SlideShare a Scribd company logo
Project Team:
Deepak Yadav (1001031031)
Deepak Kumar (1001031029)
Arvind Yadav (1001031022)
Deepankar Ram (1001031032)
Table of Content
 Introduction

 Hardware Description
 Advantages and disadvantages
 Procedural steps for compilation, simulation and

dumping
 Conclusion
 References
Introduction
 The main aim of this project is to provide a security system

for illiterates.
 Since the images are more easily to recalling in comparison
to string of character.
 The images are displayed on touch screen ,one can enter
correct sequences of images get authenticated.
 Gives exposure about how touch screen interface in our
practical life.
 It can be easily installed in industries ,houses ,poultry form

for security .
Block Diagram
Hardware Description
The major building blocks of this project are:
 Regulated power supply with voltage regulator
 Micro controller

 Touch screen sensor
 Stepper motor
 Buzzer
Power supply
Microcontroller (PIC16F72)
1.
2.

3.
a.

The microcontroller used in this
project is PIC16F72.
The PIC families of microcontrollers
are
developed
by
Microchip
Technology Inc.
PIC microcontrollers:
PIC12CXXX 12/14-bit program word .

b.
c.
d.

PIC 16C5X 12-bit program word .
PIC16CXXX and PIC16FXXX 14-bit
program word .
PIC17CXXX and PIC18CXXX 16-bit
program word.
Technologies of Touch Screen
There are a number of types of touch screen
technology.
1. Resistive
2. Surface acoustic wave
3. Capacitive
4. Surface capacitance
5. Projected capacitance
6. Infrared
7. Strain gauge
8. Optical imaging
Working of Resistive Touch screens
1. Polyester Film
2. Upper Resistive
3.

4.
5.
6.

7.

circuit Layer
Conductive ITO
(Transparent Metal
Coating).
Lower Resistive
Circuit Layer
Insulating Dots
Glass/AcrylicSubstrat
-e
Touch screen
Continue….
The contact can close

the switch an generated
Voltages.
Touch screen controller
convert it into (X,Y)
Co-ordinate system and
hence the position of
touch is sense by
controller easily.
Stepper motor
 It is gear based motor.

 The stepper motor are connected

with ULN2803 driver.
When the correct password
entered the lock attached to the
motor is open.
Buzzer
Basically it works as sound source

based on piezoelectric diaphragm.
It is consists of electrode ,when dc
voltage applied across electrode
produces sound.
To switch on buzzer -high 1
To switch off buzzer -low 1
Advantages
 Easily recalling.
 Image based password is more secure than text based

password.
 Less vulnerable.
 Easily installation method.
Disadvantages
 Since it is totally based on password hence shoulder

surfing can reduce the security of system.
 Taken more prevention for touch screen safety.
Procedural steps for compilation,
simulation and dumping
 PIC compiler is used for programming.
 After programming run the programs, it generated a

.hex extension file.
 The .hex extension file are dumping into
microcontroller using PIC kit programmer.
Conclusion
 Image password is easily remember than string of






character password.
Image password is more secure than text based
password.
Less vulnerable by attacker.
Know the exposure of touch screen interface in
practical life.
Shoulder surfing reduce the security of system.
References
http://www.wikipedia.com
http://www.google.com
http://www.slideshare.net
Thank you

More Related Content

What's hot

Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
Anudeep Sharma Ramadugu
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Ann Mathew
 
Eye ring
Eye ringEye ring
Eye ring
SNOW WHITE
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Heliodisplay a display device
Heliodisplay  a display deviceHeliodisplay  a display device
Heliodisplay a display device
Vaibhaw Mishra
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
madhavsolanki
 
Heliodisplay
HeliodisplayHeliodisplay
Heliodisplay
Abhay Nigam
 
Street runner final
Street runner finalStreet runner final
Street runner final
Kumar Narayan
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Shobha Rani
 
Virtual keyboard
Virtual keyboard Virtual keyboard
Virtual keyboard
Snehal Patel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Eye Ring ppt
Eye Ring pptEye Ring ppt
Eye Ring ppt
Chodi DurgaRao
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
Nikhil Katte
 
E ball technology ppt by arun
E ball technology ppt by arunE ball technology ppt by arun
E ball technology ppt by arun
Arun Gowda
 
Android seminar ppt
Android seminar pptAndroid seminar ppt
Android seminar ppt
chakrapani tripathi
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 

What's hot (20)

Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
 
Eye ring
Eye ringEye ring
Eye ring
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Heliodisplay a display device
Heliodisplay  a display deviceHeliodisplay  a display device
Heliodisplay a display device
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Blue eyes technology semimsso
Blue eyes technology semimssoBlue eyes technology semimsso
Blue eyes technology semimsso
 
Heliodisplay
HeliodisplayHeliodisplay
Heliodisplay
 
Street runner final
Street runner finalStreet runner final
Street runner final
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Virtual keyboard
Virtual keyboard Virtual keyboard
Virtual keyboard
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Eye Ring ppt
Eye Ring pptEye Ring ppt
Eye Ring ppt
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
E ball technology ppt by arun
E ball technology ppt by arunE ball technology ppt by arun
E ball technology ppt by arun
 
Android seminar ppt
Android seminar pptAndroid seminar ppt
Android seminar ppt
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 

Similar to Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav

Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Siang Wei Lee
 
Alcohol report
Alcohol reportAlcohol report
Alcohol report
chandan kumar
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
Vinny Chweety
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
Paras Jha
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptx
ManojG81
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
IRJET Journal
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android application
Avinash Vemula
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
IRJET Journal
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control report
engineerssolution
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years
Debasish Sahu
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full editSayam Roy
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
1000kv technologies
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
IRJET Journal
 
Report (2)
Report (2)Report (2)
Report (2)
Shivangi Dwivedi
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paperAnwar Al Ahdab
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentation
Rajendra Prasad
 
E1103024045
E1103024045E1103024045
E1103024045
IOSR Journals
 

Similar to Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav (20)

Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
 
Alcohol report
Alcohol reportAlcohol report
Alcohol report
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
 
embedded systems
embedded systemsembedded systems
embedded systems
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptx
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android application
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control report
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full edit
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
 
Report (2)
Report (2)Report (2)
Report (2)
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentation
 
E1103024045
E1103024045E1103024045
E1103024045
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav

  • 1. Project Team: Deepak Yadav (1001031031) Deepak Kumar (1001031029) Arvind Yadav (1001031022) Deepankar Ram (1001031032)
  • 2. Table of Content  Introduction  Hardware Description  Advantages and disadvantages  Procedural steps for compilation, simulation and dumping  Conclusion  References
  • 3. Introduction  The main aim of this project is to provide a security system for illiterates.  Since the images are more easily to recalling in comparison to string of character.  The images are displayed on touch screen ,one can enter correct sequences of images get authenticated.  Gives exposure about how touch screen interface in our practical life.  It can be easily installed in industries ,houses ,poultry form for security .
  • 5. Hardware Description The major building blocks of this project are:  Regulated power supply with voltage regulator  Micro controller  Touch screen sensor  Stepper motor  Buzzer
  • 7. Microcontroller (PIC16F72) 1. 2. 3. a. The microcontroller used in this project is PIC16F72. The PIC families of microcontrollers are developed by Microchip Technology Inc. PIC microcontrollers: PIC12CXXX 12/14-bit program word . b. c. d. PIC 16C5X 12-bit program word . PIC16CXXX and PIC16FXXX 14-bit program word . PIC17CXXX and PIC18CXXX 16-bit program word.
  • 8. Technologies of Touch Screen There are a number of types of touch screen technology. 1. Resistive 2. Surface acoustic wave 3. Capacitive 4. Surface capacitance 5. Projected capacitance 6. Infrared 7. Strain gauge 8. Optical imaging
  • 9. Working of Resistive Touch screens 1. Polyester Film 2. Upper Resistive 3. 4. 5. 6. 7. circuit Layer Conductive ITO (Transparent Metal Coating). Lower Resistive Circuit Layer Insulating Dots Glass/AcrylicSubstrat -e Touch screen
  • 10. Continue…. The contact can close the switch an generated Voltages. Touch screen controller convert it into (X,Y) Co-ordinate system and hence the position of touch is sense by controller easily.
  • 11. Stepper motor  It is gear based motor.  The stepper motor are connected with ULN2803 driver. When the correct password entered the lock attached to the motor is open.
  • 12. Buzzer Basically it works as sound source based on piezoelectric diaphragm. It is consists of electrode ,when dc voltage applied across electrode produces sound. To switch on buzzer -high 1 To switch off buzzer -low 1
  • 13. Advantages  Easily recalling.  Image based password is more secure than text based password.  Less vulnerable.  Easily installation method.
  • 14. Disadvantages  Since it is totally based on password hence shoulder surfing can reduce the security of system.  Taken more prevention for touch screen safety.
  • 15. Procedural steps for compilation, simulation and dumping  PIC compiler is used for programming.  After programming run the programs, it generated a .hex extension file.  The .hex extension file are dumping into microcontroller using PIC kit programmer.
  • 16. Conclusion  Image password is easily remember than string of     character password. Image password is more secure than text based password. Less vulnerable by attacker. Know the exposure of touch screen interface in practical life. Shoulder surfing reduce the security of system.