SlideShare a Scribd company logo
Project Guide –
Ms. Ankita Singh,CSE
Dept.
NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Team Members
1.Pratishtha Singh (0115CS131069)
2.Prince Pranav (0115CS131071)
3.Vivek Singh (0115CS131118)
CSE-VI(B)
Presentation for Minor Project
Initiation
Date : 15/02/16
IndexObjective of project
Scope of Project
Reason for selecting the project
Process Model used
Functional Requirements
Activity Plan
 Analysis
 Design
 Coding
 Testing
 Implementation
Specifications (Hardware/Software)
Conclusion
Objective of IBAs
 IBAS provides high security web logging
pages to prevent from malicious attack.
 While we implementing this project a random question
is generated according to the picture at the login
page.
 The user is authenticated only by correctly
identifying the password images.
Scope of IBAs
 We implement the Image Based Authentication System
for CSE DEPT. NRI-IST BHOPAL.
Reason for selecting this project
 The reason for selecting this project because IBAS
provides high security in comparision with
CAPTCHA.
Process Model Used
Waterfall Model
Functional Requirement
 IBAS should be able to –
o Firstly user fill his/her ID and Password.
o Generate a randomly question according
to image.
o Select the correct image for user
accessing accounts/files.
o We have large database of the images with
characters and numeric's.
FLOW CHART
User input Article
Random Question
Generation
Select An Image
Which is Displayed
Grant Access To Use
YES
NO
Activity Plan
S.N.
WORK BREAKDOWN
STRUCTURE/MODULES
PROJECT TEAM
MEMBER,
RESPONSIBLE
PROPOSED DATE
FOR COMPLETION
1 Analysis Vivek Singh,Pratishtha
Singh
15/02/16
2 Design Pratishtha Singh ,
Prince
Pranav
22/02/16
3 Coding Prince Pranav,
Pratishtha singh, Vivek
Singh
28/03/16
4 Testing Prince Pranav
07/04/16
5 Implementation Pratishtha
Singh,Prince
Pranav
11/04/16
Specification(Hardware/Software)
 Hardware:
 2GB RAM.
 i3 and i5 processor.
 Software:
 Microsoft Visual Studio 2008 as an IDE.
 MySQL as Database.
 Adobe Photo Shop.
 C# as programming language.
 Operating System Window 7 and above.
Conclusion
 Image-based authentication technique have a wider
applicability in future.
 We design it in a more user-friendly way that helps
to increase the password quality compared to CAPTCHA.
 In this project we had proposed the concept of random
picture and image generation techniques which is unable
to crack by unauthorized user.
Image Based Authentication System

More Related Content

What's hot

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Dhvani Shah
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
SHAJANA BASHEER
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abhijit Akotkar
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Graphical password
Graphical passwordGraphical password
Graphical password
vitam,berhampur
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
Nikhil Praharshi
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
Depth Buffer Method
Depth Buffer MethodDepth Buffer Method
Depth Buffer Method
Ummiya Mohammedi
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
Shruti Chandra
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
 

What's hot (20)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Depth Buffer Method
Depth Buffer MethodDepth Buffer Method
Depth Buffer Method
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 

Similar to Image Based Authentication System

Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
RonitShrivastava057
 
Rajesh Kumar Bharathan
Rajesh Kumar BharathanRajesh Kumar Bharathan
Rajesh Kumar Bharathan
RAJESH BHARATHAN
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
SURAJ KUMAR YADAVA
 
Online cet
Online cetOnline cet
Online cet
ishwarkiran1
 
Slambook report
Slambook reportSlambook report
Slambook report
ritu garg
 
Manish123 CV
Manish123 CVManish123 CV
Manish123 CV
Manish Saini
 
Abhyudaya.Upadhyay.Resume
Abhyudaya.Upadhyay.ResumeAbhyudaya.Upadhyay.Resume
Abhyudaya.Upadhyay.Resume
Abhyudaya Upadhyay
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
Love Kothari
 
Stanly_Bangalore_6_YearsExp_Dotnet -Wipro
Stanly_Bangalore_6_YearsExp_Dotnet -WiproStanly_Bangalore_6_YearsExp_Dotnet -Wipro
Stanly_Bangalore_6_YearsExp_Dotnet -Wipro
LogicSoft International Pvt Ltd
 
Resume
Resume Resume
Resume
Rushi Bhatt
 
sanjay_resume
sanjay_resumesanjay_resume
sanjay_resume
sanjay singh
 
cv
cvcv
Pranali Salwatkar
Pranali SalwatkarPranali Salwatkar
Pranali Salwatkar
Pranali Salwatkar
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
SURAJ KUMAR YADAVA
 
Anil Kumar Rai
Anil Kumar RaiAnil Kumar Rai
Anil Kumar Rai
anil rai
 
Srikanth.Mulesoft
Srikanth.MulesoftSrikanth.Mulesoft
Srikanth.Mulesoft
Srikanth Reddy Narra
 
Gopalakrishnan
GopalakrishnanGopalakrishnan
Gopalakrishnan
Active Galaxy
 
RanjithKumar
RanjithKumarRanjithKumar
RanjithKumar
Ranjith Vallamdasu
 
Kunal desai
Kunal desaiKunal desai
Kunal desai
Kunal Desai
 
CV NitinKumar_2020
CV NitinKumar_2020CV NitinKumar_2020
CV NitinKumar_2020
NITIN KUMAR
 

Similar to Image Based Authentication System (20)

Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
 
Rajesh Kumar Bharathan
Rajesh Kumar BharathanRajesh Kumar Bharathan
Rajesh Kumar Bharathan
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
 
Online cet
Online cetOnline cet
Online cet
 
Slambook report
Slambook reportSlambook report
Slambook report
 
Manish123 CV
Manish123 CVManish123 CV
Manish123 CV
 
Abhyudaya.Upadhyay.Resume
Abhyudaya.Upadhyay.ResumeAbhyudaya.Upadhyay.Resume
Abhyudaya.Upadhyay.Resume
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Stanly_Bangalore_6_YearsExp_Dotnet -Wipro
Stanly_Bangalore_6_YearsExp_Dotnet -WiproStanly_Bangalore_6_YearsExp_Dotnet -Wipro
Stanly_Bangalore_6_YearsExp_Dotnet -Wipro
 
Resume
Resume Resume
Resume
 
sanjay_resume
sanjay_resumesanjay_resume
sanjay_resume
 
cv
cvcv
cv
 
Pranali Salwatkar
Pranali SalwatkarPranali Salwatkar
Pranali Salwatkar
 
3 job adda doc 1
3 job adda doc 13 job adda doc 1
3 job adda doc 1
 
Anil Kumar Rai
Anil Kumar RaiAnil Kumar Rai
Anil Kumar Rai
 
Srikanth.Mulesoft
Srikanth.MulesoftSrikanth.Mulesoft
Srikanth.Mulesoft
 
Gopalakrishnan
GopalakrishnanGopalakrishnan
Gopalakrishnan
 
RanjithKumar
RanjithKumarRanjithKumar
RanjithKumar
 
Kunal desai
Kunal desaiKunal desai
Kunal desai
 
CV NitinKumar_2020
CV NitinKumar_2020CV NitinKumar_2020
CV NitinKumar_2020
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Image Based Authentication System

  • 1. Project Guide – Ms. Ankita Singh,CSE Dept. NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Team Members 1.Pratishtha Singh (0115CS131069) 2.Prince Pranav (0115CS131071) 3.Vivek Singh (0115CS131118) CSE-VI(B) Presentation for Minor Project Initiation Date : 15/02/16
  • 2. IndexObjective of project Scope of Project Reason for selecting the project Process Model used Functional Requirements Activity Plan  Analysis  Design  Coding  Testing  Implementation Specifications (Hardware/Software) Conclusion
  • 3. Objective of IBAs  IBAS provides high security web logging pages to prevent from malicious attack.  While we implementing this project a random question is generated according to the picture at the login page.  The user is authenticated only by correctly identifying the password images.
  • 4. Scope of IBAs  We implement the Image Based Authentication System for CSE DEPT. NRI-IST BHOPAL.
  • 5. Reason for selecting this project  The reason for selecting this project because IBAS provides high security in comparision with CAPTCHA.
  • 7. Functional Requirement  IBAS should be able to – o Firstly user fill his/her ID and Password. o Generate a randomly question according to image. o Select the correct image for user accessing accounts/files. o We have large database of the images with characters and numeric's.
  • 8. FLOW CHART User input Article Random Question Generation Select An Image Which is Displayed Grant Access To Use YES NO
  • 9. Activity Plan S.N. WORK BREAKDOWN STRUCTURE/MODULES PROJECT TEAM MEMBER, RESPONSIBLE PROPOSED DATE FOR COMPLETION 1 Analysis Vivek Singh,Pratishtha Singh 15/02/16 2 Design Pratishtha Singh , Prince Pranav 22/02/16 3 Coding Prince Pranav, Pratishtha singh, Vivek Singh 28/03/16 4 Testing Prince Pranav 07/04/16 5 Implementation Pratishtha Singh,Prince Pranav 11/04/16
  • 10. Specification(Hardware/Software)  Hardware:  2GB RAM.  i3 and i5 processor.  Software:  Microsoft Visual Studio 2008 as an IDE.  MySQL as Database.  Adobe Photo Shop.  C# as programming language.  Operating System Window 7 and above.
  • 11. Conclusion  Image-based authentication technique have a wider applicability in future.  We design it in a more user-friendly way that helps to increase the password quality compared to CAPTCHA.  In this project we had proposed the concept of random picture and image generation techniques which is unable to crack by unauthorized user.