Steganography is the art of hiding data in a seemingly innocuous cover medium. For example – any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message.
Introduction to Software Engineering, Software Process, Perspective and Specialized Process Models – Introduction to Agility – Agile process – Extreme programming – XP process - Estimation-FP,LOC and COCOMO I and II,Risk Management, Project Scheduling.
Digital Anti-Forensics: Emerging trends in data transformation techniquesSeccuris Inc.
This paper explores two questions: What
methods can be used to deceive someone who is
in an investigative role into trusting an object
which has been exploited? What kind of impact
does operating system and application run-time
linking have on live investigations? After
experimenting with dynamic object
dependencies and kernel modules in the UNIX
environment, it is the opinion of the authors that
run-time linking can be exploited to alter the
execution of otherwise trusted objects. This can
be accomplished without having to modify the
objects themselves. If an investigator trusts an
inherently un-trusted object, it can result in the
possible misdirection of a digital investigation.
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System mentoresd
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System – Andrew Patterson
It is widely accepted that Linux is the operating system of choice when building a complex, in-vehicle infotainment (IVI) system. The ability to support and quickly integrate device drivers for features such as CAN, MOST, graphics accelerators, networking interfaces, and Bluetooth can result in key differentiators for any GENIVI compliant IVI-based system. But what if Android was introduced as a second operating system? This session multiple implementations integrating both Android and Linux on multicore SoCs sharing audio and video resources across both domains while maintaining GENIVI compliance. Implementations with and without hypervisor technology will also be presented.
Introduction to Software Engineering, Software Process, Perspective and Specialized Process Models – Introduction to Agility – Agile process – Extreme programming – XP process - Estimation-FP,LOC and COCOMO I and II,Risk Management, Project Scheduling.
Digital Anti-Forensics: Emerging trends in data transformation techniquesSeccuris Inc.
This paper explores two questions: What
methods can be used to deceive someone who is
in an investigative role into trusting an object
which has been exploited? What kind of impact
does operating system and application run-time
linking have on live investigations? After
experimenting with dynamic object
dependencies and kernel modules in the UNIX
environment, it is the opinion of the authors that
run-time linking can be exploited to alter the
execution of otherwise trusted objects. This can
be accomplished without having to modify the
objects themselves. If an investigator trusts an
inherently un-trusted object, it can result in the
possible misdirection of a digital investigation.
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System mentoresd
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System – Andrew Patterson
It is widely accepted that Linux is the operating system of choice when building a complex, in-vehicle infotainment (IVI) system. The ability to support and quickly integrate device drivers for features such as CAN, MOST, graphics accelerators, networking interfaces, and Bluetooth can result in key differentiators for any GENIVI compliant IVI-based system. But what if Android was introduced as a second operating system? This session multiple implementations integrating both Android and Linux on multicore SoCs sharing audio and video resources across both domains while maintaining GENIVI compliance. Implementations with and without hypervisor technology will also be presented.
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
User authentication is necessary to secure the data and process on Internet and in digital devices. Static text based authentication are most widely employed authentication systems for being inexpensive and highly scalable. But they are prone to various types of active and passive attacks. The constant need of extending them to increase security is making them less usable. One promising alternative is Graphical
authentication systems, which if implemented properly are more secure but have their own drawbacks. In this paper, we discuss in detail the extension of our previous work Passblot [18], a unique graphical authentication system. It generates pseudo random one time passwords using a set of inkblots, unique to
each user. Properties of one time passwords ensure the resistance towards various common attacks and the uniqueness of human perception makes it usable. We demonstrate how our system effectively mitigates various attacks and analyse the results from various experiments conducted.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Research Paper on Android Graphical Image Passwordijtsrd
Security of authentication is needed to be provided superlatively to secure users ‘personal and exchange information, since online information exchange systems, have been developed according to internet speed. Therefore, the aim of the chapter is to develop a current graphical password scheme based on recall and create and implement anew graphical password scheme composed of three layer verification. We programmed our scheme in order to use in a section of anonymous information exchange system and user’s registration of trading chat room. While we conducted survey on users by accessing participants to our system lied in participants’ local network and we analyzed in accordance with the average length of their created password and statistical significance of entropy bit. From the survey of total participants, our scheme has statistical significance, furthermore, it was proved that it can secure from a variety of attacks as entropy bit was high. Raja Saha | Dr. Umarani Chellapandy "Research Paper on Android Graphical Image Password" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49859.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49859/research-paper-on-android-graphical-image-password/raja-saha
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
User authentication is necessary to secure the data and process on Internet and in digital devices. Static text based authentication are most widely employed authentication systems for being inexpensive and highly scalable. But they are prone to various types of active and passive attacks. The constant need of extending them to increase security is making them less usable. One promising alternative is Graphical
authentication systems, which if implemented properly are more secure but have their own drawbacks. In this paper, we discuss in detail the extension of our previous work Passblot [18], a unique graphical authentication system. It generates pseudo random one time passwords using a set of inkblots, unique to
each user. Properties of one time passwords ensure the resistance towards various common attacks and the uniqueness of human perception makes it usable. We demonstrate how our system effectively mitigates various attacks and analyse the results from various experiments conducted.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Research Paper on Android Graphical Image Passwordijtsrd
Security of authentication is needed to be provided superlatively to secure users ‘personal and exchange information, since online information exchange systems, have been developed according to internet speed. Therefore, the aim of the chapter is to develop a current graphical password scheme based on recall and create and implement anew graphical password scheme composed of three layer verification. We programmed our scheme in order to use in a section of anonymous information exchange system and user’s registration of trading chat room. While we conducted survey on users by accessing participants to our system lied in participants’ local network and we analyzed in accordance with the average length of their created password and statistical significance of entropy bit. From the survey of total participants, our scheme has statistical significance, furthermore, it was proved that it can secure from a variety of attacks as entropy bit was high. Raja Saha | Dr. Umarani Chellapandy "Research Paper on Android Graphical Image Password" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49859.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49859/research-paper-on-android-graphical-image-password/raja-saha
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Home assignment II on Spectroscopy 2024 Answers.pdf
Data hiding in graphical password authentication using combination
1. NURUL NADZIRAH BT ADNAN
BTBL 17047005
KRK 5
PROF. MADYA DR. ZARINA BT
MOHAMAD
2. Data hiding in graphical password
authentication using combination zero-
knowledge protocol and
steganography
3. Introduction / project background
• Authentication can be divided into two categories which is message
authentication and entity authentication[1]
• User authentication system is the most common entity authentication system
implemented and used for decades[2]. And user authentication mechanisms are
currently categorized into three main types:
4. • Graphical User Authentication (GUA) is an authentication using Graphical or
Picture as password.
• Authentication Techniques are categorized into three groups which are Pure
Recall Based, Cued Recall Based and Recognition Based [3]. All these
techniques are of the same concept, in which authenticate user by Graphical
based technique
5. Problem statement
• Security and usability problems associated with alphanumeric
passwords as “the password problem” (Wiedenbeck, Waters,
Birget, Broditskiy & Memon, 2007).[5] The problem arises
because passwords are expected to comply with two
fundamentally conflicting requirements:
1) Textual passwords should be easy to remember, and the user
authentication protocol should be executable quickly and
easily by humans[1]
2) Passwords should be secure, i.e., they should look random
and should be hard to guess; they also should be changed
frequently, and should be different on different accounts of
the same user; they should not be written down or stored in
plain text.
6. • However, a strong textual password is hard to memorize and recollect.
Therefore, users tend to choose passwords that are either short or from the
dictionary, rather than random alphanumeric strings. Even worse, it is not
a rare case that users may use only one username and password for
multiple accounts.[3]
7. Objective
To propose the combination of the zero-knowledge protocol and steganography
techniques in the graphical password to provide the authentication and confidentiality of
the data.
To design an improved version of GUAS method with combination steganography and
zero-knowledge protocol.
To implement an authentication approach based on graphical password using zero-
knowledge protocol and steganography.
8. Scope
User
• Develop a user authentication system based on graphical scheme that is more user
friendly.
System
• Proposing an improved Graphical User Authentication (GUAS) algorithm with
steganography while balance the trade-off between level of security, usability and
reliability.
• Implement the usability features in Graphical Password Prototype System for the
authentication.
9. • To overcome the disadvantages of textual password, we proposed the graphical
password in a authentication sector as a real time scenario with additional of
steganography
• If the user have login in one pc, user cannot login in another pc until he/she logout the
system.
Limitation
10. Literature review
Methods/ techniques Description Example
1. Steganography
Advance Encryption
Standard (AES) algorithm
Circular Least Significant
Bit (LSB) algorithm
Satwinder Sigh & Varinder
Kaur Attri 2015 ( “Dual Layer
Security on Data using LSB &
AES” ) [11]
• AES is a symmetric-key algorithm which means
that same key is used for both decryption and
encryption of data.
• LSB works by replacing the least significant bit
of the Pixel value of the cover image (in most of
the cases 8th bit is replaced).
11. Techniques Usability
Authentication process Memorability Example
2. D'ej'a Vu
Sonkar S.K., Paikrao R.L.,
Awadesh Kumar, Graphical
Password Authentication
Based On Color Image 2005
[10]
choosing pictures
among the set of
pictures. These pictures
are presented in a
random manner
Each picture is derived from
an initial seed and no need to
store the pictures pixel by
pixel so only the seeds need to
be stored in the server.
Therefore an authentication
server does not need to store
the whole picture, it simple
needs to store the initial seed
3. Passface algorithm
Grinal Tuscano, Aakriti
TulasyanJournal of
Engineering Research and
Applications Vol. 5, Issues
3, (Part 5)March 2015[9]
asked to choose a
certain number of
images of human faces
from the picture
database
user recognizes and clicks on
the known face
12. 6. PassPoint (Wieden-
2017)[5]
7. Cued Click Points
(Chiasson)[5]
8. Blonder (GregE- 2017)
[5]
Click on several preregistered
locations of a picture in the right
sequence
Can be easy to
remember the image
4. Draw-a-Secret (DAS)
algorithm
(Jermyn in 2012)[1]
User draw a graph on a 2D grid Drawing sequence is
easy to remember
5. Grid selection
algorithm
Abinaya1, Prabha T2,
Sudha C3 “A Shoulder
Surfing Resistant Graphical
Authentication System ”
June 2018 [2]
They zoom in and create the
secret as per the original DAS
scheme. The location of the
chosen drawing grid adds an
extra degree of complexity to the
password as there are thousands
of possible drawing grids within
the selection grid.
This technique in
theory could
significantly increase
the password space
by adding up to 16
bits to the password
space.
13. 9. CD GPS
“Recall Based
Authentication System-
An Overview”) by P.
Baby Maruthi1, Dr. K.
Sandhya Rani2 2017[3]
Choose image on a set of
images and draw a secret on
image.
Drawing a secret
on image is easy
to remember
10. Passmatrix
Deepika C4 and Kokila
R5 “A Shoulder Surfing
Resistant Graphical
Authentication System ”
in Asian Journal of
Applied Science and
Tech (AJAST)v2018[2]
Choose image cell as password
after image has spitted into 7*11
matrix. It have three modules.
1. Image Discretization
Module
2. Horizontal And Vertical
Axis Control Module
3. Login Indicator Generator
Module
select a password
using horizontal
and vertical scroll
bars
14. Expected result
• Increase the security
protocol during the
authentication phase.
• Avoid the shoulder
surfing resistant or
bruteforce attack from
the hackers or attackers.
15. Gantt chart
Task FYP1 W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
Project Title Proposal
Research
Proposal Presentation
Development of
Methodology
Report Drafting of Proposal
Final Presentation
Report Submission
16. [1] Keerthana M.M1, Archana MR2 “ Implementation of Graphical Authentication System for Shoulder
Surfing Attack” in International Journal of Innovative Research in Computer and Communication
Engineering (A High Impact Factor, Monthly, Peer Reviewed Journal) Vol. 6, Issue 2, February 2018.
[2] G Abinaya1, Prabha T2, Sudha C3, Deepika C4 and Kokila R5 “A Shoulder Surfing Resistant Graphical
Authentication System ” in Asian Journal of Applied Science and Technology (AJAST) (Open Access
Quarterly International Journal) Volume 2, Issue 2, Pages 549-556, April- June 2018.
[3] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[4] Advances in Information Science and Applications - Volume I (2017) “GPIP: A new Graphical Password
based on Image Portions” by Arash Habibi Lashkari Postgraduate Center of Studies (PGC), Limkokwing
University of creative technology (LUCT), Cyberjaya, Malaysia.
References
17. [5] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of
a graphical password system,” International Journal of HumanComputer Studies, 2007.
[6] “Recall Based Authentication System- An Overview” in International Conference on Innovative Applications in
Engineering and Information Technology(ICIAEIT-2017) by P. Baby Maruthi1, Dr. K. Sandhya Rani2
[7] “Advanced Encryption Standard”, Douglas Selent, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[8] Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi. A survey on Image steganography and steganalysis, Volume 2,
Number 2, April 2011.
[9] Ms. Grinal Tuscano, Aakriti Tulasyan, Akshata Shetty, Malvina Rumao, AIshwarya Shetty, Graphical Password
Authentication using Passfaces, Int. Journal of Engineering Research and Applications, ISSN 2248-9622, Vol. 5,
Issues 3, (Part 5)March 2015, pp.60-64.
[10] Sonkar S.K., Paikrao R.L., Awadesh Kumar, Graphical Password Authentication Scheme Based On Color Image
Gallery, International Journal of Engineering and Innovative Technology (IJEIT) Volum2, Issue 4, October 2012
[11] Satwinder Sigh & Varinder Kaur Attri 2015 “Dual Layer Security of data using LSB Image Steganography Method
and AES Encryption Algorithm ” .
20. System Architecture
System architecture is a conceptual model that defines the structure, behavior and more views of a
system; an architecture description is a formal description and representation of a system, organized
in a way that supports reasoning about the structures and behaviours of the system.
User Registration
• User enters complete details in form.( eg username, email, phone_number, first_name, last_name )
• View and select the images.
• Hash tags are created in the images
• Everything stored in database.
Login process
• User gives user id and request for OTP.
• Receives OTP.
• View images that choosen from the registration process.
• Generates password and string.
• Create hash
• Comparison hash
• If pass, it will direct to home page and if not it will display error message.
21. From the user perspective, the graphical password
authentication will work like this flowchart.
23. D'ej'a Vu
Choosing pictures among the set of arts or abstract
pictures. These pictures are presented in a random manner
and we will have to choose it.
24. Least Significant Bit (LSB)
• Most commonly used to hide text or an image within a “stego image”
• One of the popular methods of steganography (LSB algorithm) which is the simplest technique to embed the
secret image data into the cover image by exchanging the least significant bit in odd bytes of the cover image
to hide bits from the secret image.
Why use the LSB?
• Human observe will be unable to distinguish between the original image and the stego image.
Steganography algorithm
25. There are several types of segmentation
images, one of this type is segment image
based on the bytes. In flowchart, it explain
about segmentation through the LSB
algorithm is applied, and it is expected that the
groups of bytes in the cover image submit
mixture distributions. After obtaining the
mixture distribution of bytes group for each
original and secret image, the next step is to
embed the secret image bytes into the original
image bytes. The following steps describe
how the proposed model works: