SlideShare a Scribd company logo
Graphical Based Authentication using
S3PAS
Team Members:
Ketan Patil
Suyog Patil
Saurabh Sawant
Anmol Bhole
Department of Computer Engineering
Terna Engineering College
2015-16
Contents
 Aim and objective of project.
 Proposed system and it’s advantages.
 What is S3PAS
 System architecture
 Application
Abstract
• Users tend to pick short passwords or passwords that are easy to
remember.
• Graphical password schemes have been proposed as a possible
alternative to text-based scheme. However, they are mostly vulnerable
to shoulder surfing.
• Scalable Shoulder-Surfing Resistant Textual-Graphical Password
Authentication Scheme (S3PAS) seamlessly integrates both graphical
and textual password schemes and provides nearly perfect resistant to
shoulder-surfing.
Aim and Objective of the project
 Aim of the project
To increase security level in authentication of user, using
Textual Graphical password.
 Objectives
◦ Developing Central server
◦ Textual – Graphical authentication module.
◦ Database interface
Existing system Disadvantages.
•Shoulder surfing attacks.
•Hidden camera and spyware attacks.
•Brute-force attacks.
•Phishing attacks.
Proposed System
 S3PAS seamlessly integrates both graphical and textual
password schemes.
 we will describe a simple and efficient shoulder surfing resistant
graphical password scheme based on texts. The alphabet used in
the propose scheme contains 64 characters, including 26 upper
case letters, 26 lower case letters, 10 decimal digits, and symbols
“.” and “/”.
Proposed System Advantages
 Shoulder surfing resistance.
 Flexibility: It can be easily integrated with other
authentication systems.
 The system is easy to learn for users.
 Without using any physical keyboard or on-screen
keyboard user login into system.
WHAT IS A S3PAS?
 S3PAS is designed to be used in client/server environments as
most password authentication systems. Note that, the S3PAS
system generates the login image locally and transmits the
image specification (e.g., the coordinates of every character or
icon in the image) instead of the entire image pixel-by-pixel
from clients to servers, which greatly reduces communication
overheads and authentication time.
 Textual – Graphical Password.
Client–server model
 A distributed application that partitions tasks or workloads between
the providers of a resource or service, called servers, and service
requesters, called clients.
 A server machine is a host that is running one or more server
programs which share their resources with clients.
 A client does not share any of its resources, but requests a server's
content or service function.
System Architecture Diagram
2nd S3PAS authentication
Server
1st stage username &
password
User
Database
User Inputs
Data collection
Proceed to Site
Applications
 To secure sensitive data and records of a business organization.
 In military for providing security to the data.
 Online banking security.
Conclusion
 S3PAS demonstrates desirable features of a secure authentication
system being immune to shoulder-surfing, hidden-camera, and
spyware attacks.
 S3PAS is scalable in that it seamlessly matches the conventional
text-based passwords and can accommodate various lengths of
textual passwords.
Thank You

More Related Content

Similar to Graphical Based Authentication (S3PAS)

Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
Paul Tompsett
 
RESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUMRESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUM
Neha Samal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Ibrahim_Al-amri_CV
Ibrahim_Al-amri_CVIbrahim_Al-amri_CV
Ibrahim_Al-amri_CV
Alamer Omani
 

Similar to Graphical Based Authentication (S3PAS) (20)

Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Predix
PredixPredix
Predix
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
El35782786
El35782786El35782786
El35782786
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
Composition and Execution of Secure Workflows in WSRF-Grids, IEEE CCGrid 2008...
 
RESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUMRESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUM
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Ibrahim_Al-amri_CV
Ibrahim_Al-amri_CVIbrahim_Al-amri_CV
Ibrahim_Al-amri_CV
 
Introduction to AWS X-Ray
Introduction to AWS X-RayIntroduction to AWS X-Ray
Introduction to AWS X-Ray
 
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 

Recently uploaded

How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 

Recently uploaded (20)

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 

Graphical Based Authentication (S3PAS)

  • 1. Graphical Based Authentication using S3PAS Team Members: Ketan Patil Suyog Patil Saurabh Sawant Anmol Bhole Department of Computer Engineering Terna Engineering College 2015-16
  • 2. Contents  Aim and objective of project.  Proposed system and it’s advantages.  What is S3PAS  System architecture  Application
  • 3. Abstract • Users tend to pick short passwords or passwords that are easy to remember. • Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder surfing. • Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme (S3PAS) seamlessly integrates both graphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing.
  • 4. Aim and Objective of the project  Aim of the project To increase security level in authentication of user, using Textual Graphical password.  Objectives ◦ Developing Central server ◦ Textual – Graphical authentication module. ◦ Database interface
  • 5. Existing system Disadvantages. •Shoulder surfing attacks. •Hidden camera and spyware attacks. •Brute-force attacks. •Phishing attacks.
  • 6. Proposed System  S3PAS seamlessly integrates both graphical and textual password schemes.  we will describe a simple and efficient shoulder surfing resistant graphical password scheme based on texts. The alphabet used in the propose scheme contains 64 characters, including 26 upper case letters, 26 lower case letters, 10 decimal digits, and symbols “.” and “/”.
  • 7. Proposed System Advantages  Shoulder surfing resistance.  Flexibility: It can be easily integrated with other authentication systems.  The system is easy to learn for users.  Without using any physical keyboard or on-screen keyboard user login into system.
  • 8. WHAT IS A S3PAS?  S3PAS is designed to be used in client/server environments as most password authentication systems. Note that, the S3PAS system generates the login image locally and transmits the image specification (e.g., the coordinates of every character or icon in the image) instead of the entire image pixel-by-pixel from clients to servers, which greatly reduces communication overheads and authentication time.  Textual – Graphical Password.
  • 9. Client–server model  A distributed application that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.  A server machine is a host that is running one or more server programs which share their resources with clients.  A client does not share any of its resources, but requests a server's content or service function.
  • 10. System Architecture Diagram 2nd S3PAS authentication Server 1st stage username & password User Database User Inputs Data collection Proceed to Site
  • 11. Applications  To secure sensitive data and records of a business organization.  In military for providing security to the data.  Online banking security.
  • 12. Conclusion  S3PAS demonstrates desirable features of a secure authentication system being immune to shoulder-surfing, hidden-camera, and spyware attacks.  S3PAS is scalable in that it seamlessly matches the conventional text-based passwords and can accommodate various lengths of textual passwords.