SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 409
A SHOULDER SURFING RESISTANCE USING HMAC ALGORITHM
Mrs. L.K. Shoba1, Ms. P.I. Nishitha2, Ms. J. Abirami3
1 Assistant professor, Department of Information Technology, Jeppiaar Engineering College,
Chennai, Tamil Nadu, India.
2, 3 Department of Information Technology, Jeppiaar Engineering College,
Chennai, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Authentication based on passwords is used
largely in applications for computer security and privacy.
However, human actions such as choosing bad passwords and
inputting passwords in an insecure way are regarded as” the
weakest link” in the authentication chain. Rather than
arbitrary alphanumeric strings, users tend to choose
passwords either short or meaningful for easy memorization.
With web applications and mobile apps piling up, people can
access these applications anytime and anywhere with various
devices. This evolution brings great convenience but also
increases the probability of exposing passwords to shoulder
surfing attacks. Attackers can observe directly or use external
recording devices to collect users’ credentials. To overcome
this problem, the user is provided with the two-optional
authentication system for the user using HMAC and base64
algorithm. The forget password module is designed with an
innovative idea. Based on idea of framing forget password
questions on the user’s handheld device. Blocking the user
account if wrong password injected to the server frequently
and intimate the user through Email and user’s alternative
mobile number via SMS about current location of the mobile.
Key Words: Graphical Passwords, Authentication,
Shoulder Surfing Attack.
1. INTRODUCTION
Textual passwords have been the most widely used
authentication method for decades. Comprised of numbers
and upper- and lower-case letters, textual passwords are
considered strong enough to resist against brute force
attacks. Image-based passwords are vulnerable to shoulder
surfing attacks (SSAs). This type of attack either uses direct
observation, such as watching over someone’s shoulder or
applies video capturing techniques to get passwords, PINs,
or other sensitive personal information. To provides
authentication by blocking the user account if wrong
password injected to the server frequently but recover
password using SMS verification.
2. LITERATURE SURVEY
2.1 Cryptanalysis of passwordauthenticationschemes:
Current status and key issues
In this paper, we presented the survey of all currently
available password based authentication schemes and
classified them in terms of several crucial criteria. This
study will help in developing different password based
authentication techniques, which are not vulnerable to
different attack scenarios. Two and three party key
exchange protocols require secure authentication
mechanism for achieving the required goalsand satisfying
the security requirements of an ideal password based
authentication scheme. Smart cards, which are used in
financial transactions, require highlysecureauthentication
protocols.
2.2 Graphical Password Authentication: Cloud
Securing Scheme
In this paper we are representing the authentication given
to cloud by using graphical password. We have proposed
cloudwith graphical security by meansofimagepassword.
We are providing one of the algorithmswhicharebasedon
selection of username and images as a password. By this
paper we are trying to give set of images on the basis of
alphabet series position of charactersin username. Finally
cloud is provided with this graphical password
authentication.
2.3 Against Spyware Using CAPTCHA in Graphical
Password Scheme
We propose a new scheme, using CAPTCHA (Completely
Automated Public Turing tests to tell Computers and
Humans Apart) that retaining the advantages of graphical
password schemes, while simultaneously raising the cost of
adversaries by orders of magnitude.
2.4 Covert Attention Shoulder Surfing: Human
Adversaries Are More Powerful Than Expected
In this paper, we show that human adversaries, even
without a recording device, can be more effective at
eavesdropping than expected, in particular by employing
cognitive strategies and by training themselves. Our novel
approach called covert attention shoulder surfing indeed
can break the well known PIN entry method previously
evaluated to be secure against shoulder surfing. Another
contribution in this paper is the formal modelingapproach
by adapting the predictive human performance modeling
tool for security analysis and improvement. Wealsodevise
a defense technique in the modeling paradigm to
deteriorate severely the perceptual performance of the
adversaries while preserving that of the user. To the best
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 410
of our knowledge, this is the first work to model and
defend the new form of attack through human
performance modeling. Real attack experiments and user
studies are also conducted.
2. 5 S3PAS: A Scalable Shoulder-Surfing Resistant
Textual-Graphical Password Authentication Scheme
In this paper, we propose a Scalable Shoulder-Surfing
Resistant Textual-Graphical Password Authentication
Scheme (S3PAS). S3PAS seamlesslyintegratesbothgraphical
and textual password schemes and provides nearly perfect
resistant to shoulder-surfing, hidden-camera and spyware
attacks. It can replace or coexist with conventional textual
password systems without changing existing userpassword
profiles. Moreover, it is immune to brute-force attacks
through dynamic and volatile session passwords. S3PAS
shows significant potential bridging the gap between
conventional textual password and graphical password.
Further enhancements of S3PAS scheme are proposed and
briefly discussed. Theoretical analysis of the security level
using S3PAS is also investigated
3. EXISTING SYSTEM
The Existing system the users upload or select the pre-
defined image that provided by the server as a password
image. If user selected the image as password the server
process with the image and split the passwordimageto7x11
grids and display all grid images to the user, and user select
the single grid as a password grid for the particular image.
And user upload with multiple images as user need and
select each grid as a password for an image. And while login
the user is provided with the login indicator (temporary
password). The login indicator is only visible while holding
the proximity sensor of the user device and the holding the
screen in circle image. Now the user is provided with the
login indicator, here the user now displayedwiththegridded
password image with movable horizontal alphabeticbarand
movable vertical numeric bar. Your login indicator will be in
the form of A6. In vertical and horizontal bar, the
alphabets and numeric valueswill be mismatchinorder.The
user can move the bar values by using navigation keys
provided bellow. By moving the user should move the value
A vertically straight to the password grid. And move value 6
horizontal straight to the password grid. And press OK the
grid will be authenticated. And user provided with next
image with new login indicator. User shouldauthenticatethe
images till the last image provided by the user will
registration.
4. PROPOSED SYSTEM
In our system, we are providing authentication by two
optional authentication systems for the user (one is the
existing and another model is proposed by us). Proposed
model provides the user friendly and the interactive
environment for the user. The efficient and the innovative
banking service provided for the authentication system.The
forget password module is designed with an innovativeidea.
Based on idea of framing forget password questions on the
user’s handheld device. Blocking the user account if wrong
password injected to the server frequently and intimate the
user through e-mail and user’s alternative mobile number
via SMS about current location of the mobile.
5. BLOCK DIAGRAM
Fig.5.1. Architecture diagram of shoulder surfing
resistance using HMAC algorithm.
6. MODULES
1. Account creation and registering your
password.
2. Authentication using existing graphical
authentication.
3. Authentication using proposed graphical
authentication.
4. Forget password and recovering module
5. Banking services.
6.1 Account creation and registering your password:
The users register the account with providing the user
information and the optional mobile number and the email
to make alert about your account in some extremecases.The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 411
users upload or select the pre-defined image that provided
by the server as a password image. If user selectedtheimage
as password the server process with the image and split the
password image to 7x11 grids and display all grid images to
the user, and user select the single grid as a password grid
for the particular image. And user upload with multiple
images as user need and select each grid as a password for
an image. If you click finish your password willbestoredand
account will be registered.
6.2 Authentication using existing graphical
authentication:
While login the user is provided with the login
indicator (temporary password). The login indicator is only
visible while holding the proximity sensor of the user device
and the holding the screen in circle image. Now the user is
provided with the login indicator, here the user now
displayed with the gridded password image with movable
horizontal alphabetic bar and movable vertical numeric bar.
Your login indicator will be in the form of A6. In vertical
and horizontal bar, the alphabets and numeric valueswillbe
mismatch in order. The user can move the bar values by
using navigation keys provided bellow. By moving the user
should move the value A vertically straight to the password
grid. And move value 6 horizontal straight to the password
grid. And press OK the grid will be authenticated. And user
provided with next image and new login indicator. After
completing all image authentications, if the entered is
correct your services will be provided.
6.3 Authentication using proposed graphical
authentication:
Our proposed idea of login gives you the user-
friendly authentication system. The system provides the
login indicator from the numeric values 0 to 9. Using the
proximity sensor and holding the screen using hands to see
the indicator to avoid the shoulder surfing attack. After
seeing the indicator, the user moves to the authentication
activity, there the image uploaded by the user will be loaded
and above the image the numeric numbers will scattered
throughout the screen. If you touch the single numeric value
and drag it. The whole scattered numbers will be moved
with respective to the numeric value that you are dragging.
You can drag any of the number and you should place your
indicator on the image password position you selected
during registration.
6.4 Forget password and recovering module:
In forget password and recovery module, we
achieve this using an innovative idea of security questions
about the user handset such ascharging percentage in last 2
days. Have you used camera in last two days? And have you
installed any of the application. We concentrate on the log
files (camera, battery usage, calendar information, call log,
installed applications) of the user mobile and frame the
questions based on that.
6.5 Banking services:
The banking services we provide are called virtual money
concept, initially the user credited with rupees and if user is
in need to transfer the money to some otheraccounttheuser
go to his withdrawal and enter the amount to transfer. The
voucher id generated for the amount you entered. You can
share the voucher id to the particular user. He moves to the
deposit link and enter the voucher id given by you. The
amount will be DEBITED from your account and CREDITED
to depositor account.
7. WORK IMPLEMENTATION
Create more number of users and each user must have a
separate login id and password. ImplementedtheHMACand
BASE64 algorithm for authentication. Password recovered
by using mobile verification through SMS.
7.1 BASE64 ALGORITHM
A keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic
hash functions. HMAC can be used with any iterative
Approved cryptographic hash function, in combinationwith
a shared secret key. The cryptographic strength of HMAC
depends on the properties of the underlying hash function.
The HMAC specification in this standard is a generalization
of Internet RFC 2104, HMAC, Keyed-Hashing for Message
Authentication, and ANSI X9.71, Keyed Hash Message
Authentication Code.
Base64 encoding takes the original binary data andoperates
on it by dividing it into tokens of three bytes. A byte consists
of eight bits, so Base64 takes 24bits in total. These 3 bytes
are then converted into four printable characters from the
ASCII standard. The first step is to take the three bytes
(24bit) of binary data and split it into four numbers of six
bits. Because the ASCII standard defines the use of seven
bits, Base64 only uses 6 bits (corresponding to 2^6 = 64
characters) to ensure the encoded data isprintableandnone
of the special characters available in ASCII are used. The
algorithm's name Base64 comes from the use of these 64
ASCII characters. The ASCII characters used for Base64 are
the numbers 0-9, the alphabets 26 lowercase and 26
uppercase characters plus two extra characters '+' and '/'.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 412
8. SCREENSHOTS
Fig 8.1 CONNECTION
Fig 8.2 REGISTER
Fig 8.3 Login
9. CONCLUSION AND ENHANCEMENT
The efficient banking application to inject the account
password to the server in the indirect manner using some
temporary login indicator in the user interactive manner.
And effective banking service using the virtual money
concept. Securing the bank accountwhileenteringthewrong
password frequently, by blocking account. And the
innovative idea of forget password and recover module.
Proposed model provides the user friendly and the
interactive environment for the user. The efficient and the
innovative banking service provided for the authentication
system. The forget password module is designed with an
innovative idea. Based on idea of framing forget password
questions on the user’s handheld device. Blocking the user
account if wrong password injected to the server frequently
and intimate the user through Email and user’s alternative
mobile number via SMS about current locationofthemobile.
10. REFERENCES
[1] S. Sood, A. Sarje, and K. Singh, “Cryptanalysisofpassword
authentication schemes: Current status and key issues,” in
Methods and Models in Computer Science, 2009. ICM2CS
2009. Proceeding of International Conference on, Dec 2009,
pp. 1–7.
[2] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical
password authentication: Cloud securing scheme,” in
Electronic Systems, Signal Processing and Computing
Technologies(ICESC), 2014 International Conferenceon,Jan
2014, pp. 479–483.
1[3] K. Gilhooly, “Biometrics: Getting back to business,”
Computerworld, May, vol. 9, 2005.
[4] R. Dhamija and A. Perrig, “Deja vu: A user study using
images for authentication,” in Proceedings of the 9th
conference on USENIX Security Symposium-Volume 9.
USENIX Association, 2000, pp. 4–4.
[5] A. De Angeli, M. Coutts, L. Coventry, G. Johnson, D.
Cameron, and M. Fischer, “Vip: a visual approach to user
authentication,” in Proceedings of the Working Conference
on Advanced Visual Interfaces. ACM, 2002, pp. 316–323.
[6] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin,
“The design and analysis of graphical passwords,” in
Proceedings of the 8th conference on USENIX Security
Symposium-Volume 8. USENIX Association, 1999, pp. 1–1
[7] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N.
Memon, “Passpoints: Design and longitudinal evaluationofa
graphical password system,” International Journal of
Human-Computer Studies, vol. 63, no. 1-2, pp. 102–127,
2005.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 413
[8] A. Paivio, T. Rogers, and P. Smythe, “Why are pictures
easier torecall than words?” Psychonomic Science, 1968.
[9] D. Nelson, U. Reed, and J. Walling, “Picture superiority
effect,” Journal of ExperimentalPsychology:HumanLearning
and Memory, vol. 3, pp. 485–497, 1977.
[10] S. Brostoff and M. Sasse, “Are passfaces more usable
than passwords? a field trial investigation,” PEOPLE AND
COMPUTERS, pp. 405–424, 2000.
BIOGRAPHIES
Ms. J. ABIRAMI
Pursuing degree in Information
Technology at Jeppiaar SRR
Engineering college, Chennai,
Tamil Nadu.
Ms. P. I. NISHITHA
Pursuing degree in Information
Technology at Jeppiaar SRR
Engineering college, Chennai,
Tamil Nadu

More Related Content

What's hot

A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
 
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET Journal
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET Journal
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication SystemIRJET Journal
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protectionMigrant Systems
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
 

What's hot (20)

A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
 
IRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification SystemIRJET- A Shoulder Surfing Resistant Graphical Verification System
IRJET- A Shoulder Surfing Resistant Graphical Verification System
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication System
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
Dm36678681
Dm36678681Dm36678681
Dm36678681
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
 

Similar to IRJET- A Shoulder Surfing Resistance using HMAC Algorithm

IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...IRJET Journal
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...IRJET Journal
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATIONA REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATIONIRJET Journal
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 

Similar to IRJET- A Shoulder Surfing Resistance using HMAC Algorithm (20)

IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...IRJET-  	  Multi-Factor Authentication based on Game Mode for Android Applica...
IRJET- Multi-Factor Authentication based on Game Mode for Android Applica...
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATIONA REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
A REVIEW ON CANCELABLE BIOMETRIC AUTHENTICATION
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

IRJET- A Shoulder Surfing Resistance using HMAC Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 409 A SHOULDER SURFING RESISTANCE USING HMAC ALGORITHM Mrs. L.K. Shoba1, Ms. P.I. Nishitha2, Ms. J. Abirami3 1 Assistant professor, Department of Information Technology, Jeppiaar Engineering College, Chennai, Tamil Nadu, India. 2, 3 Department of Information Technology, Jeppiaar Engineering College, Chennai, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as” the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, the user is provided with the two-optional authentication system for the user using HMAC and base64 algorithm. The forget password module is designed with an innovative idea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through Email and user’s alternative mobile number via SMS about current location of the mobile. Key Words: Graphical Passwords, Authentication, Shoulder Surfing Attack. 1. INTRODUCTION Textual passwords have been the most widely used authentication method for decades. Comprised of numbers and upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. Image-based passwords are vulnerable to shoulder surfing attacks (SSAs). This type of attack either uses direct observation, such as watching over someone’s shoulder or applies video capturing techniques to get passwords, PINs, or other sensitive personal information. To provides authentication by blocking the user account if wrong password injected to the server frequently but recover password using SMS verification. 2. LITERATURE SURVEY 2.1 Cryptanalysis of passwordauthenticationschemes: Current status and key issues In this paper, we presented the survey of all currently available password based authentication schemes and classified them in terms of several crucial criteria. This study will help in developing different password based authentication techniques, which are not vulnerable to different attack scenarios. Two and three party key exchange protocols require secure authentication mechanism for achieving the required goalsand satisfying the security requirements of an ideal password based authentication scheme. Smart cards, which are used in financial transactions, require highlysecureauthentication protocols. 2.2 Graphical Password Authentication: Cloud Securing Scheme In this paper we are representing the authentication given to cloud by using graphical password. We have proposed cloudwith graphical security by meansofimagepassword. We are providing one of the algorithmswhicharebasedon selection of username and images as a password. By this paper we are trying to give set of images on the basis of alphabet series position of charactersin username. Finally cloud is provided with this graphical password authentication. 2.3 Against Spyware Using CAPTCHA in Graphical Password Scheme We propose a new scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart) that retaining the advantages of graphical password schemes, while simultaneously raising the cost of adversaries by orders of magnitude. 2.4 Covert Attention Shoulder Surfing: Human Adversaries Are More Powerful Than Expected In this paper, we show that human adversaries, even without a recording device, can be more effective at eavesdropping than expected, in particular by employing cognitive strategies and by training themselves. Our novel approach called covert attention shoulder surfing indeed can break the well known PIN entry method previously evaluated to be secure against shoulder surfing. Another contribution in this paper is the formal modelingapproach by adapting the predictive human performance modeling tool for security analysis and improvement. Wealsodevise a defense technique in the modeling paradigm to deteriorate severely the perceptual performance of the adversaries while preserving that of the user. To the best
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 410 of our knowledge, this is the first work to model and defend the new form of attack through human performance modeling. Real attack experiments and user studies are also conducted. 2. 5 S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme In this paper, we propose a Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme (S3PAS). S3PAS seamlesslyintegratesbothgraphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing, hidden-camera and spyware attacks. It can replace or coexist with conventional textual password systems without changing existing userpassword profiles. Moreover, it is immune to brute-force attacks through dynamic and volatile session passwords. S3PAS shows significant potential bridging the gap between conventional textual password and graphical password. Further enhancements of S3PAS scheme are proposed and briefly discussed. Theoretical analysis of the security level using S3PAS is also investigated 3. EXISTING SYSTEM The Existing system the users upload or select the pre- defined image that provided by the server as a password image. If user selected the image as password the server process with the image and split the passwordimageto7x11 grids and display all grid images to the user, and user select the single grid as a password grid for the particular image. And user upload with multiple images as user need and select each grid as a password for an image. And while login the user is provided with the login indicator (temporary password). The login indicator is only visible while holding the proximity sensor of the user device and the holding the screen in circle image. Now the user is provided with the login indicator, here the user now displayedwiththegridded password image with movable horizontal alphabeticbarand movable vertical numeric bar. Your login indicator will be in the form of A6. In vertical and horizontal bar, the alphabets and numeric valueswill be mismatchinorder.The user can move the bar values by using navigation keys provided bellow. By moving the user should move the value A vertically straight to the password grid. And move value 6 horizontal straight to the password grid. And press OK the grid will be authenticated. And user provided with next image with new login indicator. User shouldauthenticatethe images till the last image provided by the user will registration. 4. PROPOSED SYSTEM In our system, we are providing authentication by two optional authentication systems for the user (one is the existing and another model is proposed by us). Proposed model provides the user friendly and the interactive environment for the user. The efficient and the innovative banking service provided for the authentication system.The forget password module is designed with an innovativeidea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through e-mail and user’s alternative mobile number via SMS about current location of the mobile. 5. BLOCK DIAGRAM Fig.5.1. Architecture diagram of shoulder surfing resistance using HMAC algorithm. 6. MODULES 1. Account creation and registering your password. 2. Authentication using existing graphical authentication. 3. Authentication using proposed graphical authentication. 4. Forget password and recovering module 5. Banking services. 6.1 Account creation and registering your password: The users register the account with providing the user information and the optional mobile number and the email to make alert about your account in some extremecases.The
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 411 users upload or select the pre-defined image that provided by the server as a password image. If user selectedtheimage as password the server process with the image and split the password image to 7x11 grids and display all grid images to the user, and user select the single grid as a password grid for the particular image. And user upload with multiple images as user need and select each grid as a password for an image. If you click finish your password willbestoredand account will be registered. 6.2 Authentication using existing graphical authentication: While login the user is provided with the login indicator (temporary password). The login indicator is only visible while holding the proximity sensor of the user device and the holding the screen in circle image. Now the user is provided with the login indicator, here the user now displayed with the gridded password image with movable horizontal alphabetic bar and movable vertical numeric bar. Your login indicator will be in the form of A6. In vertical and horizontal bar, the alphabets and numeric valueswillbe mismatch in order. The user can move the bar values by using navigation keys provided bellow. By moving the user should move the value A vertically straight to the password grid. And move value 6 horizontal straight to the password grid. And press OK the grid will be authenticated. And user provided with next image and new login indicator. After completing all image authentications, if the entered is correct your services will be provided. 6.3 Authentication using proposed graphical authentication: Our proposed idea of login gives you the user- friendly authentication system. The system provides the login indicator from the numeric values 0 to 9. Using the proximity sensor and holding the screen using hands to see the indicator to avoid the shoulder surfing attack. After seeing the indicator, the user moves to the authentication activity, there the image uploaded by the user will be loaded and above the image the numeric numbers will scattered throughout the screen. If you touch the single numeric value and drag it. The whole scattered numbers will be moved with respective to the numeric value that you are dragging. You can drag any of the number and you should place your indicator on the image password position you selected during registration. 6.4 Forget password and recovering module: In forget password and recovery module, we achieve this using an innovative idea of security questions about the user handset such ascharging percentage in last 2 days. Have you used camera in last two days? And have you installed any of the application. We concentrate on the log files (camera, battery usage, calendar information, call log, installed applications) of the user mobile and frame the questions based on that. 6.5 Banking services: The banking services we provide are called virtual money concept, initially the user credited with rupees and if user is in need to transfer the money to some otheraccounttheuser go to his withdrawal and enter the amount to transfer. The voucher id generated for the amount you entered. You can share the voucher id to the particular user. He moves to the deposit link and enter the voucher id given by you. The amount will be DEBITED from your account and CREDITED to depositor account. 7. WORK IMPLEMENTATION Create more number of users and each user must have a separate login id and password. ImplementedtheHMACand BASE64 algorithm for authentication. Password recovered by using mobile verification through SMS. 7.1 BASE64 ALGORITHM A keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combinationwith a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code. Base64 encoding takes the original binary data andoperates on it by dividing it into tokens of three bytes. A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard. The first step is to take the three bytes (24bit) of binary data and split it into four numbers of six bits. Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensure the encoded data isprintableandnone of the special characters available in ASCII are used. The algorithm's name Base64 comes from the use of these 64 ASCII characters. The ASCII characters used for Base64 are the numbers 0-9, the alphabets 26 lowercase and 26 uppercase characters plus two extra characters '+' and '/'.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 412 8. SCREENSHOTS Fig 8.1 CONNECTION Fig 8.2 REGISTER Fig 8.3 Login 9. CONCLUSION AND ENHANCEMENT The efficient banking application to inject the account password to the server in the indirect manner using some temporary login indicator in the user interactive manner. And effective banking service using the virtual money concept. Securing the bank accountwhileenteringthewrong password frequently, by blocking account. And the innovative idea of forget password and recover module. Proposed model provides the user friendly and the interactive environment for the user. The efficient and the innovative banking service provided for the authentication system. The forget password module is designed with an innovative idea. Based on idea of framing forget password questions on the user’s handheld device. Blocking the user account if wrong password injected to the server frequently and intimate the user through Email and user’s alternative mobile number via SMS about current locationofthemobile. 10. REFERENCES [1] S. Sood, A. Sarje, and K. Singh, “Cryptanalysisofpassword authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1–7. [2] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies(ICESC), 2014 International Conferenceon,Jan 2014, pp. 479–483. 1[3] K. Gilhooly, “Biometrics: Getting back to business,” Computerworld, May, vol. 9, 2005. [4] R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4. [5] A. De Angeli, M. Coutts, L. Coventry, G. Johnson, D. Cameron, and M. Fischer, “Vip: a visual approach to user authentication,” in Proceedings of the Working Conference on Advanced Visual Interfaces. ACM, 2002, pp. 316–323. [6] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proceedings of the 8th conference on USENIX Security Symposium-Volume 8. USENIX Association, 1999, pp. 1–1 [7] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design and longitudinal evaluationofa graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102–127, 2005.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 413 [8] A. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier torecall than words?” Psychonomic Science, 1968. [9] D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of ExperimentalPsychology:HumanLearning and Memory, vol. 3, pp. 485–497, 1977. [10] S. Brostoff and M. Sasse, “Are passfaces more usable than passwords? a field trial investigation,” PEOPLE AND COMPUTERS, pp. 405–424, 2000. BIOGRAPHIES Ms. J. ABIRAMI Pursuing degree in Information Technology at Jeppiaar SRR Engineering college, Chennai, Tamil Nadu. Ms. P. I. NISHITHA Pursuing degree in Information Technology at Jeppiaar SRR Engineering college, Chennai, Tamil Nadu