testable Circuits using Reversible Logic ...An Efficient Construction of Online Testable Circuits using Reversible Logic ...
An Efficient Construction of Online Testable Circuits using Reversible Logic ...
 
Data Mining in Multi-Instance and Multi-Represented Objects
Data Mining in Multi-Instance and Multi-Represented ObjectsData Mining in Multi-Instance and Multi-Represented Objects
Data Mining in Multi-Instance and Multi-Represented Objects
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Iganfis Data Mining Approach for Forecasting Cancer Threats
Iganfis Data Mining Approach for Forecasting Cancer ThreatsIganfis Data Mining Approach for Forecasting Cancer Threats
Iganfis Data Mining Approach for Forecasting Cancer Threats
 
High Speed Carryselect Adder
High Speed Carryselect AdderHigh Speed Carryselect Adder
High Speed Carryselect Adder
 
Snow Avalanche and its Impacts, Prevention and Challenges
Snow Avalanche and its Impacts, Prevention and ChallengesSnow Avalanche and its Impacts, Prevention and Challenges
Snow Avalanche and its Impacts, Prevention and Challenges
 
Design and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select AdderDesign and Verification of Area Efficient Carry Select Adder
Design and Verification of Area Efficient Carry Select Adder
 
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebs...
 
Review of Development done in Computerization of Electrical Specifications fo...
Review of Development done in Computerization of Electrical Specifications fo...Review of Development done in Computerization of Electrical Specifications fo...
Review of Development done in Computerization of Electrical Specifications fo...
 
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy System
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy SystemComparative Analysis of Solid Oxide Fuel Cell with Battery Energy System
Comparative Analysis of Solid Oxide Fuel Cell with Battery Energy System
 
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...Experimental Study on the Mechanical Properties of Concrete Incorporating PET...
Experimental Study on the Mechanical Properties of Concrete Incorporating PET...
 
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...
Gain Enhancement of Series Feed Square Patch Microstrip Antenna Array for S b...
 
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSESREGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blend...
 
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Ma...
 

Similar to Rorschach Based Security for Smartphones

A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Passwordijtsrd
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Analyzing the Security of Smartphone Unlock PINs.pptx
Analyzing the Security of Smartphone Unlock PINs.pptxAnalyzing the Security of Smartphone Unlock PINs.pptx
Analyzing the Security of Smartphone Unlock PINs.pptxPrerana Khatiwada
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)IAESIJEECS
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfaoneonlinestore1
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceSTO STRATEGY
 

Similar to Rorschach Based Security for Smartphones (20)

A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Smart Password
Smart PasswordSmart Password
Smart Password
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Analyzing the Security of Smartphone Unlock PINs.pptx
Analyzing the Security of Smartphone Unlock PINs.pptxAnalyzing the Security of Smartphone Unlock PINs.pptx
Analyzing the Security of Smartphone Unlock PINs.pptx
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
3d authentication
3d authentication3d authentication
3d authentication
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry device
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Rorschach Based Security for Smartphones

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 554 Rorschach Based Security Application for Android Arnov Sinha 1 1 Test and Quality Engineer 1 Department of Communication Engineering Abstract— As the market and demand of smartphones is growing exponentially day by day. The need for security of personal and business data increases as well. Today smart phones are amongst the biggest target by individuals with malicious intent to gain access to data. The need arises for new security methods to come up for the protection of information. The paper presents intuitive and perception based security using Rorschach inkblot like images. These are used to authenticate a user to access their personal data in their android smart phones. Keywords: Android, Rorschach, Mobile, Security I. INTRODUCTION Security breach is a problem that has been consistently growing by trumping every means that is being applied to control it. With a phenomenal rise in smartphones and a consumer culture that instills individuals to have more than one smartphone, security is a problem that is only getting worse with time. Even with new methods used for protection of smart phones, there are lapses in security as people are using similar or simpler passwords so that they can remember it easily, thus becoming the weakest link in a secure environment. The only pragmatic solution to securityis to come up with new techniques and algorithms for protection of data. The main aim of this application is to provide with a security mechanism not entirely based on memory and more focused on perception of an individual. The perception of an individual is based on his experiences throughout his life and also varies for every individual. This kind of security helps in avoiding using common and predictable passwords and passphrases. II. PERCEPTION BASED SECURITY SYSTEMS The challenge at hand is to design a system from the granular level to all the way up that addresses technical issues, like implementing the Rorschach model for perceptive security. It must be designed such that the user remembers how he had interpreted the inkblot by having a pre-start test. Psychological studies show that humans can remember pictorial representation more than textual or verbal presentation [1]. Thus the goal of this application is to use an individual’s experience to generate a password which would not require them to memorize it, and neither would it be weak, as it would be based solely on perception and not on rational processing, which would lead to predictive passwords. Fig. 1: Two of the original ten Rorschach cards created by Hermann Rorschach and printed in his book Rorschach test – Psycho diagnostic Plates [3]. III. EXISTING SYSTEM The current systems that are in place to provide access control security are Pin, Password, Pattern Lock and Facial recognition. Pin protection ranges from 4-16 numeric codes which are used to protect your phone. Fig. 2: Pin Based Security [2] Password based security is your standard security mechanism used in other apps and devices. It is alphanumeric in nature and ranges from 4 to 16 characters. It needs to have at least one character and it becomes inconvenient when the password is long and complex for increased security and you have to type it each time you want to access the phone. Pattern based security is introduced by Google in their Android smartphones. It is a 3 X 3 matrix of dots where 4 or more dots are connected to form a pattern. This pattern is used instead of a passcode to access and secure the smartphone. Pattern has rules such as usage of at least 4 dots and maximum of 9 dots. One dot can be used only one time. The order of the connection matters, making it a directed graph and dots are connected with a straight line meaning that all points on the path of the line gets connected [4]. Each and every system mentioned above have some drawbacks. Pin based security although secure, the longer the PIN is, and the harder it will be for someone to guess. However, the longer it is, the more inconvenience it
  • 2. Rorschach Based Security Application for Android (IJSRD/Vol. 2/Issue 07/2014/125) All rights reserved by www.ijsrd.com 555 is to type in each time you want to unlock your phone. And remembering numeric codes of 10 digits or more becomes exponentially difficult for an average user. Password based security has similar drawbacks of PIN based security. But it becomes more secure as alphanumeric passwords are used. Making the probability lower even further. But with each strong and complex password comes the added difficulty in remembering the password and also the inconvenience in typing it. Users end up using pins or passwords of personal significance like birthdays and names to avoid the hassle of coming up with complex pins or passwords. Fig. 3: Pin Based Security [2] Pattern based security, though being innovative and providing ease of use, is the worst among the three security access protocols provided for android smartphones. For a given no of dots there are few combination as compared to the other two security mechanisms. However it is compensated by limiting the speed and no of tries. The phone allows 5 tries before suspending the lock screen for 30 seconds. The limit for pattern tries is set to 20 before it locks out the user completely and asks for Google account and password [4] [5]. Apart from the standard attackslike brute force, dictionary, etc., one of the ways the attacker tries to figure out the password is by checking the smudges made by finger on the screen. This is clearly viewed in some certain angles on the smartphone. In the case of Pin/Password code the attacker is helped out only a little since the length of the passphrase is still unknown to him and whether the same pin has been used more than once. Thus increasing the probability and increasing the no of tries. In the case of pattern, the dots of the pattern are known if smudges are checked. Depending on the number and selection of dots the security can decrease dramatically. TABLE 1 Pattern security analysis compared to PIN [4] No of No. of Possibilities No. of pin tries Dots/No. for same success rate Pattern PIN as for 20 PIN tries 4 162 4 1.00 E+00 4 123 5 715 2 1.00 E+00 5 280 6 260 16 1.00 E+00 6 769 7 729 12 1.00 E+00 7 274 3 8 140 704 1.00 E+00 8 142 14 9 140 704 1.00 E+00 9 142 142 Σ 389 112 1.11 E+00 9 571 10 Fig. 4: Pattern based Security [2]
  • 3. Rorschach Based Security Application for Android (IJSRD/Vol. 2/Issue 07/2014/125) All rights reserved by www.ijsrd.com 556 IV. PROPOSED SYSTEM The system is built keeping in mind the drawbacks of the previous methods and ease of use as a user. The working of the system is quite simplistic and user oriented. In this system, the user is greeted with a set of inkblot cards which is user defined. He has to then give a pre start test for the number of cards he has chosen i.e. he has to type the description of what he perceives in the first inkblot in preferably one word. The user is then showed the other cards and the process repeats itself till all the cards are described. The entire test is then repeated for one final time. This is to ensure that the cognitive memory is able to reason correctly for the answer you are setting as the passcode. Once the exercise for the passcode is complete, the setting screen is next shown. Here variety of changes can be made to the default application. The user can choose the number of inkblot cards, the number of tries per card, randomness of the cards chosen, as well as the selection of the cards he wants to use for access security. Fig. 5: Lock Screen shown to the user with one of the inkblot cards. When the application settings are done the user can now start using the security mechanism by locking their screens. Whenever they wake the phone up they are greeted by one of the Inkblot cards configured by them. They then have to click on the textbox to provide the passcode they set for that inkblot card. Once the passcode is verified the smartphone can be accessed. The application will provide random inkblot cards every time the phone is unlocked from the set of inkblots chosen by the user. This will ensure that even though smudges would be visible, the attacker will not only have problem figuring out the combination of the passcode but which inkblot to go along with it as well, making the access security impregnable. One of the major factors of using perception based security is that the user does not have to worry about making complex passcodes strong enough and remembering them. As it is solely based on perception, what the user sees in the inkblot cards, will be distinct in nature, based on his experiences in life. No matter how close the attacker is to the victim, perception of that person will always be distinct as that of the user. Fig. 5: Lock Screen asking for the passcode set by the user. Fig. 6: one of the inkblot card used in the application. Here dictionary attack also fails, as the passcode could also be of any other languages known to the user. For example in Fig. 6 the inkblot shown could lead the user to think of a smiling raccoon, and for others it will be a baby crying in a cradle. Now this interpretation could be in the user’s native language or of some other language thatthe user knows. The inkblot cards used are not of the original ten cards of Hermann Rorschach, so as to avoid the attacker testing the user for hint of the passcode. V. CONCLUSION In this paper an Android based application for providing perception based access control security is presented. It uses the cognitive reasoning and experience of the user to create passcodes which is unique to him and difficult to predict for attackers. This application has the potential to have widespread use as it provides ease of use to the user and
  • 4. Rorschach Based Security Application for Android (IJSRD/Vol. 2/Issue 07/2014/125) All rights reserved by www.ijsrd.com 557 freedom from thinking complex passwords and prevents from using common passphrases/patterns which are easy to guess. With the security concerns growing day by the day the usability of this application only increases with time. ACKNOWLEDGMENT PrashantBhushan, thanks for helping me design the UI of the application. MananRastogi, thanks for proofreading and helping me figure out pros and cons of the system to improve upon. REFERENCES [1] Inkblot authentication - Adam Stubblefield and Daniel R. Simon(John Hopkins University) (Microsoft Researcher) [2] http://www.maketecheasier.com/android-lock-screen- with-maximum-security/ [3] http://en.wikipedia.org/wiki/Rorschach_test [4] http://sinustrom.info/2012/05/21/android-unlock- pattern-security-analysis/ [5] Quantifying the security of graphical passwords: The case of android unlock patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr- University Bochum.