SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 414
Survey on Shoulder Surfing Resistant Pin Entry by Using Base Pin and
Base Text
Mr.C. Senthil Kumar1, Ms.T. Abinaya2, Ms.G. Jaisri3, Ms.V.K. Keerthi4, Ms.L. Nirmala5
1Associate Professor, Dept. of ECE, Dr.NGP Institute of Technology, Coimbatore, TamilNadu, India
2,3,4,5 Student, Dept. of ECE, Dr.NGP Institute of Technology, Coimbatore, TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – People uses their same personalized
identification number (PIN) for multiple systems and in
numerous sessions. Directly by entering their PIN are highly
susceptible to shoulder-surfing attacks as others can
effectively observe PIN entry with concealed cameras. Various
PIN entry methods are proposed to achieve better
performance but that produce heavy workload for users.
Therefore to achieve high security and easy access,wepresent
a practical indirect PIN entry method called BasePinandBase
text. The human–machine interface of Base Text which is
designed to physically block shoulder surfing attacks. The
system generates a one-time PIN that can safely be entered in
plain view of attackers.
Key Words: RFID System, Microcontroller, GSM, PIN,
Password, Shoulder surfing, ATM.
1. INTRODUCTION
The main objective of this system is to develop a secure
ATM in future. In general, all the keypad based
authentication system having several possibilities of
password guessing by means of shoulder movements.
Shoulder-surfing is an attack on password by unauthorized
persons which is hard to detect for the past decades. This
problem has come up with a new solution by using base text
which will display in the screen, with the generated words
that will be added to the original pin. Another way is to
develop with the GSM application between the user and
Automated Teller Machine counter for communicating a
password via the wireless medium.
2. LITERATURE SURVEY
KAI CAO [1] presents standard targets are typically used
for structural (white-box) evaluation of fingerprint readers.
However, there is no standard method for behavioral(black-
box) evaluation of fingerprint readersinoperationalsettings
where variations in finger placement by the user are
encountered. The goal of the research is to design and
fabricate 3D targets for repeatable behavioral evaluation of
fingerprint readers. 2D calibration patterns with known
characteristics (e.g., sinusoidal gratings of pre-specified
orientation and frequency, and fingerprints with known
singular points and minutiae) are projected onto a generic
3D finger surface to create electronic 3D targets. A state-of-
the-art 3D printer (Stratasys Objet350 Connex) is used to
fabricate wearable 3D targets with materials similar in
hardness and elasticity to the human finger skin. The 3D
printed targets are cleaned using 2M NaOH solution to
obtain evaluation-ready 3D targets.
LI LU [2] states the behavioural biometrics such assliding
dynamics and pressure intensity make use of on-screen
sliding movementsto infer the user’spatterns. In this paper,
it present Safeguard, an accurate and efficient smartphone
user reauthentication (verification) system based upon on-
screen finger movements. The computation and processing
is performed at back-end which is transparent to the users.
The key feature of the proposed system lies in fine-grained
on-screen biometric metrics, i.e., sliding dynamics and
pressure intensity, which are unique to each user under
diverse scenarios. It first implement the schemethroughfive
machine learning approaches and finally select the support
vector machine (SVM)-based approach due to its high
accuracy. Further analyse Safeguard to be robust against
adversary imitation. It also validate the efficacy of our
approach through implementation on off-the-shelf
smartphone followed by practical evaluationunderdifferent
scenarios. It process a set of more than 50 000 effective
samples derived from a raw dataset of over 10 000 slides
collected from each of the 60 volunteersover a periodofone
month.
MIANXIONG DONG [3] states in mobile social networks
(MSN), with the aim of conserving limited resources,
egotistic nodes might refuse to forward messages for other
nodes. Different from previous work which mainly focuses
on promoting cooperation between selfish nodes, we
consider it from a more pragmatic perspective in this paper.
Be specific, regard selfishness as a native attribute of a
system and allow nodes to exhibit selfish behaviour in the
processof message forwarding. Apparently,selfishnesshasa
profound influence on routing efficiency, and thus novel
mechanismsare necessary to improve routing performance
when self-centred nodesare considered. First approachisto
measure encounter opportunities between nodes. Then
quantify receiving capabilities of nodes based on their
available buffer size and energy. Takingbothforwardingand
receiving capabilities into account, they finally present a
forwarding set mechanism, which could be deduced to a
multiple knapsack problem to maximize the forwarding
profit.. In fact, it chives a surprisingly high routing
performance while consumes low transmission cost and
resource in MSN.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 415
JIN HONG [4] presents a user authentication scheme
based on personal identification numbers(PINs) thatisboth
secure and practically usable is a challenging problem. The
most difficulty lies with the susceptibility of the PIN entry
process to direct observational attacks, such as human
shoulder-surfing and camera-based recording. The paper
starts with an examination of a previous attempt at solving
the PIN entry problem, which was based on an elegant
adaptive black-and-white colouring of the10-digitkeypadin
the standard layout. Even though the method required
uncomfortably many user inputs, it had the merit of being
easy to understand and use. Our analysisthat takes both the
experimental and theoretical approaches reveals multiple
serious shortcomings of the previous method, including
round redundancy, unbalanced key presses, highly frequent
system errors, and insufficient resilience to recording
attacks. The lessons learned through our analysis are then
used to improve the black and white PIN entry scheme.
NAPA SAE-BAE [5] studies a simple and effective
method for signature verification. An online signature is
represented with a discriminative feature vector derived
from attributes of several histograms that can be computed
in linear time and requires constant space. This was first
tested on the well-known MCYT-100 and SUSIG data sets.
The results show that the performance of the proposed
technique is comparable and often superior to state-of-the-
art algorithms despite its simplicity and efficiency.Bytesting
the proposed method a data set was collected from an
uncontrolled environment and over multiple sessions.
Experimental results on this data set confirm the
effectiveness of the proposed algorithm in mobile settings.
The results demonstrate the problem of within-user
variation of signatures across multiple sessions and the
effectiveness of cross session training strategies to alleviate
these problems.
KATHERINE ISBISTER [6] investigates on multitouch
gestures on touch sensitive devices. A canonical set of 22
multitouch gestures was defined using characteristics of
hand and finger movement. Then, a multitouch gesture
matching algorithm was developed. Two different studies
were performed to evaluate the concept. The experiment
was performed in order to explore feasibility of multitouch
gestures for user authentication. In addition, the tests
demonstrated a desirable alignment of usabilityandsecurity
as gestures that were more secure from a biometric point of
view were rated as more desirable in termsofease,pleasure,
and excitement. Second, a study involving a three-session
experiment was performed. Results indicate that biometric
information gleaned from a short user-device interaction
remains consistent acrossgapsof several days, thoughthere
is noticeable degradation of performance when the
authentication is performed over multiple sessions. In
addition, it shows that user-defined gestures yield the
highest recognition rate among all other gestures.
XI ZHAO [7] states behavioural biometrics have recently
begun to gain attention for mobile user authentication. The
feasibility of touch gestures as a novel modality for
behavioural biometrics has been investigated. Here they
proposed to apply a statistical touch dynamicsimagetrained
from graphic touch gesture featuresto retain discriminative
power for user authentication while significantly reducing
computational time during online authentication.Systematic
evaluation and comparisons with state-of-the-art methods
have been performed on touch gesture data sets.
Implemented as an Android App, the usability and
effectiveness of the proposed method have also been
evaluated.
TAEKYOUNG KWON [8] stateswhen a user interacts with
a computing system shoulder surfing attacks are of great
concern. Previous methods presumed limited cognitive
capabilities of a human adversary as a deterrent, but there
was a drawback. He shows that human adversaries, even
without a recording device, can be more effective at
eavesdropping than expected, in particular by employing
cognitive strategies and by training themselves. This
approach called covert attentional shoulder surfing indeed
can break the well known PIN entry method previously
evaluated to be secure against shoulder surfing. Another
contribution in the paper is the formal modelling approach
by adapting the predictive human performance modelling
tool for security analysis and improvement.
VENUGOPAL V. VEERAVALL [9] presents classical
problem of quickest change detection is studied with an
additional constraint on the cost of observations used in the
detection process. The change point is modelled as an
unknown constant, and minimax formulations areproposed
for the problem. The objective in these formulations is to
find a stopping time and an ON–OFF observation control
policy for the observation sequence, to minimizeaversionof
the worst possible average delay, subject to constraints on
the false alarm rate and the fraction of time observationsare
taken before change. An algorithm called DE-Cu Sum is
proposed and is shown to be asymptotically optimal for the
proposed formulations, as the false alarm rate goes to zero.
Numerical results are used to show that the DE-Cu Sum
algorithm asgood trade off curvesandperformssignificantly
better than the approach of fractional sampling,inwhichthe
observations are skipped using the outcomeofasequenceof
coin tosses, independent of the observation process. This
study is guided by the insights gained from an earlier study
of a Bayesian version of this problem.
ALEX C. KOT [10] propose here a novel system for
protecting fingerprint privacy by combining two different
fingerprints into a new identity. In the enrollment, two
fingerprints are captured from two different fingers. It
captures positions from one fingerprint to the other
fingerprint, and the reference points from both fingerprints.
The system requires two fingerprints from the same two
fingers which are used for the authentication. A two-stage
fingerprint matching process will match the two query
fingerprints against a combined minutiae template. The
complete feature of a single fingerprint will not be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 416
compromised when the database is stolen. Furthermore,
because of the similarity in topology, it is difficult for the
attacker to distinguish a combined minutiae template from
the original minutiae templates. They are able to convertthe
combined fingerprints of a same person intoareal-lookalike
combined fingerprint. Finally, a new virtual identity is
created for the two different fingerprints, which can be
matched using minutiae-based finger print matching
algorithms.
JOSEPH A. O’SULLIVAN [11] states in the recent
advancement, the electrocardiogram (ECG) is an trending
biometric modality and as such deservesasystematicreview
and discussion of the associated methods and findings.They
reviewed most of the techniques that have been applied to
the use of the electrocardiogram for biometric recognition.
In particular, they categorize themethodologiesbasedonthe
features and the classification schemes. Finally, a
comparative analysis of the authentication performanceofa
few of the ECG biometric systems is presented, using our
inhouse database. The comparative study includesthe cases
where training and testing data come from the same and
different sessions (days). The authentication results show
that most of the algorithms that have been proposed for
ECG-based biometrics perform well when the training and
testing data come from the same session. However, when
training and testing data come from different sessions, a
performance degradation occurs. Multiple training sessions
were incorporated to diminish the lossin performance.That
notwithstanding, only a few of the proposedECGrecognition
algorithms appear to be able to support performance
improvement due tomultiple training sessions. Bydoingthe
investigation they found only three of the algorithms
produced equal error rates (EERs) in the single digits,
including an EER of 5.5%using a method proposed by them.
PATRIZIO CAMPISI [12] presents Data security and
privacy are crucial issues to be addressed for assuring a
successful deployment of biometrics-based recognition
systems in real life applications. In this paper, a template
protection scheme exploiting the properties of universal
background models, eigen-user spaces, and the fuzzy
commitment cryptographic protocol is presented.Adetailed
discussion on the security and information leakage of the
proposed template protection system is given. The
effectiveness of the proposed approach is investigated with
application to online signature recognition. The given
experimental results, evaluated on the public MCYT
signature database, show that the proposed system can
guarantee competitive recognition accuracywhileproviding
protection to the employed biometric data.
HAIYING SHEN [13] states in mobile ad hoc networks
(MANETs), tasks are conducted based on the cooperation of
nodesin the networks. However, since the nodes are usually
constrained by limited computation resources, selfishnodes
may refuse to be cooperative. Reputation systemsandprice-
based systems are two main solutions to the node non
cooperation problem. A reputation system evaluates node
behaviours by reputation values and uses a reputation
threshold to distinguish trustworthy nodes and
untrustworthy nodes. The transactions of a packet
forwarding service. is generally controlled by using virtual
cash, literally a price based system. Althoughthesetwokinds
of systems have been widely used, very little research has
been devoted to investigating the effectiveness of the node
cooperation incentives provided by the systems. Here they
used game theory to analyse the cooperation incentives
provided by the two systems. They find that the strategiesof
using a threshold to determine the trustworthinessofanode
in the reputation system and of rewardingcooperativenodes
in the price-based system may be manipulated by clever or
wealthy but selfish nodes. Illumined by the investigation
results, we propose and study an integrated system.
Theoretical and simulation results show the superiority of
the integrated system over an individual reputation system
and a price-based system in terms of the effectiveness of
cooperation incentives and selfish node detection.
VISHAL M PATEL[14]presents a solution thatreferstothe
problem of continuously verifying the identity of an user for
the purpose of securing the device with the help of Active
authentication (AA). They address the problem of quickly
detecting intrusions with lower false detection rates in
mobile AA systems with higher resource efficiency. The
Quickest Change Detection (QCD) algorithms for the
detection which quickly detect intrusions in mobile AA
systems is by Bayesian and Minimax versions. The following
algorithmsare extended with an update rule to facilitatelow
frequency sensing which leads to low utilization of
resources. The proposed framework effectiveness is
demonstrated using three publicly available unconstrained
face and touch gesture based AA datasets. It is shown that
the proposed QCD-based intrusion detection methods can
perform better than many state of- the-art AA methods in
terms of latency and low false detection rates.
3. CONCLUSIONS
This project is made with pre planning, that it provides
flexibility in operation. This innovation has made the more
desirable and economical. This project “ATM SHOULDER-
SURFING RESISTANT PIN ENTRY BY USING BASE PIN AND
BASE TEXT” is designed with the hope that it is very much
economical and help full to security purpose for banking
sector, ATM center, hotels and shopping etc.. This project
helped usto know the periodic stepsin completing a project
work. Thus we have completed the project successfully.
REFERENCES
[1] T. Kwon, S. Shin, and S. Na, “Covert attentional
shoulder surfing: Human adversaries are more
powerful than expected,” IEEE Trans. Syst., Man,
Cybern., Syst., vol. 44, no. 6, pp. 716–727, Jan. 2014.
[2] N. Sae-Bae, N. Memon, K. Isbister, and K. Ahmed,
“Multitouch gesture based authentication,” IEEE
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 417
Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 568–
582, Apr. 2014.
[3] D. Guru and H. Prakash, “Online signature
verification and recognition: An approach based on
symbolic representation,” IEEE Trans. PatternAnal.
Mach. Intell., vol. 31, no. 6, pp. 1059–1073, Jun.
2009.
[4] E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia,
and A. Neri, “Cancelable templates for sequence-
based biometrics with application to on-line
signature recognition,” IEEE Trans. Syst., Man,
Cybern. A, Syst., Humans, vol. 40, no. 3,pp.525–538,
May 2010.
[5] E. Argones Rua, E. Maiorana, J. Alba Castro, and P.
Campisi, “Biometric template protection using
universal background models: An application to
online signature,” IEEE Trans. Inf. Forensics
Security, vol. 7, no. 1, pp. 269–282, Feb. 2012
[6] U. Park, R. R. Jillela, A. Ross, and A. K. Jain,
“Periocular biometrics in the visible spectrum,”
IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp.
96–106, Mar. 2011
[7] E. A. Rua, E. Maiorana, J. A. Castro, and P. Campisi,
“Biometric template protection using universal
background models: An application to online
signature,” IEEE Trans. Inf. Forensics Security, vol.
7, no. 1, pp. 269–282, Feb. 2012.
[8] X. Zhao, T. Feng, W. Shi, and I. Kakadiaris, “Mobile
user authentication using statisticaltouchdynamics
images,” IEEE Transactions on Information
Forensics and Security, vol. 9, no. 11, pp. 1780–
1789, Nov 2014.
[9] T. Banerjee and V. Veeravalli, “Data-efficient
quickest change detection in minimax settings,”
IEEE Transactions on Information Theory,pp.6917
– 6931, Oct 2013
[10] K. Wei et al., “Camf: Context-awaremessage
forwarding in selfish mobile social networks,” IEEE
Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp.2178–
2187, Aug. 2014.

More Related Content

What's hot

IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
IRJET Journal
 
76201902
7620190276201902
76201902
IJRAT
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
Vijay Karan
 
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET Journal
 
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET Journal
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
Vijay Karan
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
International Center for Biometric Research
 
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
ijtsrd
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
eSAT Journals
 
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsA-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsArindam Paul
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
IJCNCJournal
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ijaia
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...
Conference Papers
 
smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identificationSebastian W. Cheah
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
International Center for Biometric Research
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
eSAT Journals
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149
moemi1
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
International Journal of Science and Research (IJSR)
 

What's hot (20)

IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
 
370 374
370 374370 374
370 374
 
76201902
7620190276201902
76201902
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
IRJET- Sentiment Analysis to Segregate Attributes using Machine Learning Tech...
 
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsA-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...
 
smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identification
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 

Similar to IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin and Base Text

IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET Journal
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural Network
IRJET Journal
 
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine LearningEmployment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET Journal
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
IRJET Journal
 
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
IRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
IRJET Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET Journal
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verification
IRJET Journal
 
IRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social WebIRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social Web
IRJET Journal
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
 
GaitProjectProposal
GaitProjectProposalGaitProjectProposal
GaitProjectProposalVivek Kumar
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
INFOGAIN PUBLICATION
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
Vijay Karan
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
IRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
 
Performance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of DocumentsPerformance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of Documents
IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
 

Similar to IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin and Base Text (20)

IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
Human Activity Recognition Using Neural Network
Human Activity Recognition Using Neural NetworkHuman Activity Recognition Using Neural Network
Human Activity Recognition Using Neural Network
 
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine LearningEmployment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verification
 
IRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social WebIRJET- Cross System User Modeling and Personalization on the Social Web
IRJET- Cross System User Modeling and Personalization on the Social Web
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
GaitProjectProposal
GaitProjectProposalGaitProjectProposal
GaitProjectProposal
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Performance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of DocumentsPerformance Analysis and Parallelization of CosineSimilarity of Documents
Performance Analysis and Parallelization of CosineSimilarity of Documents
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin and Base Text

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 414 Survey on Shoulder Surfing Resistant Pin Entry by Using Base Pin and Base Text Mr.C. Senthil Kumar1, Ms.T. Abinaya2, Ms.G. Jaisri3, Ms.V.K. Keerthi4, Ms.L. Nirmala5 1Associate Professor, Dept. of ECE, Dr.NGP Institute of Technology, Coimbatore, TamilNadu, India 2,3,4,5 Student, Dept. of ECE, Dr.NGP Institute of Technology, Coimbatore, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – People uses their same personalized identification number (PIN) for multiple systems and in numerous sessions. Directly by entering their PIN are highly susceptible to shoulder-surfing attacks as others can effectively observe PIN entry with concealed cameras. Various PIN entry methods are proposed to achieve better performance but that produce heavy workload for users. Therefore to achieve high security and easy access,wepresent a practical indirect PIN entry method called BasePinandBase text. The human–machine interface of Base Text which is designed to physically block shoulder surfing attacks. The system generates a one-time PIN that can safely be entered in plain view of attackers. Key Words: RFID System, Microcontroller, GSM, PIN, Password, Shoulder surfing, ATM. 1. INTRODUCTION The main objective of this system is to develop a secure ATM in future. In general, all the keypad based authentication system having several possibilities of password guessing by means of shoulder movements. Shoulder-surfing is an attack on password by unauthorized persons which is hard to detect for the past decades. This problem has come up with a new solution by using base text which will display in the screen, with the generated words that will be added to the original pin. Another way is to develop with the GSM application between the user and Automated Teller Machine counter for communicating a password via the wireless medium. 2. LITERATURE SURVEY KAI CAO [1] presents standard targets are typically used for structural (white-box) evaluation of fingerprint readers. However, there is no standard method for behavioral(black- box) evaluation of fingerprint readersinoperationalsettings where variations in finger placement by the user are encountered. The goal of the research is to design and fabricate 3D targets for repeatable behavioral evaluation of fingerprint readers. 2D calibration patterns with known characteristics (e.g., sinusoidal gratings of pre-specified orientation and frequency, and fingerprints with known singular points and minutiae) are projected onto a generic 3D finger surface to create electronic 3D targets. A state-of- the-art 3D printer (Stratasys Objet350 Connex) is used to fabricate wearable 3D targets with materials similar in hardness and elasticity to the human finger skin. The 3D printed targets are cleaned using 2M NaOH solution to obtain evaluation-ready 3D targets. LI LU [2] states the behavioural biometrics such assliding dynamics and pressure intensity make use of on-screen sliding movementsto infer the user’spatterns. In this paper, it present Safeguard, an accurate and efficient smartphone user reauthentication (verification) system based upon on- screen finger movements. The computation and processing is performed at back-end which is transparent to the users. The key feature of the proposed system lies in fine-grained on-screen biometric metrics, i.e., sliding dynamics and pressure intensity, which are unique to each user under diverse scenarios. It first implement the schemethroughfive machine learning approaches and finally select the support vector machine (SVM)-based approach due to its high accuracy. Further analyse Safeguard to be robust against adversary imitation. It also validate the efficacy of our approach through implementation on off-the-shelf smartphone followed by practical evaluationunderdifferent scenarios. It process a set of more than 50 000 effective samples derived from a raw dataset of over 10 000 slides collected from each of the 60 volunteersover a periodofone month. MIANXIONG DONG [3] states in mobile social networks (MSN), with the aim of conserving limited resources, egotistic nodes might refuse to forward messages for other nodes. Different from previous work which mainly focuses on promoting cooperation between selfish nodes, we consider it from a more pragmatic perspective in this paper. Be specific, regard selfishness as a native attribute of a system and allow nodes to exhibit selfish behaviour in the processof message forwarding. Apparently,selfishnesshasa profound influence on routing efficiency, and thus novel mechanismsare necessary to improve routing performance when self-centred nodesare considered. First approachisto measure encounter opportunities between nodes. Then quantify receiving capabilities of nodes based on their available buffer size and energy. Takingbothforwardingand receiving capabilities into account, they finally present a forwarding set mechanism, which could be deduced to a multiple knapsack problem to maximize the forwarding profit.. In fact, it chives a surprisingly high routing performance while consumes low transmission cost and resource in MSN.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 415 JIN HONG [4] presents a user authentication scheme based on personal identification numbers(PINs) thatisboth secure and practically usable is a challenging problem. The most difficulty lies with the susceptibility of the PIN entry process to direct observational attacks, such as human shoulder-surfing and camera-based recording. The paper starts with an examination of a previous attempt at solving the PIN entry problem, which was based on an elegant adaptive black-and-white colouring of the10-digitkeypadin the standard layout. Even though the method required uncomfortably many user inputs, it had the merit of being easy to understand and use. Our analysisthat takes both the experimental and theoretical approaches reveals multiple serious shortcomings of the previous method, including round redundancy, unbalanced key presses, highly frequent system errors, and insufficient resilience to recording attacks. The lessons learned through our analysis are then used to improve the black and white PIN entry scheme. NAPA SAE-BAE [5] studies a simple and effective method for signature verification. An online signature is represented with a discriminative feature vector derived from attributes of several histograms that can be computed in linear time and requires constant space. This was first tested on the well-known MCYT-100 and SUSIG data sets. The results show that the performance of the proposed technique is comparable and often superior to state-of-the- art algorithms despite its simplicity and efficiency.Bytesting the proposed method a data set was collected from an uncontrolled environment and over multiple sessions. Experimental results on this data set confirm the effectiveness of the proposed algorithm in mobile settings. The results demonstrate the problem of within-user variation of signatures across multiple sessions and the effectiveness of cross session training strategies to alleviate these problems. KATHERINE ISBISTER [6] investigates on multitouch gestures on touch sensitive devices. A canonical set of 22 multitouch gestures was defined using characteristics of hand and finger movement. Then, a multitouch gesture matching algorithm was developed. Two different studies were performed to evaluate the concept. The experiment was performed in order to explore feasibility of multitouch gestures for user authentication. In addition, the tests demonstrated a desirable alignment of usabilityandsecurity as gestures that were more secure from a biometric point of view were rated as more desirable in termsofease,pleasure, and excitement. Second, a study involving a three-session experiment was performed. Results indicate that biometric information gleaned from a short user-device interaction remains consistent acrossgapsof several days, thoughthere is noticeable degradation of performance when the authentication is performed over multiple sessions. In addition, it shows that user-defined gestures yield the highest recognition rate among all other gestures. XI ZHAO [7] states behavioural biometrics have recently begun to gain attention for mobile user authentication. The feasibility of touch gestures as a novel modality for behavioural biometrics has been investigated. Here they proposed to apply a statistical touch dynamicsimagetrained from graphic touch gesture featuresto retain discriminative power for user authentication while significantly reducing computational time during online authentication.Systematic evaluation and comparisons with state-of-the-art methods have been performed on touch gesture data sets. Implemented as an Android App, the usability and effectiveness of the proposed method have also been evaluated. TAEKYOUNG KWON [8] stateswhen a user interacts with a computing system shoulder surfing attacks are of great concern. Previous methods presumed limited cognitive capabilities of a human adversary as a deterrent, but there was a drawback. He shows that human adversaries, even without a recording device, can be more effective at eavesdropping than expected, in particular by employing cognitive strategies and by training themselves. This approach called covert attentional shoulder surfing indeed can break the well known PIN entry method previously evaluated to be secure against shoulder surfing. Another contribution in the paper is the formal modelling approach by adapting the predictive human performance modelling tool for security analysis and improvement. VENUGOPAL V. VEERAVALL [9] presents classical problem of quickest change detection is studied with an additional constraint on the cost of observations used in the detection process. The change point is modelled as an unknown constant, and minimax formulations areproposed for the problem. The objective in these formulations is to find a stopping time and an ON–OFF observation control policy for the observation sequence, to minimizeaversionof the worst possible average delay, subject to constraints on the false alarm rate and the fraction of time observationsare taken before change. An algorithm called DE-Cu Sum is proposed and is shown to be asymptotically optimal for the proposed formulations, as the false alarm rate goes to zero. Numerical results are used to show that the DE-Cu Sum algorithm asgood trade off curvesandperformssignificantly better than the approach of fractional sampling,inwhichthe observations are skipped using the outcomeofasequenceof coin tosses, independent of the observation process. This study is guided by the insights gained from an earlier study of a Bayesian version of this problem. ALEX C. KOT [10] propose here a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. It captures positions from one fingerprint to the other fingerprint, and the reference points from both fingerprints. The system requires two fingerprints from the same two fingers which are used for the authentication. A two-stage fingerprint matching process will match the two query fingerprints against a combined minutiae template. The complete feature of a single fingerprint will not be
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 416 compromised when the database is stolen. Furthermore, because of the similarity in topology, it is difficult for the attacker to distinguish a combined minutiae template from the original minutiae templates. They are able to convertthe combined fingerprints of a same person intoareal-lookalike combined fingerprint. Finally, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based finger print matching algorithms. JOSEPH A. O’SULLIVAN [11] states in the recent advancement, the electrocardiogram (ECG) is an trending biometric modality and as such deservesasystematicreview and discussion of the associated methods and findings.They reviewed most of the techniques that have been applied to the use of the electrocardiogram for biometric recognition. In particular, they categorize themethodologiesbasedonthe features and the classification schemes. Finally, a comparative analysis of the authentication performanceofa few of the ECG biometric systems is presented, using our inhouse database. The comparative study includesthe cases where training and testing data come from the same and different sessions (days). The authentication results show that most of the algorithms that have been proposed for ECG-based biometrics perform well when the training and testing data come from the same session. However, when training and testing data come from different sessions, a performance degradation occurs. Multiple training sessions were incorporated to diminish the lossin performance.That notwithstanding, only a few of the proposedECGrecognition algorithms appear to be able to support performance improvement due tomultiple training sessions. Bydoingthe investigation they found only three of the algorithms produced equal error rates (EERs) in the single digits, including an EER of 5.5%using a method proposed by them. PATRIZIO CAMPISI [12] presents Data security and privacy are crucial issues to be addressed for assuring a successful deployment of biometrics-based recognition systems in real life applications. In this paper, a template protection scheme exploiting the properties of universal background models, eigen-user spaces, and the fuzzy commitment cryptographic protocol is presented.Adetailed discussion on the security and information leakage of the proposed template protection system is given. The effectiveness of the proposed approach is investigated with application to online signature recognition. The given experimental results, evaluated on the public MCYT signature database, show that the proposed system can guarantee competitive recognition accuracywhileproviding protection to the employed biometric data. HAIYING SHEN [13] states in mobile ad hoc networks (MANETs), tasks are conducted based on the cooperation of nodesin the networks. However, since the nodes are usually constrained by limited computation resources, selfishnodes may refuse to be cooperative. Reputation systemsandprice- based systems are two main solutions to the node non cooperation problem. A reputation system evaluates node behaviours by reputation values and uses a reputation threshold to distinguish trustworthy nodes and untrustworthy nodes. The transactions of a packet forwarding service. is generally controlled by using virtual cash, literally a price based system. Althoughthesetwokinds of systems have been widely used, very little research has been devoted to investigating the effectiveness of the node cooperation incentives provided by the systems. Here they used game theory to analyse the cooperation incentives provided by the two systems. They find that the strategiesof using a threshold to determine the trustworthinessofanode in the reputation system and of rewardingcooperativenodes in the price-based system may be manipulated by clever or wealthy but selfish nodes. Illumined by the investigation results, we propose and study an integrated system. Theoretical and simulation results show the superiority of the integrated system over an individual reputation system and a price-based system in terms of the effectiveness of cooperation incentives and selfish node detection. VISHAL M PATEL[14]presents a solution thatreferstothe problem of continuously verifying the identity of an user for the purpose of securing the device with the help of Active authentication (AA). They address the problem of quickly detecting intrusions with lower false detection rates in mobile AA systems with higher resource efficiency. The Quickest Change Detection (QCD) algorithms for the detection which quickly detect intrusions in mobile AA systems is by Bayesian and Minimax versions. The following algorithmsare extended with an update rule to facilitatelow frequency sensing which leads to low utilization of resources. The proposed framework effectiveness is demonstrated using three publicly available unconstrained face and touch gesture based AA datasets. It is shown that the proposed QCD-based intrusion detection methods can perform better than many state of- the-art AA methods in terms of latency and low false detection rates. 3. CONCLUSIONS This project is made with pre planning, that it provides flexibility in operation. This innovation has made the more desirable and economical. This project “ATM SHOULDER- SURFING RESISTANT PIN ENTRY BY USING BASE PIN AND BASE TEXT” is designed with the hope that it is very much economical and help full to security purpose for banking sector, ATM center, hotels and shopping etc.. This project helped usto know the periodic stepsin completing a project work. Thus we have completed the project successfully. REFERENCES [1] T. Kwon, S. Shin, and S. Na, “Covert attentional shoulder surfing: Human adversaries are more powerful than expected,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 44, no. 6, pp. 716–727, Jan. 2014. [2] N. Sae-Bae, N. Memon, K. Isbister, and K. Ahmed, “Multitouch gesture based authentication,” IEEE
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 417 Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 568– 582, Apr. 2014. [3] D. Guru and H. Prakash, “Online signature verification and recognition: An approach based on symbolic representation,” IEEE Trans. PatternAnal. Mach. Intell., vol. 31, no. 6, pp. 1059–1073, Jun. 2009. [4] E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, “Cancelable templates for sequence- based biometrics with application to on-line signature recognition,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 3,pp.525–538, May 2010. [5] E. Argones Rua, E. Maiorana, J. Alba Castro, and P. Campisi, “Biometric template protection using universal background models: An application to online signature,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 269–282, Feb. 2012 [6] U. Park, R. R. Jillela, A. Ross, and A. K. Jain, “Periocular biometrics in the visible spectrum,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 96–106, Mar. 2011 [7] E. A. Rua, E. Maiorana, J. A. Castro, and P. Campisi, “Biometric template protection using universal background models: An application to online signature,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 269–282, Feb. 2012. [8] X. Zhao, T. Feng, W. Shi, and I. Kakadiaris, “Mobile user authentication using statisticaltouchdynamics images,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1780– 1789, Nov 2014. [9] T. Banerjee and V. Veeravalli, “Data-efficient quickest change detection in minimax settings,” IEEE Transactions on Information Theory,pp.6917 – 6931, Oct 2013 [10] K. Wei et al., “Camf: Context-awaremessage forwarding in selfish mobile social networks,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp.2178– 2187, Aug. 2014.