SlideShare a Scribd company logo
International Journal of Computational Engineering Research||Vol, 03||Issue, 4||
www.ijceronline.com ||April||2013|| Page 230
Graphical Password Authentication System with Integrated
Sound Signature
1,
Anu Singh , 2,
Kiran Kshirsagar, 3,
Lipti Pradhan
1
(Department of Computer Engineering, Pune University, India
I. INTRODUCTION
Basically passwords are used for
[1] Authentication (verifying an imposter from actual user).
[2] Authorization (process to decide if the valid person is allowed to access the data)
[3] Access Control (Restricting the user to access the secured data).
Usually passwords are selected by the users are predictable. This happens with both graphical and text
based passwords. Users tend to choose password which are easy to remember, unfortunately it means that the
passwords tend to follow predictable patterns that are easier for attackers to hack. While the predictability
problem can be solved by disallowing user choice and assigning passwords to the users, this usually leads to
usability problems since it’s difficult for the user to remember such passwords. Many graphical password
systems have been developed; research shows that a text-based password suffers with both usability and security
problems. According to a recently published article, a security team at a company ran a network password
cracker and within 30 seconds and they identified about 80% of the passwords. According to the practical
research, it is well known that the human brain is better at recognizing and recalling the pictorial content,
graphical passwords exploit this human characteristic.
II. RELATED WORK
Considerable work has been done in this field, the best known of these systems are Pass faces [1][4].
Brostoff and Sasse (2000) carried out an empirical study of Pass faces, which demonstrate well how a graphical
password recognition system typically works. Blonder-style passwords are based on cued click recalls. A user
clicks on several previously chosen locations in a single image for logging in. As implemented by Passlogix.
Corporation (Boroditsky, 2002), the user chooses some predefined regions in an image as a password. To log in
the user has to click on the same regions selected at the time of creation of the password. The problem with this
system is that the number of predefined regions is small for selecting, perhaps around 10-12 regions in a picture.
The password may have to be up to 12 clicks for adequate security, which again tedious for the user to operate.
Another problem of this system is the need for the predefined regions to be readily recognizable. In effect, this
requires artificial, cartoon-like images rather than complex, real-world scenes [2][3].
Cued Click Points (CCP) is a
proposed alternative to previous graphical authentication system. In the proposed system, users click one point
on each of 5 images rather than on five points on one image.
III. PROPOSED WORK
In the proposed work along with the cued click point we have integrated sound signature to help in
recalling the password easily. No system has been designed so far which uses sound signature in graphical
password authentication. As per the research it has been said that sound effect or tone can be used to recall facts
like images, text etc [3].
Our idea is inspired by this novel human ability. Using this sound signature and click
points the user can be intimated if he or she is going in a write direction. It also makes the task of the hackers
Abstract
We are proposing a system for graphical password authentication with the integration of
sound signature. In this work, Cued Click Point scheme is used. Here a password is formed by a
sequence of some images in which user can select one click-point per image. Also for further security
user selects a sound signature corresponding to each click point, this sound signature will help the user
in recalling the click points. The system showed better performance in terms of usability, accuracy and
speed. Many users preferred this system over other authentication systems saying that selecting and
remembering only one point per image was aided by sound signature recall.
Keywords: Sound signature, Authentication, Cued Click points
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 231
more challenging. As shown in Figure 1, each click is directing the user to the next image, in effect leading
users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with
an explicit indication of authentication failure only after the final click. In the proposed system, users click one
point on each of 5 images rather than clicking on five points on one image. A wrong click leads down an
incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose
their images only to the extent that their click-point dictates the next image. If they dislike the resulting images,
they could create a new password involving different click-points to get different images.
Fig 1.Click Point per image
Two vectors are created for in this system:
3.1. Profile Vectors
The proposed system creates user profile as follows-
3.2 Master vector
(User ID, Sound Signature frequency, Tolerance)
3.3 Detailed Vector (Image, Click Points)
As an example of vectors – Master vector (Smith, 2689, 50)
Detailed Vector
( )Image Click points
I1 (123,678)
I2 (176,134)
I3 (450,297)
I4 (761,164)
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 232
Fig.2 System Flow
3.4 System Tolerance
After creation of the login vector, system calculates the Euclidian distance between login vector and
profile vectors stored. Euclidian distance between two vectors p and q is given by-
Above distance is calculated for each image if this distance comes out less than a tolerance value D. The value
of D is decided according to the application. In our system this value is selected by the user.
This is the registration form which shows that the userID is given by the system itself.
Fig 3.Registration Step 1
d(p q)=√ (p1-q1)2
+(p2-q2)2
+….+ (pn-qn)2
= √∑(p1-q1)2
i=1 to n
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 233
This is the selection of sound signature and the click points for creating the password.
Fig 3.Registration Step 2
IV. PROJECT SCOPE
In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is
presented. In this system a password consists of sequence of some images in which user can select one click-
point per image. Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point
hotspot analysis more challenging. Each click results in showing a next-image, in effect leading users down on
each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that
instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they
can cancel their attempt and retry from the beginning). It also makes attacks based on a “path” as they click on
their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of
authentication failure only after the final click. Users can choose their images only to the extent that their click-
point dictates the next image. If they dislike the resulting images, they could create a new password involving
different click-points to get different images.In addition user is asked to select a sound signature corresponding
to each click point this sound signature will be used to help the user in recalling the click point on an image.
System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred
CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound
signature helps considerably in recalling the click points.In the proposed work we have integrated sound
signature to help in recalling the password. No system has been devolved so far which uses sound signature in
graphical password authentication.
4.1 Authentication:
The only significant user study on the security of graphical passwords for authentication was
performed by Davis[2]
and the present authors[3]
in that work; we studied the security of two schemes based on
image recognition, denoted “Face” and “Story,” which are described shortly. This study focused specifically on
the impact of user selection of passwords in these schemes, and the security of the passwords that resulted. We
recount some of the notable results from this study, and the methodologies used to reach them, as an illustration
of some of the challenges that graphical passwords can face. In particular, this study demonstrated that graphical
password schemes can be far weaker than textual passwords when users are permitted to choose their password.
V. CONCLUSION AND FUTURE WORK
We have proposed a novel approach which uses sound signature to recall graphical password click
points. No previously developed system used this approach this system is helpful when user is logging after a
long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows
that these patterns are very useful in recalling the associated objects like images or text.
REFERENCES
[1] Cranor, L.F., S. Garfinkel. Security and Usability. O’Reilly Media, 2005.
[2] Davis, D., F. Monrose, and M.K. Reiter. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium,
2004.
[3] R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol.
6, pp. 156-163, 1967.
4] A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999
International Workshop on Cryptographic Techniques and E-Commerce, 1999.
Graphical Password Authentication System…
www.ijceronline.com ||April||2013|| Page 234
AUTHOR PROFILES
[1] Anu Singh pursuing the bachelor degree in computer science from Pune University, in 2013.
[2] Kiran Kshirsagar pursuing the bachelor degree in computer science from Pune University, in 2013.
[3] Lipti Pradhan pursuing the bachelor degree in computer science from Pune University, in 2013.

More Related Content

What's hot

An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
IJNSA Journal
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
IJERA Editor
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
AbhilashPasupula
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
ZTech Proje
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
أحلام انصارى
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Dhvani Shah
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
dhanyashree11
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
3 d password
3 d password3 d password
3 d password
Izhar Cheema
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
Saurav Sinha
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
IJERA Editor
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
shalini singh
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 

What's hot (19)

An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3 d password
3 d password3 d password
3 d password
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
Ai4506179185
Ai4506179185Ai4506179185
Ai4506179185
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 

Viewers also liked

Redes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completaRedes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completa
redesinforma
 
Freud, PasióN Secret Aeunate
Freud, PasióN Secret AeunateFreud, PasióN Secret Aeunate
Freud, PasióN Secret Aeunate
Fernando Antolín Galindo
 
Los derechos humanos
Los derechos humanosLos derechos humanos
Los derechos humanos
Carlos Matta
 
Gtc Workshop
Gtc WorkshopGtc Workshop
Gtc Workshop
Pam Patterson
 
Ikt Ren Inguruko Txostena
Ikt Ren Inguruko TxostenaIkt Ren Inguruko Txostena
Ikt Ren Inguruko Txostenajoxemi
 
Presentación1
Presentación1Presentación1
Presentación1
Dako123
 
Sindrome Coronario Agudo
Sindrome Coronario AgudoSindrome Coronario Agudo
Sindrome Coronario Agudo
Grupos de Estudio de Medicina
 
Educacao social
Educacao socialEducacao social
Educacao social
Leeoni_Ventura
 
Tema4
Tema4Tema4
Tema4
Nekuchan
 
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây DựngKỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Tường Đặng
 
Zuzen Bidean proposamena
Zuzen Bidean proposamenaZuzen Bidean proposamena
Zuzen Bidean proposamena
Irekia - EJGV
 
Enseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - TresEnseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - Tres
War RC
 
PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.
José Roberto Cordeiro
 
Localización de Unidades de Emergencia
Localización de Unidades de EmergenciaLocalización de Unidades de Emergencia
Localización de Unidades de Emergencia
METALL1CA
 
Los físicos de la historia
Los físicos de la historiaLos físicos de la historia
Los físicos de la historia
Karina Miranda
 
Présentation Google Drive
Présentation Google DrivePrésentation Google Drive
Présentation Google Drive
AVNT
 
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle GuechtouliManagement de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
Marc Bourhis
 
Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.
Nekuchan
 
1. generacion n
1. generacion n1. generacion n
1. generacion n
JERZXANDER12
 
Aynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanosAynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanos
IS Bolivia
 

Viewers also liked (20)

Redes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completaRedes de computadores_-_apostila_completa
Redes de computadores_-_apostila_completa
 
Freud, PasióN Secret Aeunate
Freud, PasióN Secret AeunateFreud, PasióN Secret Aeunate
Freud, PasióN Secret Aeunate
 
Los derechos humanos
Los derechos humanosLos derechos humanos
Los derechos humanos
 
Gtc Workshop
Gtc WorkshopGtc Workshop
Gtc Workshop
 
Ikt Ren Inguruko Txostena
Ikt Ren Inguruko TxostenaIkt Ren Inguruko Txostena
Ikt Ren Inguruko Txostena
 
Presentación1
Presentación1Presentación1
Presentación1
 
Sindrome Coronario Agudo
Sindrome Coronario AgudoSindrome Coronario Agudo
Sindrome Coronario Agudo
 
Educacao social
Educacao socialEducacao social
Educacao social
 
Tema4
Tema4Tema4
Tema4
 
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây DựngKỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
Kỹ năng bán hàng cùng Google adwords - p1, Xây Dựng
 
Zuzen Bidean proposamena
Zuzen Bidean proposamenaZuzen Bidean proposamena
Zuzen Bidean proposamena
 
Enseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - TresEnseñar Aprender en Entornos Virtuales - Tres
Enseñar Aprender en Entornos Virtuales - Tres
 
PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.PregaçõEs. Jr Cordeiro.
PregaçõEs. Jr Cordeiro.
 
Localización de Unidades de Emergencia
Localización de Unidades de EmergenciaLocalización de Unidades de Emergencia
Localización de Unidades de Emergencia
 
Los físicos de la historia
Los físicos de la historiaLos físicos de la historia
Los físicos de la historia
 
Présentation Google Drive
Présentation Google DrivePrésentation Google Drive
Présentation Google Drive
 
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle GuechtouliManagement de l'information et veille stratégique - IPAG - Manelle Guechtouli
Management de l'information et veille stratégique - IPAG - Manelle Guechtouli
 
Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.Tema 4. Arte Prerrománico.
Tema 4. Arte Prerrománico.
 
1. generacion n
1. generacion n1. generacion n
1. generacion n
 
Aynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanosAynisuyu- competencia intercolegial de derechos humanos
Aynisuyu- competencia intercolegial de derechos humanos
 

Similar to An03402300234

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
IJNSA Journal
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Kamal Spring
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
IRJET Journal
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
IJCSIS Research Publications
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
IJNSA Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
IAESIJEECS
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
IRJET Journal
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
paperpublications3
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
IJET - International Journal of Engineering and Techniques
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
ijiert bestjournal
 

Similar to An03402300234 (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

An03402300234

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 4|| www.ijceronline.com ||April||2013|| Page 230 Graphical Password Authentication System with Integrated Sound Signature 1, Anu Singh , 2, Kiran Kshirsagar, 3, Lipti Pradhan 1 (Department of Computer Engineering, Pune University, India I. INTRODUCTION Basically passwords are used for [1] Authentication (verifying an imposter from actual user). [2] Authorization (process to decide if the valid person is allowed to access the data) [3] Access Control (Restricting the user to access the secured data). Usually passwords are selected by the users are predictable. This happens with both graphical and text based passwords. Users tend to choose password which are easy to remember, unfortunately it means that the passwords tend to follow predictable patterns that are easier for attackers to hack. While the predictability problem can be solved by disallowing user choice and assigning passwords to the users, this usually leads to usability problems since it’s difficult for the user to remember such passwords. Many graphical password systems have been developed; research shows that a text-based password suffers with both usability and security problems. According to a recently published article, a security team at a company ran a network password cracker and within 30 seconds and they identified about 80% of the passwords. According to the practical research, it is well known that the human brain is better at recognizing and recalling the pictorial content, graphical passwords exploit this human characteristic. II. RELATED WORK Considerable work has been done in this field, the best known of these systems are Pass faces [1][4]. Brostoff and Sasse (2000) carried out an empirical study of Pass faces, which demonstrate well how a graphical password recognition system typically works. Blonder-style passwords are based on cued click recalls. A user clicks on several previously chosen locations in a single image for logging in. As implemented by Passlogix. Corporation (Boroditsky, 2002), the user chooses some predefined regions in an image as a password. To log in the user has to click on the same regions selected at the time of creation of the password. The problem with this system is that the number of predefined regions is small for selecting, perhaps around 10-12 regions in a picture. The password may have to be up to 12 clicks for adequate security, which again tedious for the user to operate. Another problem of this system is the need for the predefined regions to be readily recognizable. In effect, this requires artificial, cartoon-like images rather than complex, real-world scenes [2][3]. Cued Click Points (CCP) is a proposed alternative to previous graphical authentication system. In the proposed system, users click one point on each of 5 images rather than on five points on one image. III. PROPOSED WORK In the proposed work along with the cued click point we have integrated sound signature to help in recalling the password easily. No system has been designed so far which uses sound signature in graphical password authentication. As per the research it has been said that sound effect or tone can be used to recall facts like images, text etc [3]. Our idea is inspired by this novel human ability. Using this sound signature and click points the user can be intimated if he or she is going in a write direction. It also makes the task of the hackers Abstract We are proposing a system for graphical password authentication with the integration of sound signature. In this work, Cued Click Point scheme is used. Here a password is formed by a sequence of some images in which user can select one click-point per image. Also for further security user selects a sound signature corresponding to each click point, this sound signature will help the user in recalling the click points. The system showed better performance in terms of usability, accuracy and speed. Many users preferred this system over other authentication systems saying that selecting and remembering only one point per image was aided by sound signature recall. Keywords: Sound signature, Authentication, Cued Click points
  • 2. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 231 more challenging. As shown in Figure 1, each click is directing the user to the next image, in effect leading users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. In the proposed system, users click one point on each of 5 images rather than clicking on five points on one image. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images. Fig 1.Click Point per image Two vectors are created for in this system: 3.1. Profile Vectors The proposed system creates user profile as follows- 3.2 Master vector (User ID, Sound Signature frequency, Tolerance) 3.3 Detailed Vector (Image, Click Points) As an example of vectors – Master vector (Smith, 2689, 50) Detailed Vector ( )Image Click points I1 (123,678) I2 (176,134) I3 (450,297) I4 (761,164)
  • 3. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 232 Fig.2 System Flow 3.4 System Tolerance After creation of the login vector, system calculates the Euclidian distance between login vector and profile vectors stored. Euclidian distance between two vectors p and q is given by- Above distance is calculated for each image if this distance comes out less than a tolerance value D. The value of D is decided according to the application. In our system this value is selected by the user. This is the registration form which shows that the userID is given by the system itself. Fig 3.Registration Step 1 d(p q)=√ (p1-q1)2 +(p2-q2)2 +….+ (pn-qn)2 = √∑(p1-q1)2 i=1 to n
  • 4. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 233 This is the selection of sound signature and the click points for creating the password. Fig 3.Registration Step 2 IV. PROJECT SCOPE In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click- point per image. Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point hotspot analysis more challenging. Each click results in showing a next-image, in effect leading users down on each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning). It also makes attacks based on a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click- point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images.In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. 4.1 Authentication: The only significant user study on the security of graphical passwords for authentication was performed by Davis[2] and the present authors[3] in that work; we studied the security of two schemes based on image recognition, denoted “Face” and “Story,” which are described shortly. This study focused specifically on the impact of user selection of passwords in these schemes, and the security of the passwords that resulted. We recount some of the notable results from this study, and the methodologies used to reach them, as an illustration of some of the challenges that graphical passwords can face. In particular, this study demonstrated that graphical password schemes can be far weaker than textual passwords when users are permitted to choose their password. V. CONCLUSION AND FUTURE WORK We have proposed a novel approach which uses sound signature to recall graphical password click points. No previously developed system used this approach this system is helpful when user is logging after a long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text. REFERENCES [1] Cranor, L.F., S. Garfinkel. Security and Usability. O’Reilly Media, 2005. [2] Davis, D., F. Monrose, and M.K. Reiter. On User Choice in Graphical Password Schemes. 13th USENIX Security Symposium, 2004. [3] R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163, 1967. 4] A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  • 5. Graphical Password Authentication System… www.ijceronline.com ||April||2013|| Page 234 AUTHOR PROFILES [1] Anu Singh pursuing the bachelor degree in computer science from Pune University, in 2013. [2] Kiran Kshirsagar pursuing the bachelor degree in computer science from Pune University, in 2013. [3] Lipti Pradhan pursuing the bachelor degree in computer science from Pune University, in 2013.