This research aims to study the existing password
scheme and to design and develop a new improved graphical
password scheme. A novel protection primitive is presented in
view of strong AI problems namely a new family of graphical
password scheme built up on top of captcha technology, which
we call Captcha as graphical password (CaRP). CaRP is both a
captcha and graphical password scheme. CaRP addresses
number of security issues altogether for example, online guessing
attacks, relay attacks and if combined with dual -view
technologies shoulder-surfing attacks. CaRP likewise offers a
novel way to deal with address the notable image hotspot
problem in well-known
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Captcha and graphical passwords are internet security techniques. This presentation includes the details about how captcha can be used as graphical password which is an integral security option. presentation covers all the points such as problem statement, literature survey, architecture, Mathematical model, examples, advantages, applications etc.
This document proposes a new type of graphical password system called CAPTCHA As Graphical Passwords (CaRP) that integrates CAPTCHAs with password authentication. CaRP schemes require users to click on a sequence of visual objects like characters, animals or grid cells in an image to enter their password. This combines the tasks of recognizing CAPTCHA objects and recalling a click-sequence password. CaRP aims to thwart automatic guessing attacks by generating new images for each login attempt. Recognition-based CaRP examples include Click Text and Click Animal, while Animal Grid combines recognition and cued recall. CaRP is resistant to relay attacks and provides stronger security than other graphical passwords by leveraging hard AI problems in CAPT
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
Efficient Securing System Using Graphical CaptchaSankar Anand
The document proposes a new security system called CaRP (Captcha as graphical passwords) that integrates captcha technology into a graphical password scheme. CaRP allows users to set passwords by clicking on images in a captcha challenge. This addresses weaknesses in existing systems like vulnerability to brute force and dictionary attacks. The proposed system offers stronger security against online attacks while being easy for users. It is recommended for domains like banking that require enhanced security.
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
The document proposes a new security primitive called Captcha as Graphical Passwords (CaRP) that uses hard AI problems from Captcha technology to create a novel graphical password system. CaRP aims to address security issues like online guessing attacks, relay attacks, and shoulder surfing. It can probabilistically thwart automated online guessing even if the password is in the search set. CaRP also aims to solve the "image hotspot" problem in other graphical password systems. The document outlines examples of how CaRP could work and argues that it offers reasonable security and usability for improving online security.
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET Journal
This document proposes a new security method called CaRP (Captcha as a Graphical Password) that combines Captcha and graphical passwords to enhance online security. CaRP addresses security issues like guessing attacks, relay attacks, and shoulder surfing. It works by generating a new image-based challenge for each login attempt. Since the images change, automated programs cannot learn or guess the password between attempts like they can with text passwords. CaRP draws on the gap in abilities between humans and machines to recognize visual patterns. The document outlines the basic CaRP authentication process and different types of CaRP schemes that could be used. It argues that CaRP provides a more secure authentication method than traditional passwords or Captchas alone.
This document discusses graphical passwords as an alternative to alphanumeric passwords. Graphical passwords work by having users select images or points on images in a specific order. They are generally easier for users to remember but harder for others to guess compared to alphanumeric passwords. The document compares graphical and alphanumeric passwords and describes some simple graphical password schemes, advantages like improved security, and disadvantages like longer login times and vulnerability to shoulder surfing. It proposes solutions like triangle-based and movable frame-based schemes to address the shoulder surfing issue.
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Captcha and graphical passwords are internet security techniques. This presentation includes the details about how captcha can be used as graphical password which is an integral security option. presentation covers all the points such as problem statement, literature survey, architecture, Mathematical model, examples, advantages, applications etc.
This document proposes a new type of graphical password system called CAPTCHA As Graphical Passwords (CaRP) that integrates CAPTCHAs with password authentication. CaRP schemes require users to click on a sequence of visual objects like characters, animals or grid cells in an image to enter their password. This combines the tasks of recognizing CAPTCHA objects and recalling a click-sequence password. CaRP aims to thwart automatic guessing attacks by generating new images for each login attempt. Recognition-based CaRP examples include Click Text and Click Animal, while Animal Grid combines recognition and cued recall. CaRP is resistant to relay attacks and provides stronger security than other graphical passwords by leveraging hard AI problems in CAPT
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
Efficient Securing System Using Graphical CaptchaSankar Anand
The document proposes a new security system called CaRP (Captcha as graphical passwords) that integrates captcha technology into a graphical password scheme. CaRP allows users to set passwords by clicking on images in a captcha challenge. This addresses weaknesses in existing systems like vulnerability to brute force and dictionary attacks. The proposed system offers stronger security against online attacks while being easy for users. It is recommended for domains like banking that require enhanced security.
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
The document proposes a new security primitive called Captcha as Graphical Passwords (CaRP) that uses hard AI problems from Captcha technology to create a novel graphical password system. CaRP aims to address security issues like online guessing attacks, relay attacks, and shoulder surfing. It can probabilistically thwart automated online guessing even if the password is in the search set. CaRP also aims to solve the "image hotspot" problem in other graphical password systems. The document outlines examples of how CaRP could work and argues that it offers reasonable security and usability for improving online security.
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET Journal
This document proposes a new security method called CaRP (Captcha as a Graphical Password) that combines Captcha and graphical passwords to enhance online security. CaRP addresses security issues like guessing attacks, relay attacks, and shoulder surfing. It works by generating a new image-based challenge for each login attempt. Since the images change, automated programs cannot learn or guess the password between attempts like they can with text passwords. CaRP draws on the gap in abilities between humans and machines to recognize visual patterns. The document outlines the basic CaRP authentication process and different types of CaRP schemes that could be used. It argues that CaRP provides a more secure authentication method than traditional passwords or Captchas alone.
This document discusses graphical passwords as an alternative to alphanumeric passwords. Graphical passwords work by having users select images or points on images in a specific order. They are generally easier for users to remember but harder for others to guess compared to alphanumeric passwords. The document compares graphical and alphanumeric passwords and describes some simple graphical password schemes, advantages like improved security, and disadvantages like longer login times and vulnerability to shoulder surfing. It proposes solutions like triangle-based and movable frame-based schemes to address the shoulder surfing issue.
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
This document summarizes and compares various graphical password authentication schemes that use recognition-based and recall-based approaches. Recognition-based schemes require users to identify pre-selected images during login, while recall-based schemes require users to reproduce a password they created. The document discusses specific schemes such as Passfaces, Déjà Vu, Draw-a-Secret, and PassPoints and analyzes the strengths and limitations of each in terms of usability, security, and password space. It concludes that recall-based schemes have advantages over text passwords but also have usability drawbacks such as taking more time to create and enter passwords.
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
This document presents a project on a novel graphical password system called Captcha as Graphical Passwords (CaRP) that uses CAPTCHA technology. CaRP addresses security issues like online guessing attacks, relay attacks, and shoulder surfing. It offers protection against dictionary attacks and relay attacks while being reasonably secure and usable. The document describes the existing CAPTCHA system, disadvantages of the current approach, the proposed CaRP system and its advantages, software and hardware requirements, UML diagrams, sample registration and login pages, and test cases.
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
This document summarizes a research paper that proposes enhancing user authentication to protect against brute force and dictionary attacks. The paper conducts a review of existing graphical password techniques and proposes a new technique that sends text messages and emails for additional authentication. Key features include challenging hackers with many CAPTCHAs while allowing legitimate users to log in with one CAPTCHA. The technique aims to trace hackers by flooding their IP addresses and locking accounts on machines with many failed login attempts.
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, graphical passwords have been designed to try to make password more memorable and easier for people to use, and it is less vulnerable to brute force attacks than a text based password. The aim of the system is to implement a strong security. The proposed system segments the image like a grid, which has a maximum four fragments. Then, each segment of the image is dragged in a particular sequence onto an empty grid of size 6x6 and placed on a particular segment of the empty grid, to form the user' password. When the user logs into the system, the user needs to drag each segment of the image onto the same empty grid of size 6x6 in the correct sequence and position of the segments that user had specified during registration. Maw Maw Naing | Ohnmar Win ""Graphical Password Authentication using image Segmentation for Web Based Applications"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25184.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25184/graphical-password-authentication-using-image-segmentation-for-web-based-applications/maw-maw-naing
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
The document proposes a new hybrid graphical password scheme for authentication on smart handheld devices. It combines recognition and recall-based techniques. During registration, the user selects objects as a graphical password and assigns digits to each object. For authentication, the user selects the objects in order and enters the corresponding digits. The scheme aims to improve usability and security over text passwords while addressing issues like shoulder surfing that graphical passwords often face. It is designed for smart devices like phones which are more convenient than desktop computers.
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
This document describes PassBYOP, a new graphical password scheme that uses live video of a physical token (such as a photo on a mobile phone) rather than static digital images. Three feasibility studies examine its reliability, usability, and security against observation attacks. Results found passwords based on image features to be viable, with task times and error rates comparable to prior schemes. Using a user-owned physical token increased security against observation without additional user burden, showing promise for more secure graphical passwords.
The document discusses and compares various authentication methods, including recognition-based, recall-based, and graphical password techniques. It provides an overview of common techniques such as Dhamija and Perrig's picture selection scheme, Sobrado and Birget's pass-object selection scheme, and Jermyn et al.'s Draw-A-Secret scheme. While graphical passwords may be easier for users to remember than text passwords, they have limitations such as taking longer to create and register, requiring more storage space, and not being very mature yet compared to traditional text-based passwords. The document evaluates the security and usability of different authentication methods.
Authentication Using Graphical Passwordijceronline
This paper introduces image based captcha to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with numerical password which provide more security and easy to remember text and graphical password.
I present a new security primitive based on hard AI problems, namely, a novel family of graph-ical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Well Known Tool Based Graphical Authentication Technique cscpconf
Authentication is the first step of information security. Authentication schemes require users to
memorize the passwords and recall them during log-in time. Traditional text-based
authentication schemes have memorability problems for secure passwords. Graphical password
schemes are introduced as alternatives to text based schemes. Many techniques have been
designed using single image or multiple images. Few grid based authentication techniques are
proposed. This paper introduces a new authentication technique based on a well known tool.
The most popular game especially in rural areas, “Snakes and Ladders” is used as a tool in
authentication technique. The usage of this tool increases the memorability and usability of
passwords.
Integration of sound signature in graphical passwordParag Tamhane
The document presents a graphical password system that uses images and click points for authentication. Users register by selecting a sequence of images and click points. Their profile is stored as a master vector with their ID, selected sound frequency, and tolerance level, along with a detailed vector of the images and click points. During login, users enter their ID and a sound is played, if the frequency is within the tolerance level they selected, their click sequence is checked against the stored profile for authentication. The system aims to provide a more memorable password while improving security over text passwords.
This document proposes a new shoulder surfing resistant graphical password scheme. It begins with an introduction to passwords and why they are needed for authentication. It then discusses different types of existing graphical passwords like passfaces, passpoints and draw-a-secret (DAS). The document outlines the working of current text-based graphical login systems and their drawbacks. It proposes a new login system using QR codes and password encryption to address these issues. It describes the current and future applications of this system and the hardware and software requirements. The document discusses the advantages of the new system in reducing shoulder surfing attacks and sending alerts on wrong attempts. It concludes that the proposed text-based color password scheme satisfies usability and security requirements.
Graphical password authentication system pptsNimisha_Goel
This document discusses different types of authentication systems including token-based, biometric-based, knowledge-based, recognition-based, pure recall-based, cued recall-based, and hybrid systems. It then focuses on graphical passwords, describing how they work by having users select images in a specific order. The document outlines a project to create an Android application for graphical password authentication to unlock private files using a cued recall system where users must select images in the correct sequence from a random grid. It discusses security considerations like guessing attacks and proposes that this approach provides stronger passwords while increasing the workload for attackers.
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
The document proposes a graphical password authentication system that combines graphical and text-based passwords. It describes how the system works: users select points of interest (POIs) on an image and associate text with each during registration. For login, users must correctly select the POIs in the correct order and provide the associated text. The system was implemented using Visual Basic .NET and aims to achieve the memorability of graphical passwords with the security of text-based passwords through multiple authentication factors.
Graphical password authentication using pccp with sound signatureeSAT Journals
Abstract
Persuasive Cued-Click Point is an advanced method of cued click point of graphical password technique which includes usability and security evaluations. It also useful for reduces hotspot problem and hence it helps the user in selecting password of higher security. This paper includes the persuasion to influence user choice in click based graphical passwords, so that users select more desultory and more difficult to guess the passwords. In this paper includes sound signature for recover the password if user forgot password or click point ,then playing the sound signature which is selected at registration time then it set new password and access the account. This paper include dead zone new concept to avoiding Shoulder surfing attack in graphical password authentication.
Keywords: Graphical Password, Authentication, Password Images, and PCCP etc…
This document provides a summary of a seminar report on graphical password authentication techniques. It begins with an introduction describing the weaknesses of traditional text-based passwords and an overview of graphical password methods. It then surveys existing graphical password techniques, categorizing them into recognition-based and recall-based approaches. Major techniques discussed include Dhamija and Perrig's image recognition scheme, Passfaces, and Jermyn's Draw-a-Secret recall-based technique. The document concludes by addressing the security and usability of graphical passwords compared to text-based passwords.
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
This document summarizes and compares various graphical password authentication schemes that use recognition-based and recall-based approaches. Recognition-based schemes require users to identify pre-selected images during login, while recall-based schemes require users to reproduce a password they created. The document discusses specific schemes such as Passfaces, Déjà Vu, Draw-a-Secret, and PassPoints and analyzes the strengths and limitations of each in terms of usability, security, and password space. It concludes that recall-based schemes have advantages over text passwords but also have usability drawbacks such as taking more time to create and enter passwords.
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
This document presents a project on a novel graphical password system called Captcha as Graphical Passwords (CaRP) that uses CAPTCHA technology. CaRP addresses security issues like online guessing attacks, relay attacks, and shoulder surfing. It offers protection against dictionary attacks and relay attacks while being reasonably secure and usable. The document describes the existing CAPTCHA system, disadvantages of the current approach, the proposed CaRP system and its advantages, software and hardware requirements, UML diagrams, sample registration and login pages, and test cases.
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
This document summarizes a research paper that proposes enhancing user authentication to protect against brute force and dictionary attacks. The paper conducts a review of existing graphical password techniques and proposes a new technique that sends text messages and emails for additional authentication. Key features include challenging hackers with many CAPTCHAs while allowing legitimate users to log in with one CAPTCHA. The technique aims to trace hackers by flooding their IP addresses and locking accounts on machines with many failed login attempts.
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, graphical passwords have been designed to try to make password more memorable and easier for people to use, and it is less vulnerable to brute force attacks than a text based password. The aim of the system is to implement a strong security. The proposed system segments the image like a grid, which has a maximum four fragments. Then, each segment of the image is dragged in a particular sequence onto an empty grid of size 6x6 and placed on a particular segment of the empty grid, to form the user' password. When the user logs into the system, the user needs to drag each segment of the image onto the same empty grid of size 6x6 in the correct sequence and position of the segments that user had specified during registration. Maw Maw Naing | Ohnmar Win ""Graphical Password Authentication using image Segmentation for Web Based Applications"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25184.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25184/graphical-password-authentication-using-image-segmentation-for-web-based-applications/maw-maw-naing
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
The document proposes a new hybrid graphical password scheme for authentication on smart handheld devices. It combines recognition and recall-based techniques. During registration, the user selects objects as a graphical password and assigns digits to each object. For authentication, the user selects the objects in order and enters the corresponding digits. The scheme aims to improve usability and security over text passwords while addressing issues like shoulder surfing that graphical passwords often face. It is designed for smart devices like phones which are more convenient than desktop computers.
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
This document describes PassBYOP, a new graphical password scheme that uses live video of a physical token (such as a photo on a mobile phone) rather than static digital images. Three feasibility studies examine its reliability, usability, and security against observation attacks. Results found passwords based on image features to be viable, with task times and error rates comparable to prior schemes. Using a user-owned physical token increased security against observation without additional user burden, showing promise for more secure graphical passwords.
The document discusses and compares various authentication methods, including recognition-based, recall-based, and graphical password techniques. It provides an overview of common techniques such as Dhamija and Perrig's picture selection scheme, Sobrado and Birget's pass-object selection scheme, and Jermyn et al.'s Draw-A-Secret scheme. While graphical passwords may be easier for users to remember than text passwords, they have limitations such as taking longer to create and register, requiring more storage space, and not being very mature yet compared to traditional text-based passwords. The document evaluates the security and usability of different authentication methods.
Authentication Using Graphical Passwordijceronline
This paper introduces image based captcha to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with numerical password which provide more security and easy to remember text and graphical password.
I present a new security primitive based on hard AI problems, namely, a novel family of graph-ical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Well Known Tool Based Graphical Authentication Technique cscpconf
Authentication is the first step of information security. Authentication schemes require users to
memorize the passwords and recall them during log-in time. Traditional text-based
authentication schemes have memorability problems for secure passwords. Graphical password
schemes are introduced as alternatives to text based schemes. Many techniques have been
designed using single image or multiple images. Few grid based authentication techniques are
proposed. This paper introduces a new authentication technique based on a well known tool.
The most popular game especially in rural areas, “Snakes and Ladders” is used as a tool in
authentication technique. The usage of this tool increases the memorability and usability of
passwords.
Integration of sound signature in graphical passwordParag Tamhane
The document presents a graphical password system that uses images and click points for authentication. Users register by selecting a sequence of images and click points. Their profile is stored as a master vector with their ID, selected sound frequency, and tolerance level, along with a detailed vector of the images and click points. During login, users enter their ID and a sound is played, if the frequency is within the tolerance level they selected, their click sequence is checked against the stored profile for authentication. The system aims to provide a more memorable password while improving security over text passwords.
This document proposes a new shoulder surfing resistant graphical password scheme. It begins with an introduction to passwords and why they are needed for authentication. It then discusses different types of existing graphical passwords like passfaces, passpoints and draw-a-secret (DAS). The document outlines the working of current text-based graphical login systems and their drawbacks. It proposes a new login system using QR codes and password encryption to address these issues. It describes the current and future applications of this system and the hardware and software requirements. The document discusses the advantages of the new system in reducing shoulder surfing attacks and sending alerts on wrong attempts. It concludes that the proposed text-based color password scheme satisfies usability and security requirements.
Graphical password authentication system pptsNimisha_Goel
This document discusses different types of authentication systems including token-based, biometric-based, knowledge-based, recognition-based, pure recall-based, cued recall-based, and hybrid systems. It then focuses on graphical passwords, describing how they work by having users select images in a specific order. The document outlines a project to create an Android application for graphical password authentication to unlock private files using a cued recall system where users must select images in the correct sequence from a random grid. It discusses security considerations like guessing attacks and proposes that this approach provides stronger passwords while increasing the workload for attackers.
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
The document proposes a graphical password authentication system that combines graphical and text-based passwords. It describes how the system works: users select points of interest (POIs) on an image and associate text with each during registration. For login, users must correctly select the POIs in the correct order and provide the associated text. The system was implemented using Visual Basic .NET and aims to achieve the memorability of graphical passwords with the security of text-based passwords through multiple authentication factors.
Graphical password authentication using pccp with sound signatureeSAT Journals
Abstract
Persuasive Cued-Click Point is an advanced method of cued click point of graphical password technique which includes usability and security evaluations. It also useful for reduces hotspot problem and hence it helps the user in selecting password of higher security. This paper includes the persuasion to influence user choice in click based graphical passwords, so that users select more desultory and more difficult to guess the passwords. In this paper includes sound signature for recover the password if user forgot password or click point ,then playing the sound signature which is selected at registration time then it set new password and access the account. This paper include dead zone new concept to avoiding Shoulder surfing attack in graphical password authentication.
Keywords: Graphical Password, Authentication, Password Images, and PCCP etc…
This document provides a summary of a seminar report on graphical password authentication techniques. It begins with an introduction describing the weaknesses of traditional text-based passwords and an overview of graphical password methods. It then surveys existing graphical password techniques, categorizing them into recognition-based and recall-based approaches. Major techniques discussed include Dhamija and Perrig's image recognition scheme, Passfaces, and Jermyn's Draw-a-Secret recall-based technique. The document concludes by addressing the security and usability of graphical passwords compared to text-based passwords.
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
Abstract: Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. This approach present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which is called Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set.
Many security primitives are supported hard
mathematical problems. Passwords remain the foremost
widely used authentication method despite their well-known
security weaknesses. CAPTCHA authentication is clearly a
practical problem.
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
User authentication is necessary to secure the data and process on Internet and in digital devices. Static text based authentication are most widely employed authentication systems for being inexpensive and highly scalable. But they are prone to various types of active and passive attacks. The constant need of extending them to increase security is making them less usable. One promising alternative is Graphical
authentication systems, which if implemented properly are more secure but have their own drawbacks. In this paper, we discuss in detail the extension of our previous work Passblot [18], a unique graphical authentication system. It generates pseudo random one time passwords using a set of inkblots, unique to
each user. Properties of one time passwords ensure the resistance towards various common attacks and the uniqueness of human perception makes it usable. We demonstrate how our system effectively mitigates various attacks and analyse the results from various experiments conducted.
This document discusses graphical password authentication methods. It outlines recognition-based and recall-based techniques, such as selecting images and recreating drawings. Recognition techniques include picking images and identifying them later. Recall techniques involve reproducing a sequence, like clicking points on an image. The document evaluates the security and usability of different methods. While graphical passwords can be more secure than text passwords, they also take longer and are vulnerable to shoulder surfing. Potential solutions to shoulder surfing involve using movable frames or complex image schemes. Overall, the document argues that graphical passwords provide an alternative to text passwords but require more research.
Authentication plays a major role in Digital environment. In this environment we have different methods which generally use alphanumeric characters and special characters for password creation. These methods have some problems like hard to remember password because it has no meaning and easily breakable by third parties or attackers. To address these issues, many techniques for authentication are proposed from which graphical password method is best in terms of cost and usage. Basically, Graphical passwords use images for password creation and it has some demerits like hotspot and shoulder surfing problem. A persuasive cued click-point based method reduces hotspot problem. To prevent persuasive cued click-point based method from shoulder surfing we include one time password. For more user convenience we provide two login
methods one which requires internet and other which does not
require internet.
The document summarizes a proposed two-round hybrid password authentication scheme. The scheme combines graphical and text passwords to improve security. In the first round, users select images from a common image set. In the second round, users click on a point of interest in a custom image and enter a text password. Analyzing the scheme, the document finds that it has a large password space resisting brute force and dictionary attacks. Keyloggers are also mitigated as the scheme involves both mouse clicks and keyboard input. The hybrid approach aims to provide stronger authentication through multiple rounds while maintaining usability.
The document discusses passwords and graphical passwords. It defines a password as a secret word or string used to authenticate identity for access to resources. Graphical passwords use images rather than text, where the user selects images or click points within images to log in. The document outlines different types of graphical password schemes, including click-based schemes where the user clicks points on images in a specific order (like PassPoints), and recognition-based schemes where the user identifies previously selected images. It notes that while graphical passwords can provide more security, they also have disadvantages like taking more time and storage space compared to text passwords.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force
attacks. However, a strong textual password is hard to memorize and recollect .Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.
Various graphical password authentication schemes
were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically.
The human actions such as choosing bad passwords for
new accounts and inputting passwords in an insecure way for later logins are regarded as the weakest link in the authentication chain [16]. Therefore, an authentication scheme should be designed to overcome these vulnerabilities.
In this paper, we present a secure graphical authentication system named Pass Matrix that protects users from becoming victims of shoulder surfing attacks when inputting passwords in public through the usage of one-time login indicators. A login indicator is randomly generated for each pass-image and will be useless after the session terminates. The login indicator provides better security against shoulder surfing attacks, since users use a dynamic pointer to point out the position of their passwords rather than clicking on
the password object directly.
note: A slide for any presentation should not contain more than 4-5 sentences but this presentation has more than the requirement.So, i suggest you to edit as per your requirement and to make it more effective, you can add animations as well.
Data hiding in graphical password authentication using combinationnuruladnan11
Steganography is the art of hiding data in a seemingly innocuous cover medium. For example – any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message.
This document proposes IASL, an image-based authentication system that uses CAPTCHAs (tests to distinguish humans from computers) as graphical passwords. IASL addresses security issues with traditional text passwords by requiring users to click on points in a sequence of CAPTCHA images during login. It protects against online dictionary attacks since each login requires solving a new CAPTCHA. The document discusses recognition-based and text-based IASL schemes, and explains that IASL offers protection against guessing, shoulder surfing, and relay attacks by using computationally difficult CAPTCHAs that change for each login attempt.
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA ijait
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
The most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots.
Similar to CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW (20)
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...IJLT EMAS
Vertical electrical soundings (VES) was carried out in Opolo and Tombia all in Yenagoa local government area, Bayelsa state, Nigeria to understand the resistivity distribution of its subsurface which serves as a tool in investigating subsurface lithology. All VES sounding were stacked together to generate 1D pseudo tomogram and was subsequently interpreted. The interpreted VES curve results shows that Opolo consists of three layers within the depth of investigation. Sandy clay with mixture of silt make up the first layer (Top layer) with resistance value ranging from 24-63Ωm. The second layer is made up of thick clay with very low resistivity values ranging from 3-19Ωm. The third layer is sandyclay with its resistance value ranging from 26-727Ωm.Tombia also reveals that the area is in three layers within the depth of investigation. Sandy clay with a mixture of fine sand made up the first layer (Top soil) with its resistance values ranging from 40-1194Ωm. The second layer is made up of fine sand with resistivity value ranging from 475-5285Ωm. The third layer is made up of sandy clay/sand with its resistance value ranging from 24-28943Ωm.The results of the 1D pseudo tomogram also reveals that Tombia and Opolo consists of three layers within the depth of investigation and pseudo tomograms serves as a basis tool for interpreting lithology and identifying lithological boundaries for the subsurface
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...IJLT EMAS
The study is to determine the PH and moisture content
of Nono sold in Port Harcourt , the prevalence of Pseudomonas
aeruginosa in Fura da nono and finally the antibiotic resistance
pattern of Pseudomonas aeruginosa isolated from the fermented
products. nono samples were purchased from Borikiri in
portharcourt township. A total of 20 samples were assessed to
determine their microbiological quality and to conduct antibiotic
susceptibility test. Moisture content and pH of the samples were
also assessed. Enumeration of the total viable bacterial count
(TVBC), Total coliform count (TCC) and Total Pseudomonal
count (TPC) were also assessed to determine the sanitary quality
of the product. The PH ranges between 2.99 to 3.89 while the
moisture content ranges between 80% to 88%. The result
obtained from the microbial culture indicated that a wide array
of microorganism were present in Fura da nono including species
of Bacilu, klebsiella, Pseudomonas Staphylococcus aureus,
Streptococcus, Lactobacillus and Escherichia coli.. The highest
TVBC, TCC and TPC were 9.8x103
cfu/ml, 10x103
cfu/ml and
9.7x103
cfu/ml respectively. Antibiotic susceptibility was
conducted using 12 broad spectrum antibiotics and compared
against a standard provided by the Clinical laboratory standard
institute (CLSI). Gentamycin, Ofloxacin and Levofloxacin
recorded 100% resistance , while Cotrimoxazole, Ciprofloxacin,
Vancomycin, Nitrofurantoin, Norfloxacin and Azithromycin
recorded 100% susceptibility as indicated by the complete clear
zone of inhibition.It was discovered that the absence of
regulatory agencies like National Agency for Food Drug
Administration and Control (NAFDAC) in the regulation of the
quality of the product was the cause of the high contamination,
since there were no quality control measures in its production
line .It was recommended that NAFDAC should provide a
standard operating procedure for local food producers and
should include them in their scope for regulation.
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...IJLT EMAS
Hydrocarbon pollution Remediation by Enhanced
Natural Attenuation method was adopted to remediate the
hydrocarbon impacted site in Ogoniland Rivers State, Nigeria .
The research lasted for 6 months. Samples were collected at
monthly intervals . samples were collected intermittently
between Feb 2019 to July 2019 . Mineral salt medium containing
crude oil was used as a sole source of carbon and energy for the
isolation of hydrocarbonoclastic bacteria. Samples were
collected from the four (4) local government that made up
Ogoniland and they includes Khana(k), Gokana (G),Tai (T),
Eleme (E) and transported immediately to the laboratory for
analysis. The microbial and physicochemical properties of the
soil samples varied with the different local government areas.
Seven bacteria genera were isolated from the samples from the
four locations, viz, Pseudomonas, Lactobacter, Micrococcus,
Arthrobacter, Bacillus, Brevibacterium and Mycobacterium
were isolated and identified. the seven isolate were indigenous in
the study area. Nutrient were added to identified plots of
hydrocarbon pollution polluted site within the four local
government and they were able degrade hydrocarbon within a
short of period of time. Reassessment of physicochemical
parameter impacted site was used to judge the bioremediation
potentials of microorganism
Comparison of Concurrent Mobile OS CharacteristicsIJLT EMAS
It is challenging for the mobile industry to supply the best features of the devices with its increasing customer requirements. Among the progress of technologies, the mobile industry is the fastest growing; as it keeps pace with rapidly changing market demands. This paper compares between the currently available mobile devices based on its user interface, security, memory utilization, processor, and device architecture. The mobile products launched from 2015-19 are used for comparison. Current results after comparison with earlier study found that many mobile devices and features became obsolete in a short time span supporting the aggressive growth of mobile industry.
Design of Complex Adders and Parity Generators Using Reversible GatesIJLT EMAS
This paper shows efficient design of an odd and even parity generator, a 4-bit ripple carry adder, and a 2-bit carry look ahead adder using reversible gates. Number of reversible gates used, garbage output, and percentage usage of outputs in implementing each combinational circuit is derived. The CLA used 10 reversible gates with 14 garbage outputs, with 50% percentage performance usage.
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesIJLT EMAS
This paper shows an effective design of combinational circuits such as 2:1, 4:1 multiplexers, 2:4 decoder and a full subtractor using reversible gates. This paper also evaluates number of reversible gates used and garbage outputs in implementing each combinational circuit.
Multistage Classification of Alzheimer’s DiseaseIJLT EMAS
Alzheimer’s disease is a type of dementia that destroys
memory and other mental functions. During the progression of
the disease certain proteins called plaques and tangles get
deposited in hippocampus which is located in the temporal lobe
of brain. The disease is not a normal part of aging and gets
worsen over time. Medical imaging techniques like Magnetic
Resonance Imaging (MRI), Computed Tomography (CT) and
Positron Emission Tomography (PET) play significant role in the
disease diagnosis. In this paper, we propose a method for
classifying MRI into Normal Control (NC), Mild Cognitive
Impairment (MCI) and Alzheimer’s Disease(AD). An overall
outline of the methodology includes textural feature extraction,
feature reduction process and classification of the images into
various stages. Classification has been performed with three
classifiers namely Support Vector Machine (SVM), Artificial
Neural Network (ANN) and k-Nearest Neighbours (k-NN)
Design and Analysis of Disc Brake for Low Brake SquealIJLT EMAS
Vibration induced due to friction in disc brake is a
theme of major interest and related to the automotive industry.
Squeal noise generated during braking action is an indication of
a complicated dynamic problem which automobile industries
have faced for decades. For the current study, disc brake of 150
cc is considered. Vibration and sound level for different speed
are measured. Finite element and experimentation for modal
analysis of different element of disc brake and assembly are
carried out. In order to check that precision of the finite element
with those of experimentation, two stages are used both
component level and assembly level. Mesh sensitivity of the disc
brake component is considered. FE updating is utilized to reduce
the relative errors between the two measurements by tuning the
material. Different viscoelastic materials are selected and
constrained layer damping is designed. Constrained layer
damping applied on the back side of friction pads and compared
vibration and sound level of disc brake assembly without
constrained layer damping with disc brake assembly having
constrained layer. It was observed that there were reduction in
vibration and sound level. Nitrile rubber is most effective
material for constrained layer damping.
The aim of this article is to device strategies for
establishing and managing tomato processing industry, which
aims to enhance the taste experiences on different tomato
products for the people. Management needed for a successful
business is analyzed in each and every aspect. The five important
steps in management- planning, organizing, staffing, leading and
controlling are applied in management of the industry. Planning-
In the planning process, activities required to achieve desired
goals are thought about. This process involves the creation and
maintenance of a plan, those include psychological aspects that
require conceptual skills. Organizing- Organizing is a systematic
processing in order to attain objectives of structuring,
integrating, co-ordinating task, and activities. Staffing- Staffing is
the process of acquiring, deploying, and retaining a workforce of
sufficient quantity and quality to create positive impacts on the
organization’s effectiveness. Leading- Communicating,
motivating, inspiring and encouraging employees are key aspects
of process of leading, task of which is towards a higher level of
productivity of organization. Controlling- Controlling measures
the deviation of actual performance from the standard
performance, discovers the causes of such deviations and helps in
taking corrective actions.
This paper deals with the functioning of a Propylene
Recovery Unit (PRU) in a chemical industry and the various
Managerial and Human Resource considerations that need to be
accounted for, in this process. This report discusses various
aspects that are to be considered, before initializing the setup of
PRU, ranging from a Management perspective. Mission and
objective was decided and subsequently the managerial model
was developed. Propylene is an indispensible raw material that
has a variety of end use. A detailed analysis pertaining to
propylene demand in the market along with major sources has
been incorporated in this paper. Emphasis has been placed on
the type of departmentation required. Managerial aspects of
various functions ranging from warehousing to quality control
have also been taken into consideration. Delegations of functional
departments have been defined to prevent redundancy of duties
and major managerial functions of Planning, Organizing,
Staffing, Leading and Controlling has also been discussed.
Internal and External factors that affect the company have been
analyzed through SWOT Analysis and MBO strategies are also
broadly classified. Finally, Total Quality Management and
strategies for adoption of Lean Manufacturing as also touched
upon briefly.
This business model is intended to provide an online
platform connecting the general public customers with the
producers of groceries and food products such as fruits,
vegetables, meat and dairy products. The producers are selected
based on their production methods and their quality. The model
obtains the demand from the customers and the supply is found
from the producers. The prices of the products are fixed
according to the supply and demand. The customers' orders can
be classified into two different categories: 1. Bulk orders and 2.
Recipe based. The orders are obtained in a bulk quantity or for a
certain period of time and the products are delivered
periodically as per the customer's need. This model eliminates
the requirements of conventional storage units and also controls
the quality of the products using scientific devices. This model
reduces the wastage of resources as it enables the customer to
estimate their requirements using the help of recipe based
ordering system and also keeps the price constant for the bulk
orders.
Home textile exports are market driven, which implies that they deal with what the foreign market wants and how the home textile exporter could fulfil it, or product driven, where they deal with what the exporter has to offer and how can an appropriate strategy be applied to find the targeted buyers in the foreign market. The requisites of these are that the exporter must know the export plan, production procedure and export documentations. Exporter also must know his/her operational capacity, organizational nature and structure. An attempt is made in this project to understand and examine the nature and structure of the organization of the S3P exports.
Almost 80% of the population are coffee lovers.
Kaffinite sunshine café is guaranteed to become the daily
necessity for all the coffee addicts. A place with good ambience
where people can escape from their daily stress and cherish with
a morning cup of coffee. Our café offers home style delicious
breakfast and snacks. We focus on finding the most aromatic
and exotic coffee beans. We have our branches in many cities of
Tamil Nadu. We have a romantic ambience which attracts youth.
Our café has spectacular interior designs with stupendous taste
of coffee. We have attached our menu which contains multicuisines
at attractive prices. In this paper, we have done SWOT
analysis of our café to know our strengths and weaknesses. We
have also analyzed our opportunities and threats from the
external environment
Management of a Paper Manufacturing IndustryIJLT EMAS
This project focuses on how a paper manufacturing industry looks like and how it operates. For better understanding purpose, we have taken a hypothetical situation here. We have discussed on various factors that are to be considered before constructing a plant. For example, what kind of proprietorship is suitable for this case? We have developed a SWOT Analysis for the plant, thinking about the pros and cons. This project can be a guide for a person who is willing to start up a new manufacturing plant. This report can be used to streamline your approach to planning by outlining the responsibilities of plant managers and external factors, as well as identifying appropriate resources to assist you with the construction of plant.
Application of Big Data Systems to Airline ManagementIJLT EMAS
The business world is in the midst of the next
revolution following the IT revolution – the Big Data revolution.
The sheer volume of data produced is a major reason for the big
data revolution. Aviation and aerospace are typical areas that
can apply big data systems due to the scale of data produced, not
only by the plane sensors and passengers, but also by the
prospective passengers. Data that need to be considered include,
but are not limited to, aircraft sensor data, passenger data,
weather data, aircraft maintenance data and air traffic data.
This paper aims at identifying areas in aviation where big data
systems can be utilized to enhance operational performances
improve customer relations and thereby aiding the ultimate goal
of increased profits at reduced costs. An improved management
model built on a strong big data infrastructure will reduce
operation costs, improve safety, bring down the cost and time
spent on maintenance and drastically improve customer
relations.
Impact of Organisational behaviour and HR Practices on Employee Retention in ...IJLT EMAS
I. INTRODUCTION
Roads are constituted as the most significant component of
India‟s Logistics Industry, accounting for 60 percent of
the total freight movement in the country. A majority of
players in this industry are small entrepreneurs running their
family businesses. As a result, Man Power Development
Investments that pay off in the longer term, have been
minimised respectively. Moreover, these businesses are
typically controlled severely by the proprietor and his / her
family and consequently, making it unattractive for the
professionals. Poor working conditions, Low pay scales
relative to alternate careers, poor or non-existent Manpower
Policies and prevalence of unscrupulous practices have added
to the segment's woes for seeking employment. Thus, it could
be rightly stated that the Transportation, Logistics,
Warehousing and Packaging Sector is considered an
unattractive career option and fails to attract and retain skilled
manpower. Many Organizations have failed to recognize that
Human Resources play an important role in gaining an
immense advantage in today‟s highly competitive Global
Business Environment. While all aspects of managing Human
Resources is important, Employee Retention continues to be
an essential part of Human Resource Management activity
that help the Organizations to achieve their goals and
objectives.
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...IJLT EMAS
The purpose of this article is to identify the energy
challenges faced by airports especially with regards to the energy
consumed by the terminal building and suggest suitable energy
conservation techniques based on what has already been
implemented in few airports around the world.
We have identified the various facilities and systems which are
responsible for a major share of the consumption of energy by
airport terminals and we have suggested measures to effectively
overcome these problems.
Cake Walk is India's largest confectionery manufacturer known for innovative candy products. It aims to expand globally while contributing positively through social initiatives. The document discusses Cake Walk's vision, products, marketing environment analysis including PESTEL, SWOT and competitive strategies. Market research methods like blind testing and surveys are used to develop new products and improve existing ones. Cake Walk targets a wide customer segment with its diverse product range and strong brand image.
This document discusses the planning and organization of a tours and travel company called MACH Tours and Travels. It begins by outlining their mission and vision, which is to provide enjoyable and memorable experiences for customers by focusing on ease, luxury, quality time, and value. It then provides details on their planning process, including developing customized packages to meet different customer needs. It also discusses their application of Henri Fayol's management principles and considers decision making, risk management, organizational structure, and the business environment factors affecting the tourism industry.
The purpose of this paper is to highlight the general
terms and definitions that falls under the ‘common set’ in the
intersection of the sets Meteorology and Aerospace Engineering.
It begins with the universal explanations for the meteorological
phenomena under the ‘common set’ followed by the
categorization of clouds and their influences on the aerial
vehicles, the instrumentation used in Aeronautics to determine
the required Meteorological quantities, factors affecting aviation,
effects of aviation on the clouds, and the corresponding protocols
involved in deciphering the ‘common set’ elements.
It also talks about the relation between airport construction and
Geology prior to concluding with the uses and successes of
Meteorology in the field of Aerospace.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Manufacturing Process of molasses based distillery ppt.pptx
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
1. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue VIIIS, August 2017 | ISSN 2278-2540
www.ijltemas.in Page 62
CAPTCHA as Graphical Password: A Novel
Approach to Enhance the Security in WWW
Parul Jadon, Darpan Anand, Jayash Sharma
Department of Computer Science Engineering, Hindustan Institute of Technology and Management, Agra, (U.P.) India
Abstract—This research aims to study the existing password
scheme and to design and develop a new improved graphical
password scheme. A novel protection primitive is presented in
view of strong AI problems namely a new family of graphical
password scheme built up on top of captcha technology, which
we call Captcha as graphical password (CaRP). CaRP is both a
captcha and graphical password scheme. CaRP addresses
number of security issues altogetherforexample, online guessing
attacks, relay attacks and if combined with dual-view
technologies shoulder-surfing attacks. CaRP likewise offers a
novel way to deal with address the notable image hotspot
problem in well-known graphical password systems for example,
Pass Points.
Keywords— CaRP; Captcha; Graphical password; Securities
I. INTRODUCTION
resently a days, validation is the central procedure to
ensure data security and the most widely recognized and
simplest strategy is password authentication [1]. Conventional
alphanumeric passwords are series of letters and digits, which
are simple and natural to all clients. Nonetheless, there are a
few inborn imperfections and lacks in alphanumeric
passwords, which effectively advance into security issues.
Today clients have numerous passwords for PCs, informal
communities, E-mail and so on. They may choose to utilize
one secret word for all frameworks to diminish the memory
load, which decreases security [2, 3]. Alphanumeric
passwords are defenseless against shoulder surfing attack,
spyware attack and social engineering attack and so on.
Propelled by the guarantee of enhanced secret word ease of
use and security, the idea of graphical passwords was
proposed in 1996 [4].The primary objective of graphical
passwords is to utilize pictures or shapes to supplant content,
since various intellectual and mental reviews exhibited that
individuals perform far superior when recollecting pictures
than words. Our own reports or passwords are hacked by the
third individual normally called programmers. There are
distinctive courses for giving security. Here what we
presented is one of the techniques for the security reason.
Another insurance primitive is demonstrated in light of hard
AI inconveniences, to be specific, another group of graphical
password scheme based on top of Captcha innovation, which
is known as Captcha and Graphical Password (CaRP). The
vigor of CAPTCHA is found in its quality in opposing
programmed antagonistic assaults, and it has numerous
applications for down to earth security, including free email
services, online polls, and search engine bots, forestalling
dictionary attacks, worms and spam [4]. Combination of
CAPTCHA as well as graphical password initiative a new
type of security feature which is known as CaRP. In CaRP,
another picture is produced for each login endeavor
notwithstanding for a similar client. CaRP utilizes a letter set
of visual items (e.g., alphanumerical characters, comparable
creatures) to produce a CaRP picture, which is additionally a
Captcha challenge.
II. RELATED WORK
A. Graphical Password
The term graphical password was initially presented by
Greg Blonder in 1996. Graphical password is the password
where client set his/her password as image or picture.
Graphical password word plans have been proposed as a
conceivable contrasting option to alphanumeric schemes,
inspired mostly by the way that people can recollect image
effortlessly than content; mental reviews backings such
presumption. They can be classified into three categories as
per the errand required in remembering and entering
passwords: recognition, recall, and cued recall [5].
a. Recognition based
A recognition-based scheme requires distinguishing
among decoys the objects belonging to a password
portfolio. An unmistakable scheme is: Pass faces where a
client picks a component of appearances or faces from a
database in giving ascent a password. Amid affirmation, a
board of applicant countenances is appeared for the client
to choose the face setting off to her capacity. This
procedure is iterated different assaults, each round with a
different board. An effective login calls for right choice in
each round. The band of images in a panel remains the
same between logins, yet their positions are permuted [6].
Déjà vu plot the Dhamjia et al. proposed Déjà vu, where
clients or users will choose a specific number of art image
from a set of pictures generated by a system in the
registration phase. Amid confirmation, the system shows
a testing set blends with password and some decoy image.
The use must recognize the password pictures [7]. Story
is like pass faces yet the pictures in the portfolio are
requested, and a client must distinguish her portfolio
images in the correct request [8].
b. Recall based
P
2. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue VIIIS, August 2017 | ISSN 2278-2540
www.ijltemas.in Page 63
At the time of authentication a use is made a request to
imitate or choose something which he create or chose
amid the registration step. Draw-A Secret [9] (DAS) was
the starting recall based system proposed. A client draws
her password on a 2D grid [10].The system encodes the
order of grid cells along the drawing course as a client
drawn password.
c. Cued recall based
This is also known as click based technique. In this
method user gives a picture / images or set of images and
user need to choose click point on that images as the
password. User will effectively validate by entering
correct click point and request of that point [7.] Pass
Points is a generally contemplated click-based signaled
cued-recall scheme wherein a user clicks a sequence of
points anywhere on an image in creating a password, and
re-clicks a similar arrangement amid authentication [11].
Cued Click Points (CCP) is like Pass Points yet utilizes
one image for every click, with the next image chose by a
deterministic function [12].
B. Captcha
Captcha is a program that can produce and grade tests that:
(A) most people can pass, however (B) current PC programs
can't pass. Such a program can be utilized to separate people
from PCs [6]. There are two sorts of visual CAPTCHA: Text
CAPTCHA and Image Recognition CAPTCHA (IRC). Text
captcha is recognition of character. It contain trouble to
comprehend character. What's more, image captcha depends
on recognition of non-character object [13].
III. CAPTCHA AS GRAPHICAL PASSWORD
Bib B. Zhu, Jeff Yan,et. al. [14] proposed CaRP scheme.
In CaRP i.e. CAPTCHA as graphical Passwords, CAPTCHA
and graphical password is joined and utilized as a solitary
element for confirmation. CaRP is click based graphical secret
word or password system, where an arrangement of click on
pictures/image is utilized to characterize a password and for
each login endeavor another CaRP image is created. CaRP
image generate, which ends up being a CAPTCHA challenge
for the user. Nowaday‟s captcha and a graphical password
together can be connected on touch screen mobiles because
writing passwords is hectic, particularly for secure utilizations
of Internet, for example, e-banks for login sessions.
CaRP can be classified into (1) Recognition based and (2)
Recognition-Recall.
IV. RECOGNITION BASED CARP
In this system, uncounted number of visual Recognition-
based for this sort of CaRP, a password is an arrangement of
visual questions in the letters in order Per perspective of
conventional recognition based graphical passwords,
recognition-based CaRP appears to have admittance to a
limitless number of various visual objects. There are three
recognition-based CaRP scheme:
A. Click Text
Click Text is a recognition-based CaRP scheme worked
with respect to top of text Captcha. It utilizes text CAPTCHA
as its underlying principle. Alphabet in order set of Click Text
contains alphanumeric characters. Its alphabet comprises
characters without visually-confusing characters. For
example, Letter "O" and digit "0" may bring about disarray in
CaRP images, and in this manner one character ought to be
avoided from the letter set. A Click Text password is a
sequence of characters in the alphabet e.g., ρ
="DE@F2SK78", which is like a content password.
A Click Text image is unique in relation to regular
CAPTCHA as here every one of the characters of letter set are
to be incorporated into the picture as appeared in Fig.1.
Fig. 1 Click Text image with 33 characters [15]
B. Click Animal
Captcha Zoo is a Captcha scheme which utilizes 3D
models of dog and horse to produce 2D animals with various
texture, color, lightings and poses, and arranges them on a
jumbled background. A user click all the horses in a challenge
to pass the text. Fig.2 demonstrates a specimen click image
challenge with 10 animals wherein every one of the horses are
surrounded be red circle. Click Animal is a recognition-based
CaRP scheme built on top of Captcha Zoo, with an alphabet
of similar animals such as dog, horse, pig, etc. Its password is
a sequence of animal names such as ρ = “Turkey, Cat, Horse,
Dog,” For each animal, one or more 3D models are built [14].
Fig. 2 Click Animal image with Horse Circled red [16]
C. Animal Grid
It is a combination of Click A Secret (CAS) and Click
Animal. In this framework, firstly Click Animal image is
shown, after the animal is chosen, an image of n*n grid shows
up.
3. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue VIIIS, August 2017 | ISSN 2278-2540
www.ijltemas.in Page 64
Fig. 3 Click Animal images (left) and 6x6 grid (right) [17]
V. RECOGNITION BASED CARP
In this system, sequence of some invariants points of
objects is the password. Points are the invariant points of
object that has a fixed relative value in different fonts. User
must identify the object image and then use identified objects
as a cue to locate a password within a tolerance area.
Recognition recall CaRP techniques are Text Points and Text
Point4CR [18].
A. Text Points
Characters contain invariant points. Fig.4 demonstrates
some invariant points of letter "A", which offers a solid cue to
remember and find its invariant points. A point is said to be an
internal point of an object if its distance to the closest
boundary of the object exceeds a threshold. A set of inner
invariant point of characters is chosen to form a set of
clickable points for Text Points.
Fig.4 Some invariant points (crosses) of “A” [15]
B. TextPoint4CR
Text Points can be changed to fit challenge-response
authentication. This adjustment is called Text Points for
Challenge-Response or TextPoints4CR. Not at all like Text
Points wherein the authentication server stores a salt and a
password hash value for each account, has the server in Text
Points 4 CR stored the password for each account. Another
distinction is that each character seems just once in a
TextPoints4CR image but may appear multiple times in a Text
Points image. This is because both server and customer
(client) in TextPoints4CR ought to produce a similar grouping
of sequence of discretized grid-cells independently.
VI. AUTHENTICATION PROCESS IN CARP
CaRP schemes having additional protection such as
secure channels between clients and the authentication server
through Transport Layer Security (TLS). CaRP schemes in
user authentication is as follows:
I. Enter ID and send it to Authentication server AS.
II. AS Stores a salt and hash value H (P, S) for each
ID.P is the user password and it is stored.
III. Upon receiving login request, AS generates a CARP
image. It records location of characters or animals in
image and the image is sent to the user.
IV. User Clicks the Password.
V. Co-ordinates of points are recorded are sent to AS.
VI. AS maps these Co-ordinates & recovers clickable
points of object P, that user clicked.
VII. Then AS retrieves salt s of account &calculate its
hash value with salt using algorithm like SHA-1.
VIII. IT compares result with hash value stored for the a/c.
IX. Authentication is successful if and only if the two
hash value matched [19].
Fig. 5 Flowchart of basic CaRP authentication [14]
VII. SECURITY ANALYSIS
A. Automatic Online Guessing Attacks
In automatic online guessing attacks, the experimentation
procedure is executed consequently though dictionaries can be
built physically.
B. Human Guessing Attacks
In human guessing attacks, humans are used to enter
passwords in the trial and error process. Humans are much
slower than computers in mounting guessing attacks.
C. Relay Attacks
Relay attacks might be executed in a few ways. Captcha
challenges can be transferred to a high-volume Website
4. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue VIIIS, August 2017 | ISSN 2278-2540
www.ijltemas.in Page 65
hacked or controlled by enemies to have human surfers solved
the challenges keeping in mind the end goal to keep surfing
the Website, or relayed to sweatshops where people are hired
to solve Captcha challenges for small payments.
D. Shoulder-Surfing Attacks
Shoulder-surfing attacks are a threat when graphical
passwords are entered in a public place, for example, bank
ATM machines. CaRP is not vigorous to shoulder-surfing
attacks without anyone else. Be that as it may, joined with the
accompanying dual- view technology, CaRP can thwart
shoulder-surfing attacks.
E. Dictionary Attack
In this attack, an attacker tries to figure the password from a
list of words, dictionary. Dictionary will be the gathering of
all high probability passwords based on past determinations.
TABLE I. Attack Comparison in Graphical Password and
CaRP [20]
Table 1 summarizes the security of the different graphical
password schemes and CaRP we analyzed. „Y‟ means Yes,
that it is resistant to that formof attack. „N‟ means No that the
scheme is open to attack.
VIII. PERFORMANCE ANALYSIS
Fig. 6 Comparing different schemes for Ease of Use [14]
Above figure 6 shows the comparison results of different
scheme for ease of use as a password system. CaRP systemis
user friendly, easy to use.
Fig. 7 Login Time for Different Scheme [14]
T : Average σ : Sample Standard
Deviation Max Min
IX. CONCLUSION AND FUTURE SCOPE
We have proposed CaRP, another security primitive
depending on unsolved hard AI issues. CaRP is both a
Captcha and a graphical password scheme. The thought of
CaRP presents another group of graphical passwords, which
embraces another way to deal with counter online guessing
attacks: another CaRP image, which is likewise a Captcha
test, is utilized for each login endeavor to make trials of an
online guessing attack computationally free of each other. A
password of CaRP can be discovered just probabilistically by
automatic online guessing attacks including brute-force
attacks, a coveted security property that other graphical secret
word plans need. Hotspots in CaRP pictures/image can never
again be abused to mount automatic online guessing attacks,
an inborn powerlessness in numerous graphical password
systems. CaRP strengths foes to fall back on altogether less
effective and a great deal more exorbitant human-based
attacks .Notwithstanding offering security from online
guessing attacks, CaRP is additionally impervious to Captcha
relay attacks, and, if joined with dual-view technologies,
shoulder-surfing attacks. CaRP can likewise help diminish
spam email sent from a Web email service. Our convenience
investigation of two CaRP scheme we have executed is
empowering. For example, more members considered Animal
Grid and Click Text easier to use than Pass Points and a
combination of text password and Captcha.
REFERENCES
[1] K. Renaud. “Evaluatingauthenticationmechanisms”. InL.Cranor
andS. Garnkel, editors, SecurityandUsability: Designing Secure
Systems That People Can Use, chapter 6, pp.103-128. O'Reilly
Media, 2005.
[2] G. Blonder. “Graphical passwords”. United States Patent,
5,559,961, 1996.
[3] B. Kirkpatrick. “An experimental study of memory”.
Psychological Review, 1:602-609, 1894.
[4] S. Madigan. “Picture memory”. In J. Yuille, editor, Imagery,
Memory,andCognition: Essays in Honorof AllanPaivio, chapter
3, pp.65-89. Lawrence Erlbaum Associates, 1983.
5. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue VIIIS, August 2017 | ISSN 2278-2540
www.ijltemas.in Page 66
[5] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical
passwords: Learningfromthe first twelve years,” ACM Comput.
Surveys, 44, 4, 2012.
[6] Rashmi B J, Prof. B Maheshwarappa.“Improved Security Using
Captcha as GraphicalPassword” IJARCCE , 4, 2015.
[7] Shraddha S. Banne , Prof. KishorN. Shedge.”CARP: CAPTCHA
as A Graphical Password Based Authentication
Scheme”IJARCCE , 5, 2016.
[8] D. Davis, F. Monrose, andM. Reiter,“Onuser choice in graphical
password schemes,” in Proc. USENIX Security, 1–11, 2004.
[9] T. S. Ravi Kiran , andY. Rama Krishna.”Combiningcaptcha and
graphical passwords for user authentication‖”International Journal
of Research in IT & Management, 2, 4, 2012.
[10] NayanGawande. “MergingCAPTCHA And Graphical Password
On NP Hard Problems In AI: New Security Enhancing
Technique” IJSR , 3, 2014.
[11] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N.
Memon,“PassPoints: Design and longitudinal evaluation of a
graphical password system,” Int. J. HCI, 63, 102–127, 2005.
[12] S. Chiasson, P. C. van Oorschot, and R. Biddle. “Graphical
password authentication using cued click points,” in Proc.,
ESORICS, 359–374, 2007.
[13] Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John
Langford, “CAPTCHA: Using Hard AI Problems for Security.”
Proceeding 2003.
[14] Bin B.Zhu, Jeff Yan, GuanboBao, Maowei Yang, and NingXu.
“Captcha as Graphical Passwords-A New Security Primitive
Based on Hard AI Problems.” IEEE TRANSACTIONS ON
INFORMATION FORENSIS AND SECURITY, 9, 6, 2014.
[15] Gubbala Jahnavi Deepika, DDD Suri Babu, “A noval approach
for captcha as graphical password using a new safety primitive
based on hard AI problems” , IJCSMC,4,2015.
[16] Murugavalli S, Jainulabudeen SAK, Senthil Kumar G, Anuradha
D,”Enhancing Security Against Hard AI Problems in User
AuthenticationUsingCaptcha as Graphical Passwords” Journal of
Global Research in Computer Science, 7, 2016.
[17] Mrs. Anuradha. V, Mr.M.Nagesh, Mr.N. Vijaya sunder sagar,” A
Survey on Graphical Passwords in Providing Security”,
International Journal of Advanced Engineering and Global
Technology, 3, 2015.
[18] ShraddhaS.Banne, Prof. K.N.Shedge,”A Review Graphical
passwordBased AuthenticationScheme”,International Journal of
Science & Research(IJSR), 3 , 2014.
[19] M. M. VamsiPriya, SushmaNallamalli, D. BhanuPrakash, Ramya
Sri “Authentication Using CAPTCHA as Graphical Password”,
International Journal ofAdvancedResearchin Computer Science
and Software Engineering, 5, 2015.
[20] Saranya Ramanan, BindhuJ S ,”A survey on different graphical
password authentication techniques”, International Journal of
Innovative Research in Computer and Communication
Engineering”, 2, 2014.