SlideShare a Scribd company logo
1 of 29
 NURUL NADZIRAH BT ADNAN
 BTBL 17047005
 KRK 5
 PROF. MADYA DR. ZARINA BT
MOHAMAD
Data hiding in graphical password
authentication using combination zero-
knowledge protocol and
steganography
Introduction / project background
• Authentication can be divided into two categories which is message
authentication and entity authentication[1]
• User authentication system is the most common entity authentication system
implemented and used for decades[2]. And user authentication mechanisms are
currently categorized into three main types:
• Graphical User Authentication (GUA) is an authentication using Graphical or
Picture as password.
• Authentication Techniques are categorized into three groups which are Pure
Recall Based, Cued Recall Based and Recognition Based [3]. All these
techniques are of the same concept, in which authenticate user by Graphical
based technique
Problem statement
• Security and usability problems associated with alphanumeric
passwords as “the password problem” (Wiedenbeck, Waters,
Birget, Broditskiy & Memon, 2007).[5] The problem arises
because passwords are expected to comply with two
fundamentally conflicting requirements:
1) Textual passwords should be easy to remember, and the user
authentication protocol should be executable quickly and
easily by humans[1]
2) Passwords should be secure, i.e., they should look random
and should be hard to guess; they also should be changed
frequently, and should be different on different accounts of
the same user; they should not be written down or stored in
plain text.
• However, a strong textual password is hard to memorize and recollect.
Therefore, users tend to choose passwords that are either short or from the
dictionary, rather than random alphanumeric strings. Even worse, it is not
a rare case that users may use only one username and password for
multiple accounts.[3]
Objective
To propose the combination of the zero-knowledge protocol and steganography
techniques in the graphical password to provide the authentication and confidentiality of
the data.
To design an improved version of GUAS method with combination steganography and
zero-knowledge protocol.
To implement an authentication approach based on graphical password using zero-
knowledge protocol and steganography.
Scope
User
• Develop a user authentication system based on graphical scheme that is more user
friendly.
System
• Proposing an improved Graphical User Authentication (GUAS) algorithm with
steganography while balance the trade-off between level of security, usability and
reliability.
• Implement the usability features in Graphical Password Prototype System for the
authentication.
• To overcome the disadvantages of textual password, we proposed the graphical
password in a authentication sector as a real time scenario with additional of
steganography
• If the user have login in one pc, user cannot login in another pc until he/she logout the
system.
Limitation
Literature review
Methods/ techniques Description Example
1. Steganography
Advance Encryption
Standard (AES) algorithm
Circular Least Significant
Bit (LSB) algorithm
Satwinder Sigh & Varinder
Kaur Attri 2015 ( “Dual Layer
Security on Data using LSB &
AES” ) [11]
• AES is a symmetric-key algorithm which means
that same key is used for both decryption and
encryption of data.
• LSB works by replacing the least significant bit
of the Pixel value of the cover image (in most of
the cases 8th bit is replaced).
Techniques Usability
Authentication process Memorability Example
2. D'ej'a Vu
Sonkar S.K., Paikrao R.L.,
Awadesh Kumar, Graphical
Password Authentication
Based On Color Image 2005
[10]
choosing pictures
among the set of
pictures. These pictures
are presented in a
random manner
Each picture is derived from
an initial seed and no need to
store the pictures pixel by
pixel so only the seeds need to
be stored in the server.
Therefore an authentication
server does not need to store
the whole picture, it simple
needs to store the initial seed
3. Passface algorithm
Grinal Tuscano, Aakriti
TulasyanJournal of
Engineering Research and
Applications Vol. 5, Issues
3, (Part 5)March 2015[9]
asked to choose a
certain number of
images of human faces
from the picture
database
user recognizes and clicks on
the known face
6. PassPoint (Wieden-
2017)[5]
7. Cued Click Points
(Chiasson)[5]
8. Blonder (GregE- 2017)
[5]
Click on several preregistered
locations of a picture in the right
sequence
Can be easy to
remember the image
4. Draw-a-Secret (DAS)
algorithm
(Jermyn in 2012)[1]
User draw a graph on a 2D grid Drawing sequence is
easy to remember
5. Grid selection
algorithm
Abinaya1, Prabha T2,
Sudha C3 “A Shoulder
Surfing Resistant Graphical
Authentication System ”
June 2018 [2]
They zoom in and create the
secret as per the original DAS
scheme. The location of the
chosen drawing grid adds an
extra degree of complexity to the
password as there are thousands
of possible drawing grids within
the selection grid.
This technique in
theory could
significantly increase
the password space
by adding up to 16
bits to the password
space.
9. CD GPS
“Recall Based
Authentication System-
An Overview”) by P.
Baby Maruthi1, Dr. K.
Sandhya Rani2 2017[3]
Choose image on a set of
images and draw a secret on
image.
Drawing a secret
on image is easy
to remember
10. Passmatrix
Deepika C4 and Kokila
R5 “A Shoulder Surfing
Resistant Graphical
Authentication System ”
in Asian Journal of
Applied Science and
Tech (AJAST)v2018[2]
Choose image cell as password
after image has spitted into 7*11
matrix. It have three modules.
1. Image Discretization
Module
2. Horizontal And Vertical
Axis Control Module
3. Login Indicator Generator
Module
select a password
using horizontal
and vertical scroll
bars
Expected result
• Increase the security
protocol during the
authentication phase.
• Avoid the shoulder
surfing resistant or
bruteforce attack from
the hackers or attackers.
Gantt chart
Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
Project Title Proposal
Research
Proposal Presentation
Development of
Methodology
Report Drafting of Proposal
Final Presentation
Report Submission
[1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder
Surfing Attack” in International Journal of Innovative Research in Computer and Communication
Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018.
[2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical
Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access
Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018.
[3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password
based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing
University of creative technology (LUCT), Cyberjaya, Malaysia.
References
[5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of
a graphical password system,” International Journal of HumanComputer Studies, 2007.
[6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2,
Number 2, April 2011.
[9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password
Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5,
Issues 3, (Part 5)March 2015, pp.60-64.
[10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image
Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012
[11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method
and AES Encryption Algorithm ” .
Figure above shows the framework about user authentication
System Architecture
System architecture is a conceptual model that defines the structure, behavior and more views of a
system; an architecture description is a formal description and representation of a system, organized
in a way that supports reasoning about the structures and behaviours of the system.
User Registration
• User enters complete details in form.( eg username, email, phone_number, first_name, last_name )
• View and select the images.
• Hash tags are created in the images
• Everything stored in database.
Login process
• User gives user id and request for OTP.
• Receives OTP.
• View images that choosen from the registration process.
• Generates password and string.
• Create hash
• Comparison hash
• If pass, it will direct to home page and if not it will display error message.
From the user perspective, the graphical password
authentication will work like this flowchart.
Figure above shows use case diagram user
D'ej'a Vu
Choosing pictures among the set of arts or abstract
pictures. These pictures are presented in a random manner
and we will have to choose it.
Least Significant Bit (LSB)
• Most commonly used to hide text or an image within a “stego image”
• One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the
secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image
to hide bits from the secret image.
Why use the LSB?
• Human observe will be unable to distinguish between the original image and the stego image.
Steganography algorithm
There are several types of segmentation
images, one of this type is segment image
based on the bytes. In flowchart, it explain
about segmentation through the LSB
algorithm is applied, and it is expected that the
groups of bytes in the cover image submit
mixture distributions. After obtaining the
mixture distribution of bytes group for each
original and secret image, the next step is to
embed the secret image bytes into the original
image bytes. The following steps describe
how the proposed model works:
Proof of concept
Proof of concept

More Related Content

What's hot

Cloud Analytics - Using cloud based services to analyse big data
Cloud Analytics - Using cloud based services to analyse big dataCloud Analytics - Using cloud based services to analyse big data
Cloud Analytics - Using cloud based services to analyse big dataDavid Parsons
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoIRJET Journal
 
B 08 Mpf(F) Ship Studies
B 08 Mpf(F) Ship StudiesB 08 Mpf(F) Ship Studies
B 08 Mpf(F) Ship Studiesguest9455a7
 
Manual for typing tutor for punjabi raavi font
Manual for typing tutor for punjabi raavi fontManual for typing tutor for punjabi raavi font
Manual for typing tutor for punjabi raavi fontTyping Guru
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
IoTBased Solar Power Monitoring.pptx
IoTBased Solar Power Monitoring.pptxIoTBased Solar Power Monitoring.pptx
IoTBased Solar Power Monitoring.pptxPoojaG86
 
Gsm based home(ppt)
Gsm based home(ppt)Gsm based home(ppt)
Gsm based home(ppt)kjabraham007
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud ServicesDr. Sunil Kr. Pandey
 
Magic Mirror for Museums
Magic Mirror for MuseumsMagic Mirror for Museums
Magic Mirror for MuseumsMagic Mirror
 
Voice Control Home Automation
Voice Control Home AutomationVoice Control Home Automation
Voice Control Home AutomationAbhishek Neb
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTDr. Amarjeet Singh
 

What's hot (20)

Cloud Analytics - Using cloud based services to analyse big data
Cloud Analytics - Using cloud based services to analyse big dataCloud Analytics - Using cloud based services to analyse big data
Cloud Analytics - Using cloud based services to analyse big data
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino Uno
 
B 08 Mpf(F) Ship Studies
B 08 Mpf(F) Ship StudiesB 08 Mpf(F) Ship Studies
B 08 Mpf(F) Ship Studies
 
Manual for typing tutor for punjabi raavi font
Manual for typing tutor for punjabi raavi fontManual for typing tutor for punjabi raavi font
Manual for typing tutor for punjabi raavi font
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
AUTOMATIC IRRIGATION SYSTEM DESIGN AND IMPLEMENTATION BASED ON IOT FOR AGRICU...
AUTOMATIC IRRIGATION SYSTEM DESIGN AND IMPLEMENTATION BASED ON IOT FOR AGRICU...AUTOMATIC IRRIGATION SYSTEM DESIGN AND IMPLEMENTATION BASED ON IOT FOR AGRICU...
AUTOMATIC IRRIGATION SYSTEM DESIGN AND IMPLEMENTATION BASED ON IOT FOR AGRICU...
 
IoTBased Solar Power Monitoring.pptx
IoTBased Solar Power Monitoring.pptxIoTBased Solar Power Monitoring.pptx
IoTBased Solar Power Monitoring.pptx
 
Gsm based home(ppt)
Gsm based home(ppt)Gsm based home(ppt)
Gsm based home(ppt)
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud Services
 
Cloud Analytics
Cloud AnalyticsCloud Analytics
Cloud Analytics
 
3- NIC Teaming
3- NIC Teaming3- NIC Teaming
3- NIC Teaming
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Magic Mirror for Museums
Magic Mirror for MuseumsMagic Mirror for Museums
Magic Mirror for Museums
 
Voice Control Home Automation
Voice Control Home AutomationVoice Control Home Automation
Voice Control Home Automation
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 

Similar to Data hiding in graphical password authentication using combination

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...NurrulHafizza
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareWinstina Kennedy
 

Similar to Data hiding in graphical password authentication using combination (20)

A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
3 d password
3 d password3 d password
3 d password
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 

Recently uploaded

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Data hiding in graphical password authentication using combination

  • 1.  NURUL NADZIRAH BT ADNAN  BTBL 17047005  KRK 5  PROF. MADYA DR. ZARINA BT MOHAMAD
  • 2. Data hiding in graphical password authentication using combination zero- knowledge protocol and steganography
  • 3. Introduction / project background • Authentication can be divided into two categories which is message authentication and entity authentication[1] • User authentication system is the most common entity authentication system implemented and used for decades[2]. And user authentication mechanisms are currently categorized into three main types:
  • 4. • Graphical User Authentication (GUA) is an authentication using Graphical or Picture as password. • Authentication Techniques are categorized into three groups which are Pure Recall Based, Cued Recall Based and Recognition Based [3]. All these techniques are of the same concept, in which authenticate user by Graphical based technique
  • 5. Problem statement • Security and usability problems associated with alphanumeric passwords as “the password problem” (Wiedenbeck, Waters, Birget, Broditskiy & Memon, 2007).[5] The problem arises because passwords are expected to comply with two fundamentally conflicting requirements: 1) Textual passwords should be easy to remember, and the user authentication protocol should be executable quickly and easily by humans[1] 2) Passwords should be secure, i.e., they should look random and should be hard to guess; they also should be changed frequently, and should be different on different accounts of the same user; they should not be written down or stored in plain text.
  • 6. • However, a strong textual password is hard to memorize and recollect. Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings. Even worse, it is not a rare case that users may use only one username and password for multiple accounts.[3]
  • 7. Objective To propose the combination of the zero-knowledge protocol and steganography techniques in the graphical password to provide the authentication and confidentiality of the data. To design an improved version of GUAS method with combination steganography and zero-knowledge protocol. To implement an authentication approach based on graphical password using zero- knowledge protocol and steganography.
  • 8. Scope User • Develop a user authentication system based on graphical scheme that is more user friendly. System • Proposing an improved Graphical User Authentication (GUAS) algorithm with steganography while balance the trade-off between level of security, usability and reliability. • Implement the usability features in Graphical Password Prototype System for the authentication.
  • 9. • To overcome the disadvantages of textual password, we proposed the graphical password in a authentication sector as a real time scenario with additional of steganography • If the user have login in one pc, user cannot login in another pc until he/she logout the system. Limitation
  • 10. Literature review Methods/ techniques Description Example 1. Steganography Advance Encryption Standard (AES) algorithm Circular Least Significant Bit (LSB) algorithm Satwinder Sigh & Varinder Kaur Attri 2015 ( “Dual Layer Security on Data using LSB & AES” ) [11] • AES is a symmetric-key algorithm which means that same key is used for both decryption and encryption of data. • LSB works by replacing the least significant bit of the Pixel value of the cover image (in most of the cases 8th bit is replaced).
  • 11. Techniques Usability Authentication process Memorability Example 2. D'ej'a Vu Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Based On Color Image 2005 [10] choosing pictures among the set of pictures. These pictures are presented in a random manner Each picture is derived from an initial seed and no need to store the pictures pixel by pixel so only the seeds need to be stored in the server. Therefore an authentication server does not need to store the whole picture, it simple needs to store the initial seed 3. Passface algorithm Grinal Tuscano, Aakriti TulasyanJournal of Engineering Research and Applications Vol. 5, Issues 3, (Part 5)March 2015[9] asked to choose a certain number of images of human faces from the picture database user recognizes and clicks on the known face
  • 12. 6. PassPoint (Wieden- 2017)[5] 7. Cued Click Points (Chiasson)[5] 8. Blonder (GregE- 2017) [5] Click on several preregistered locations of a picture in the right sequence Can be easy to remember the image 4. Draw-a-Secret (DAS) algorithm (Jermyn in 2012)[1] User draw a graph on a 2D grid Drawing sequence is easy to remember 5. Grid selection algorithm Abinaya1, Prabha T2, Sudha C3 “A Shoulder Surfing Resistant Graphical Authentication System ” June 2018 [2] They zoom in and create the secret as per the original DAS scheme. The location of the chosen drawing grid adds an extra degree of complexity to the password as there are thousands of possible drawing grids within the selection grid. This technique in theory could significantly increase the password space by adding up to 16 bits to the password space.
  • 13. 9. CD GPS “Recall Based Authentication System- An Overview”) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 2017[3] Choose image on a set of images and draw a secret on image. Drawing a secret on image is easy to remember 10. Passmatrix Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Tech (AJAST)v2018[2] Choose image cell as password after image has spitted into 7*11 matrix. It have three modules. 1. Image Discretization Module 2. Horizontal And Vertical Axis Control Module 3. Login Indicator Generator Module select a password using horizontal and vertical scroll bars
  • 14. Expected result • Increase the security protocol during the authentication phase. • Avoid the shoulder surfing resistant or bruteforce attack from the hackers or attackers.
  • 15. Gantt chart Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 Project Title Proposal Research Proposal Presentation Development of Methodology Report Drafting of Proposal Final Presentation Report Submission
  • 16. [1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder Surfing Attack” in International Journal of Innovative Research in Computer and Communication Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018. [2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018. [3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing University of creative technology (LUCT), Cyberjaya, Malaysia. References
  • 17. [5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” International Journal of HumanComputer Studies, 2007. [6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2 [7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010. [8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2, Number 2, April 2011. [9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5, Issues 3, (Part 5)March 2015, pp.60-64. [10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012 [11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm ” .
  • 18.
  • 19. Figure above shows the framework about user authentication
  • 20. System Architecture System architecture is a conceptual model that defines the structure, behavior and more views of a system; an architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviours of the system. User Registration • User enters complete details in form.( eg username, email, phone_number, first_name, last_name ) • View and select the images. • Hash tags are created in the images • Everything stored in database. Login process • User gives user id and request for OTP. • Receives OTP. • View images that choosen from the registration process. • Generates password and string. • Create hash • Comparison hash • If pass, it will direct to home page and if not it will display error message.
  • 21. From the user perspective, the graphical password authentication will work like this flowchart.
  • 22. Figure above shows use case diagram user
  • 23. D'ej'a Vu Choosing pictures among the set of arts or abstract pictures. These pictures are presented in a random manner and we will have to choose it.
  • 24. Least Significant Bit (LSB) • Most commonly used to hide text or an image within a “stego image” • One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image to hide bits from the secret image. Why use the LSB? • Human observe will be unable to distinguish between the original image and the stego image. Steganography algorithm
  • 25. There are several types of segmentation images, one of this type is segment image based on the bytes. In flowchart, it explain about segmentation through the LSB algorithm is applied, and it is expected that the groups of bytes in the cover image submit mixture distributions. After obtaining the mixture distribution of bytes group for each original and secret image, the next step is to embed the secret image bytes into the original image bytes. The following steps describe how the proposed model works:
  • 27.
  • 28.