IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
PassBYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of PassBYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task
completion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights PassBYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. These results indicate that Pass- BYOP shows promise for security while maintaining the usability of current graphical password schemes.
Authentication Using Graphical Passwordijceronline
This paper introduces image based captcha to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with numerical password which provide more security and easy to remember text and graphical password.
Authentication plays a major role in Digital environment. In this environment we have different methods which generally use alphanumeric characters and special characters for password creation. These methods have some problems like hard to remember password because it has no meaning and easily breakable by third parties or attackers. To address these issues, many techniques for authentication are proposed from which graphical password method is best in terms of cost and usage. Basically, Graphical passwords use images for password creation and it has some demerits like hotspot and shoulder surfing problem. A persuasive cued click-point based method reduces hotspot problem. To prevent persuasive cued click-point based method from shoulder surfing we include one time password. For more user convenience we provide two login
methods one which requires internet and other which does not
require internet.
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force
attacks. However, a strong textual password is hard to memorize and recollect .Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.
Various graphical password authentication schemes
were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically.
The human actions such as choosing bad passwords for
new accounts and inputting passwords in an insecure way for later logins are regarded as the weakest link in the authentication chain [16]. Therefore, an authentication scheme should be designed to overcome these vulnerabilities.
In this paper, we present a secure graphical authentication system named Pass Matrix that protects users from becoming victims of shoulder surfing attacks when inputting passwords in public through the usage of one-time login indicators. A login indicator is randomly generated for each pass-image and will be useless after the session terminates. The login indicator provides better security against shoulder surfing attacks, since users use a dynamic pointer to point out the position of their passwords rather than clicking on
the password object directly.
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
PassBYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of PassBYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task
completion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights PassBYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. These results indicate that Pass- BYOP shows promise for security while maintaining the usability of current graphical password schemes.
Authentication Using Graphical Passwordijceronline
This paper introduces image based captcha to protect user data or unauthorized access of information. In that password is created from images and text password. Current system is based on only text password but it has disadvantages small password mostly used and easy to remember. This type of password is easy to guess through different attack i.e. dictionary attack and brute force attack. In this paper we have proposed a new image password scheme. In this Recognition based technique is used with numerical password which provide more security and easy to remember text and graphical password.
Authentication plays a major role in Digital environment. In this environment we have different methods which generally use alphanumeric characters and special characters for password creation. These methods have some problems like hard to remember password because it has no meaning and easily breakable by third parties or attackers. To address these issues, many techniques for authentication are proposed from which graphical password method is best in terms of cost and usage. Basically, Graphical passwords use images for password creation and it has some demerits like hotspot and shoulder surfing problem. A persuasive cued click-point based method reduces hotspot problem. To prevent persuasive cued click-point based method from shoulder surfing we include one time password. For more user convenience we provide two login
methods one which requires internet and other which does not
require internet.
Password prevents unauthorized access to the data and also provides high security and confidentiality. Due to
various drawbacks in text based passwords, graphical password authentication was developed as an alternative.
Graphical passwords also provide more security when compared to text based. In graphical password authentication,
users click on images to set their passwords. Images are generally easier to be remembered than text. In graphical
password authentication users can set images as their password. Caesar Cipher Technique is an encryption
technique used for secure transmission of textual data. In this paper, this technique is applied for graphical
password in order to provide enhanced security to the user.
TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force
attacks. However, a strong textual password is hard to memorize and recollect .Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.
Various graphical password authentication schemes
were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically.
The human actions such as choosing bad passwords for
new accounts and inputting passwords in an insecure way for later logins are regarded as the weakest link in the authentication chain [16]. Therefore, an authentication scheme should be designed to overcome these vulnerabilities.
In this paper, we present a secure graphical authentication system named Pass Matrix that protects users from becoming victims of shoulder surfing attacks when inputting passwords in public through the usage of one-time login indicators. A login indicator is randomly generated for each pass-image and will be useless after the session terminates. The login indicator provides better security against shoulder surfing attacks, since users use a dynamic pointer to point out the position of their passwords rather than clicking on
the password object directly.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable. Graphical password schemes are introduced as alternatives to text based schemes. Few grid based authentication techniques are also proposed. The purpose of this paper is to introduce a tool to enhance the memorability and security of passwords which also provides usability. The most popular ancient Indian board game “Snakes and Ladders” is used as a tool for authentication.
strong passwords such as alphanumeric or graphical passwords. Alphanumerical passwords are not more secure
than graphical passwords. Hackers can easily guess the password with the help of tools such as dictionary attacks.
Information security is the most important factor now a days. To provide security for the cloud we are using
graphical password authentication. Graphical password is the alternative solution for alphanumeric passwords to
provide more security. Graphical password are more secure than alphanumeric passwords. It is quite difficult for the
users to remember the alphanumeric passwords. According to psychological studies the human mind can easily
capture images than alphabets or digits. In this paper we are going to give authentication to cloud services by using
graphical password authentication. We are providing an algorithm which is based on selection of username and
images as a password. In this paper we are to trying to give set of images on the basis of alphabets sequence position
of characters in username. In this paper we will access cloud services using graphical password authentication.
A Well Known Tool Based Graphical Authentication Technique cscpconf
Authentication is the first step of information security. Authentication schemes require users to
memorize the passwords and recall them during log-in time. Traditional text-based
authentication schemes have memorability problems for secure passwords. Graphical password
schemes are introduced as alternatives to text based schemes. Many techniques have been
designed using single image or multiple images. Few grid based authentication techniques are
proposed. This paper introduces a new authentication technique based on a well known tool.
The most popular game especially in rural areas, “Snakes and Ladders” is used as a tool in
authentication technique. The usage of this tool increases the memorability and usability of
passwords.
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
Abstract: There are many authentication systems which are used for computer based authentication purpose. Generally user have put username and password in alphanumeric form. But alphanumeric password which is easy for remember can be guess by any hacker/attacker. But strong password given by user which is hard to remember sometime. This paper introduces modified persuasive cued click point authentication system. In persuasive cued click point authentication system, due to viewport chances of hotspot creation is increased. Due to elimination of viewport, hotspot creation is reduced in the modified PCCP, which gives more security to system.Keywords: Cued Click Points, Graphical Password, Modified PCCP, Server side images, and security.
Title: Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Author: Mohite Sandhya, Kare Rohini, Bhongale Pooja, Bhosale Priyanka, Prof. Parchure S.V.
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
Security in the computer is largely supported by passwords for authentication process. Alphanumeric passwords still remain as the most common Authentication method. This conventional authentication method has been shown to be susceptible security threats such as phishing attack, brute force attack, dictionary attack, spyware attack etc. To overcome the vulnerabilities of traditional methods, a numerous graphical password authentication systems have been designed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this system we propose this 2 step random colored grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...Journal For Research
Nowadays people use social networking websites like WhatsApp, Facebook and Instagram to share their life moments and events via images and videos. These popular Social apps also present many risks. At present, these social networking websites are not bound by stringent privacy and copyright laws. Images once shared on such networks can be easily downloaded by miscreants. Recently there have been several reports of private pictures of people being shared and spread in such sites. Currently tracking such photos is a hideous task. Validation of the ownership of these images is practically impossible due to high degree of replication. The authorities would have to check the server logs to find out the culprits in such cases. This paper proposes a digital image encryption system based on Steganography (using LSB 1 bit technique) combined with AES encryption. Using this technique, secret data related to the owner of the image and other users who handle the image gets embedded within the image without affecting the visual quality of the image. These details can only be retrieved by authorized party, by decoding the image. Experimental details prove that the visual quality of the images is not affected even after repeatedly encoding the image.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new authentication. In this paper, we have proposed a more advanced password authentication method yet a simple one which gives a tough competition for the attacker to break the password. For this, we are providing a special key-display interface to assist the modified cued click point’s technique which helps in the more sophisticated dynamic authentication method. This interface helps to break the single password into a combination of 4 passwords and also adds three more password strings to the current password which is entered. It also uses a special one way encryption algorithm called Nesting 93 which is developed explicitly for this system. It helps to prevent almost any kind of attacks.
Presentation on Graphical password-technology to make system more securedSanjeev Kumar Jaiswal
A graphical password is an authentication system that works by having
the user select from images, in a specific order, presented in a graphical
user interface (GUI). Graphical passwords may offer better security than
text-based passwords because many people, in an attempt to memorize
text-based passwords, use plain words
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable. Graphical password schemes are introduced as alternatives to text based schemes. Few grid based authentication techniques are also proposed. The purpose of this paper is to introduce a tool to enhance the memorability and security of passwords which also provides usability. The most popular ancient Indian board game “Snakes and Ladders” is used as a tool for authentication.
strong passwords such as alphanumeric or graphical passwords. Alphanumerical passwords are not more secure
than graphical passwords. Hackers can easily guess the password with the help of tools such as dictionary attacks.
Information security is the most important factor now a days. To provide security for the cloud we are using
graphical password authentication. Graphical password is the alternative solution for alphanumeric passwords to
provide more security. Graphical password are more secure than alphanumeric passwords. It is quite difficult for the
users to remember the alphanumeric passwords. According to psychological studies the human mind can easily
capture images than alphabets or digits. In this paper we are going to give authentication to cloud services by using
graphical password authentication. We are providing an algorithm which is based on selection of username and
images as a password. In this paper we are to trying to give set of images on the basis of alphabets sequence position
of characters in username. In this paper we will access cloud services using graphical password authentication.
A Well Known Tool Based Graphical Authentication Technique cscpconf
Authentication is the first step of information security. Authentication schemes require users to
memorize the passwords and recall them during log-in time. Traditional text-based
authentication schemes have memorability problems for secure passwords. Graphical password
schemes are introduced as alternatives to text based schemes. Many techniques have been
designed using single image or multiple images. Few grid based authentication techniques are
proposed. This paper introduces a new authentication technique based on a well known tool.
The most popular game especially in rural areas, “Snakes and Ladders” is used as a tool in
authentication technique. The usage of this tool increases the memorability and usability of
passwords.
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
Abstract: There are many authentication systems which are used for computer based authentication purpose. Generally user have put username and password in alphanumeric form. But alphanumeric password which is easy for remember can be guess by any hacker/attacker. But strong password given by user which is hard to remember sometime. This paper introduces modified persuasive cued click point authentication system. In persuasive cued click point authentication system, due to viewport chances of hotspot creation is increased. Due to elimination of viewport, hotspot creation is reduced in the modified PCCP, which gives more security to system.Keywords: Cued Click Points, Graphical Password, Modified PCCP, Server side images, and security.
Title: Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Author: Mohite Sandhya, Kare Rohini, Bhongale Pooja, Bhosale Priyanka, Prof. Parchure S.V.
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
A novel multifactor authentication system ensuring usability and securityijsptm
User authentication is one of the most important part of information security. Computer security most
commonly depends on passwords to authenticate human users. Password authentication systems will be
either been usable but not secure, or secure but not usable. While there are different types of authentication
systems available alphanumeric password is the most commonly used authentication mechanism. But this
method has significant drawbacks. An alternative solution to the text based authentication is Graphical
User Authentication based on the fact that humans tends to remember images better than text. Graphical
password authentication systems provide passwords which are easy to be created and remembered by the
user. However, the main issues of simple graphical password techniques are shoulder surfing attack and
image gallery attack. Studies reveals that most of the graphical passwords are either secure but not usable
or usable but not secure. . In this paper, a new technique that uses cued click point graphical password
method along with the use of one-time session key is proposed. The goal is to propose a new authentication
mechanism using graphical password to achieve higher security and better usability levels. The result of
the system testing is evaluated and it reveals that the proposed system ensures security and usability to a
great extent.
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
Security in the computer is largely supported by passwords for authentication process. Alphanumeric passwords still remain as the most common Authentication method. This conventional authentication method has been shown to be susceptible security threats such as phishing attack, brute force attack, dictionary attack, spyware attack etc. To overcome the vulnerabilities of traditional methods, a numerous graphical password authentication systems have been designed. These graphical passwords are usually seen as complex and time consuming. Furthermore, the existing graphical passwords are susceptible to spyware and shoulder surfing attacks. In this system we propose this 2 step random colored grid graphical password scheme to abolish the above mentioned well known security threats. Considering the drawbacks of the existing graphical password systems, we have proposed a robust graphical password scheme, which is highly adaptable for traditional desktop systems, smart phones and other web applications
STEGSIGN: A DIGITAL IMAGE AUTHENTICATION MODEL USING STEGANOGRAPHY AND AES EN...Journal For Research
Nowadays people use social networking websites like WhatsApp, Facebook and Instagram to share their life moments and events via images and videos. These popular Social apps also present many risks. At present, these social networking websites are not bound by stringent privacy and copyright laws. Images once shared on such networks can be easily downloaded by miscreants. Recently there have been several reports of private pictures of people being shared and spread in such sites. Currently tracking such photos is a hideous task. Validation of the ownership of these images is practically impossible due to high degree of replication. The authorities would have to check the server logs to find out the culprits in such cases. This paper proposes a digital image encryption system based on Steganography (using LSB 1 bit technique) combined with AES encryption. Using this technique, secret data related to the owner of the image and other users who handle the image gets embedded within the image without affecting the visual quality of the image. These details can only be retrieved by authorized party, by decoding the image. Experimental details prove that the visual quality of the images is not affected even after repeatedly encoding the image.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new authentication. In this paper, we have proposed a more advanced password authentication method yet a simple one which gives a tough competition for the attacker to break the password. For this, we are providing a special key-display interface to assist the modified cued click point’s technique which helps in the more sophisticated dynamic authentication method. This interface helps to break the single password into a combination of 4 passwords and also adds three more password strings to the current password which is entered. It also uses a special one way encryption algorithm called Nesting 93 which is developed explicitly for this system. It helps to prevent almost any kind of attacks.
Presentation on Graphical password-technology to make system more securedSanjeev Kumar Jaiswal
A graphical password is an authentication system that works by having
the user select from images, in a specific order, presented in a graphical
user interface (GUI). Graphical passwords may offer better security than
text-based passwords because many people, in an attempt to memorize
text-based passwords, use plain words
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on the importance of image processing and its apllicationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Identifying e learner’s opinion using automated sentiment analysis in e-learningeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Achieving operational excellence by implementing an erp (enterprise resource ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Synthesis, characterisation and antibacterial activity of copolymer (n vinylp...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhancement in power delay product by driver and interconnect optimizationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Graphical password authentication using pccp with sound signatureeSAT Journals
Abstract
Persuasive Cued-Click Point is an advanced method of cued click point of graphical password technique which includes usability and security evaluations. It also useful for reduces hotspot problem and hence it helps the user in selecting password of higher security. This paper includes the persuasion to influence user choice in click based graphical passwords, so that users select more desultory and more difficult to guess the passwords. In this paper includes sound signature for recover the password if user forgot password or click point ,then playing the sound signature which is selected at registration time then it set new password and access the account. This paper include dead zone new concept to avoiding Shoulder surfing attack in graphical password authentication.
Keywords: Graphical Password, Authentication, Password Images, and PCCP etc…
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Research Paper on Android Graphical Image Passwordijtsrd
Security of authentication is needed to be provided superlatively to secure users ‘personal and exchange information, since online information exchange systems, have been developed according to internet speed. Therefore, the aim of the chapter is to develop a current graphical password scheme based on recall and create and implement anew graphical password scheme composed of three layer verification. We programmed our scheme in order to use in a section of anonymous information exchange system and user’s registration of trading chat room. While we conducted survey on users by accessing participants to our system lied in participants’ local network and we analyzed in accordance with the average length of their created password and statistical significance of entropy bit. From the survey of total participants, our scheme has statistical significance, furthermore, it was proved that it can secure from a variety of attacks as entropy bit was high. Raja Saha | Dr. Umarani Chellapandy "Research Paper on Android Graphical Image Password" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49859.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49859/research-paper-on-android-graphical-image-password/raja-saha
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
Apart from being liable to social engineering atta cks,text primarily based secrets are either weak-a nd-memorable or secure-but-difficult-to-remember If the password is machine generated it's mostly sophisticated for us er to stay in mind. User each secret victimization cued click poi nts graphical secret theme includes memorability,u sability and security evaluations. By victimization graphical se cret theme shoulder aquatics attack,masquerading a nd eavesdropping will be reduced. For authentication p urpose the graphical based mostly technique is empl oyed. The aim of this paper is increasing the protection area and avoiding the weakness of typical secret. . The re are phases in making a powerful graphical secret theme from last two decades,with the promise that the graphical se crets would supply improved password memo ability and usefulnes s. The three techniques that we have a tendency to use here is PCCP (PERSUASIVE CUED CLICK POINTS),Grid-Based Aut hentication,color Based Authentication. After successfully verification of these three techniques user can able to access the Secure Application. So new scheme will provide the strong security using 3D i.e. secr ete user name,graphical password,color password. These techniques will be used for any online/offline syst em.
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Planning Of Procurement o different goods and services
Multiple grid based graphical text password authentication
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.i jret.org 502
MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T1, Rajesh I2, Kirupa Rani D3 1PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2Associate Professor, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 3PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India Abstract The system and network security is strengthened by passwords, which is a significant part of an Authentication process. Most commonly an Authentication method using either alpha-numeric password or Graphical password, which has crucial drawbacks like dictionary attacks and shoulder-surfing. The Grid based Graphical Text password Authentication have been emerged as an alternative solutions to overcome the potential vulnerabilities due to conventional schemes. Additionally, originating the “Grid Systemization and Text Enlargement Technique” for classifying a preferred theme Image. By clicking the grid on that theme Image it enlarges a next sequence of password. This method depends on “Image-Image-Alphanumeric password” and the successive mien relies on prior option. This scheme has been acquiring prominence, because of its integrity and security as well as the Grid Systemization and Text Enlargement Technique. Keywords: Grid Systemization & Text Enlargement Technique, Image-Image-Alphanumeric.
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Since most of the system uses alphanumeric passwords for Authentication process. However, it is well familiar that the Text passwords are insecure for kind of reason. For example, dictionary attack due to choosing simple passwords in favor of prominence, easy to guess, phishing. Similarly, Graphical passwords also has few drawbacks like 1) Authentication can be guessed and succeed when the system holds too few Images. 2) shoulder surfing[1][4]. In this project work, Image-Image-alphanumeric method has been introduced to reduces all those existing drawbacks. Because, proposed scheme depends not only alpha numeric but also Graphical passwords. When user uses Graphical-Text Authentication method, users tend to choose Image password for two steps and they must also enter a Text password as final confirmation.
The main contribution of this method is to increase security and reduce the size of an Image dataset to store Images. Grid based Graphical - Text password is more efficient than other existing systems because, it ensures 2-way security (Image- Text), Images used for Authentication are classified into many grids and also it will not be suffered by dictionary attacks. The rest of this work is formulated as follows. Section II Summarizes the most recent research addressing the Graphical password system. Our proposed system and the functioning principle of grid classification techniques are presented in section III. Further enhancement and conclusion will be discussed in section IV.
2. RELATED WORK
Nowadays, Text passwords are commonly used for most of the Authentication process. In this, user has to enter their name and password. Similarly, while using Graphical passwords user has to select their name and enter an Images instead of entering Text. Graphical password schemes can be motivated by the fact that, humans can easily remember pictures than alpha-numeric; psychological studies are also proved the reality. The steps involved in Graphical password Authentication, Step 1: On logging, user has to enter his/her name that is used when our enrollment. Step 2: The user has to click on the particular Image, which they are preferred as a password during enrollment. Step 3: The consequence of the click has to be the same as the user click during enrollment. Step 4: The succession of click is acclaimed and checked with the existing dataset. Step 5: The user is authenticated, if they enter correct Password. Step 6: If not authenticated, the user has to inquire their Authentication process recurrently. The Graphical password scheme has been divide into three categories. 1) Recall based scheme 2) Recognition based scheme 3) CCP (Cued-recall) method.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 503
2.1 Recall Method
In Recall base technique, user know something. The System
and the user share a confidential. User must recall and enter
their password correctly to authenticate themselves into
system or an application. Several methods are developed by
using this technique.
Fig -1: DAS Fig -2: Blonder algorithm
Fig -3: Pass-Go Fig -4: Pass Doodle
2.1.1 Draw-A-Secret (DAS):
By using the mouse, users draw their password on a 2D grid.
The password is composed of the grid cells that the user
passes through while drawing. A drawing can contain either
one continuous stroke or several strokes.
2.1.2 Blonder Algorithm:
In this algorithm, user should click several locations on that
particular Image to select their password. During
Authentication, the user must click those particular locations
of an Image ,that is selected when their sign-up process
2.1.3 Pass-Go:
User draw their password on a grid, except that the
intersections are used instead of grid squares. Visually, the
user’s movements are snapped to grid-lines and intersections
so that the drawing is not impacted by small variations in the
trace.
2.1.4 Pass Doodle:
Without using a visible grid, user has to create a freehand
drawing as a watchword. The purpose of additional
characteristics such as pen color, number of pen strokes, and
drawing speed are suggested by the originator to add volatility
to the scribble.
2.2 Recognition Method
Recognition methods are something, in which user recognize.
Similarly, the user and the system share a secret. Cues are
provided by the system and the user must recognize the secret.
Anyone capable to perceive the secret will be able to
authenticate as the primordial user. Graphical passwords
where users must perceive pre-selected Images from a set of
decoys decline d into this kind of group. Several methods
emerged as follows,
2.2.1 Dhamija and Perrig Algorithm:
user will be asked to select certain number of Images from a
set of random pictures generated by a program. Further, user
will be required to diagnose the pre-selected Images to be
authenticated.
2.2.2 Sobrado and Birget Algorithm:
This technique that overcome the shoulder surfing attacks. In
their first method which they named ”triangle scheme”, a user
needs to prefer their pass-object among many displayed
object. To be authenticated, a user recommended to recognize
all the pre-selected pass-object which was selected during the
enrollment phase. The user requires to click inside the convex-hull
which formed by the pass-object.
2.2.3 Man Algorithm:
A user selects a number of pictures as pass-images. Each pass
image has several variants and each variant is assigned a
unique code. During Authentication, the user is provoked with
several scenes. Each scheme holds several pass-objects and
many decoy-objects.
2.2.4 Jansen Algorithm:
For the password creation, a user has to select the theme first
which consists of thumbnail Images. Eventually, a user has to
selects and registers a sequence of the selected thumbnail
photo to form password.
2.2.5 Passface Algorithm:
Based on the assumption that human can recall human faces
easier than other pictures. User are requires to select the
previously seen human face picture from a grid of nine faces
which one of the face is the known face and the rest is the
decoy faces.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 504
Fig -5: Dhamija and Fig -6: Sobrado and
Perrig Algorithm Birget Algorithm
Fig -7: Man Algorithm Fig-8: Jansen Algorithm
Fig -9: Passface Algorithm
2.3 Cued Recall
Cued-recall is combination of recall and recognition scheme.
Thus it is more secured than other methods. In cued-recall
systems, the system provides a cue to help trigger the user's
memory of the password. Several method developed are,
Fig -10: Cued Click Points (CCP)
Fig -11: Implicit Password Authentication (IPA)
2.3.1 Cued Click Points (CCP):
A password comprise of one click-point per Image for a
sequences of Images [4]. The succeeding Image advertised is
based on the previous click-point so users can obtain
immediate implicit criticism as to whether they are on the
correct path when logging in.
2.3.2 Click Button According to Figures in Grid
(CBAFG):
In this multiple background Images is adopted. On registration
user is presented with four background Image. User should
choose one or more Image from four background Image. User
should choose one or more Image from four background
Image.
The “n” pass-Image is displayed in turn for the user to select
several cells as password by clicking the Image. After
selection user choose an icon from ten icon display as starting
icon. During Authentication there will be 4 background
Images. If the icon is not user starting icon then user has to
click any numeric button randomly and icon will change on
each click. When starting icon appears user can enter
password by clicking each cell.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 505
2.3.3 Implicit Password Authentication (IPA):
This is applied in mobile banking. The bank dataset will have
100 to 200 standard questions. On registrations the user has to
pick 10-20 questions from dataset and provide answer to the
selected question. For each question server create an
intelligent Authentication space using Image.
The answer to the question will be embedded into Image. On
Authentication, the server picks one or more questions
selected by user on registration time randomly .the user need
to navigate the Image and click the right answer[8].
Fig -12: Single zoom mouse click graphical password
2.3.4 Single Zoom Mouse Click Graphical Password:
It has some features of cued recall scheme, Dhamija and
Perrig scheme (recall method) and alphabetic dictionary
scheme. Alphabetic dictionary add security to Authentication.
In this the user has to assign an alphabet to each Image in
theme Image (enlarged Image). For that selected alphabet the
use has to maintain a set of word starting with the alphabet [1].
3. OUR SCHEME
In cued recall method there are sequence of Image
enlargement and by clicking on that Image it contains “n”
number of Images for each user [5]. Our proposed scheme has
special feature that it uses multiple grid classification
technique to classify a single theme Image and it uses 2 way
security (Image-Alphanumeric) for its Authentication.
In our proposed system, Graphical-Text Authentication is
done in the basis of Image-Image-alphanumeric. There are 3
steps to be considered for their Authentication.
1) The user has to select one Image as a theme Image. The
theme Image will be classified into many number of grids
using “Grid Systemization Technique”. By Clicking, any grid
on that pre-selected theme Image, it enlarges another theme
Image depend upon our pre-selection.
2) For every grid on that first theme Image, we are setting
individual theme Image for its enlargement. An Image that is
enlarged at second, also classified into multiple grids.
3) By clicking the grid of second theme Image, it enlarges an
Input Text box containing “Enter Password”. This box shows
that we should enter our Text password that is used when our
registration.
Selection of one root path from multiple paths make this
method as an efficient. Finally, the user can be authenticated
When they will select Graphical as well as Text passwords
correctly. Let us evaluate the Graphical- Text Authentication
in the basis of three steps(Image-Image- Alphanumeric).
A Figure III represents that, a single theme Image can be used
for an entire system of process and it uses Grid Systemization
and Text Enlargement Technique. The system can be
implemented using the following five stages. 1. User
registration process 2. Picture selection process 3. Grid
systemization of picture 4.Login process 5. Final
Authentication
3.1. User Registration Process
During registration process user has to provide their username
and they should specify their passwords for entering into the
system. Password is the sequence of 3 steps. Our system uses
Image-Image-Alphanumeric category as password. During
login process user should enter the specific sequence of
password to enter into the system. It includes,
Entering username
Setting password sequence
3.2. Picture Selection Process
During picture selection process, picture for password is
selected for next sequence of modules. There are two types of
picture selection.
3.2.1 User Defined Picture
Fig -13: User Defined Picture
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 506
3.2.2 System Defined Picture
Fig -14: System Defined Picture
Fig -15: Multiple Grid Based Graphical Text Password
Authentication
3.3. Grid Systemization of Picture
Picture can be classified into multiple grids using grid
systemization technique. It includes,
Setting clickpoint’s of grid as password
Picture enlargement
Text enlargement
3.4. Login Process
Login process includes 3 steps authentication (Image-Image-
Text). User should visit their sequence of steps for logging
into the system. It includes,
Username selection
Grid selection from pictures
Text selection
3.5. Authentication Process
Final authentication process includes verification of 3 steps
passwords. If the user enters their 3 steps of passwords in a
correct manner then they are allowed or authenticated into a
system.
4. RESULTS AND DISCUSSION
In this project work, both graphical and text passwords has
been used to provide better security and also graphical
passwords are used in terms of multiple grids instead of using
simple images. Using Grid Systemization & Text Enlargement
Technique, images are classified into 5x5 grids. User has to
select one grid among 25 grids. It improves the performance
by providing 3 levels of authentication. The three levels are
Image-Image Alphanumeric. If the user selects the wrong
sequence in any of the three levels of authentication, the
system will not enter into the application. So, this project work
improves the performance and increases the security compared
to existing methods. Using Visual C# .Net, this project is
implemented and executed. The results of this work improves
the performance and security.
Fig -16: Selecting grids from level 1
Fig -17: Selecting grids from level 2 and entering Text
Password
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http:// www.ijret.org 507
Fig -18: User Authentication Successful
Fig -19: Invalid user because of wrong selection of password
sequences
5. FUTURE ENHANCEMENT AND CONCLUSION
Graphical password is an emerging technology in this world
for Authentication.. In this project work, we introduce a novel
Graphical-Text password Authentication by integrating the
existing Graphical and Alpha-Numeric Authentication
systems.
Both Graphical & Alpha-Numeric password Authentication
system performs better security but not well enough for large
and complex systems. However, Graphical/Text
Authentication has many drawbacks like dictionary attacks,
shoulder surfing & phishing. Therefore, we try to integrate the
features present in the Graphical as well as Text password
Authentication. This can be achieved with the help of Grid
classification technique and it also adapted to these extended
applications
REFERENCES
[1]. Merin Sebastiian, Biju Abraham Narayamparambil, “A
New Approach For Instigating Security Using single Zoom
Mouse Click Graphical Password” International Journal of
Communication Network Security ISSN:2231-1882, Volume-
1,Issue-4,2012.
[2]. P.Golle and D.Wagner, “Cryptanalysis of a Cognitive
Authentication Schemes”, IEEE Symposium on Security
Conference.
[3]. S.Wiedenbeck, J.Waters, J.C.Birget, A.Brodskiy and
N.Menon, “Authentication using Graphical passwords: Basic
results”, Human-Computer Interaction International(HCII
2005),Las Vegas,NV,2005.
[4]. Sonia Chiasson, P.C.Van Oorschot and Robert Biddle,
”Graphical password Authentication using cued click
points”,12th European Symposium On Research In Computer
Security(ESORICS),2007.
[5]. Jinhua Qiu, Xiyang Liu, Licheng Ma, Haichang Gao and
Zhongjie Ren,”A Novel Cued-recall Graphical password
Scheme”, International Conference on Image and Graphics
page949-956, Washington,2011
[6]. G.S.Owen, X.Suo and Y.Zhu,”Grphical passwords: A
Survey”, in Computer Security Applications Conference,21st
annual,5-9Dec,2005.
[7]. Haichang Gao,Xiyang Liu,Sidong Wang,Honggang Liu
and Ruyi Dai,”Design and Analysis of a Graphical password
scheme”, International conference on Innovative Computing
Information and Control ICICIC,2009.
[8]. Sadiq Almuairti and Parakash Veeraraghavan,
“IPAS:Implicit Password Authentication Systems”, in
workshop of International Conference on Advanced
Information Networking and Applications, Singapore.2011.