SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 156
Secure User Authentication & Graphical Password
using Cued Click-Points
Miss.Saraswati B.Sahu #1
, Associate Prof. Angad Singh*2
#
M.Tech Scholar & Information Technology & RGPV
NIIST ,Bhopal,India
Abstract: The major problem of user registration, mostly text base
password, is well known. In the login user be inclined to select
simple passwords which is frequently in mind that are
straightforward for attackers to guess, difficult machine created
password mostly complicated to user take in mind. User authenticate
password using cued click points and Persuasive Cued Click
Points graphical password scheme which includes usability and
security evaluations.
This paper includes the persuasion to secure user
authentication & graphical password using cued click-points so that
users select more random or more difficult to guess the passwords. In
click-based graphical passwords, image or video frame that provide
database to load the image, and then store all information into
database. Mainly passwords are composed of strings which have
letters as well as digits. Example is alpha-numeric type letters and
digits.
Keywords: User Authentication, Graphical Password, Persuasive
Cued Click-Points, Cued Click Point.
1. INTRODUCTION
There are a lot of effects that are most well-known about
passwords; such as that user cannot memorize complicated password
which is simple to identify [1-6].
A user registration is supposed to support strong passwords
for preserve to keep in mind and protection. The user registration
process allows choosing while influencing users proposed for
difficult passwords. The task of selecting weak passwords is more
monotonous, avoids users from making like choice. This type of
registration schemes it is use for very protected password. Instead of
increasing the burden on users, it is much easier to use the system’s
suggestions for a secure password - a feature absent in most schemes.
In this approach to create the primary normal click point
visible password and cued click point created an inter lab connecting
study with a variety of participants. The results shows and explained
that Cued Click Points method is useful at condensed the number of
user connected areas of the image where users are more likely to
select click points while still maintaining usability. In this paper also
analyze the efficiency of tolerance value and security rate. While we
are not at variance that graphical passwords are the best approach to
authentication, in research finding that it provide an excellent
environment for exploring strategies for helping users select better
passwords since it is easy to compare user choices. This method
completely use simple of the user about his selected images. If user
cannot define the total area of the image, the user can’t register even
though he is a authentic user. The user feels comfortable with this
type of graphical passwords when compared with text passwords.
2. BACKGROUND
Instead of text password, Graphical passwords have been
proposed to improve both usability and security issues. For
registration process the text based password is better, while it is not
more secure. By the use of bio metric or token base password is weak
and problem oriented [7-9].In this method to moderate the troubles
with conventional methods. Greg Blonder first described the idea of
graphical password in the year 1996. In the use of Graphical
passwords that provides alternative, and are the center of this paper.
2.1 Graphical Passwords Using Normal Click Points
The password which is secure information for every user if
the password is used like graphical is use for user registration
process. Graphical password is attempts to influence the user stored
in mind for visible data. Previous survey of visible passwords is
obtainable in a different place of interest in this are normal click
click-based graphical passwords. In such systems, users identify and
target formerly preferred locations within more than one images.
Example systems include Pass Points [15] and Cued Click- Points
(CCP) [10].
Fig.1. click point password for user navigation process. The next image
determine with each click. [11]
The Click Points is a planned to set pass point. The method
of click-point user selects single points instead of 3 point on 3 images.
The method provides cued-recall the facilities visible cued
immediately provide message if they enter wrong click point.
Using the previous survey Persuasive technology is to
inspire to encourage new concept. This method provides solution to
user for selecting best password. User will not avoid the effective
elements as well as final password must be memorable. The path for
candidate to choose difficult password which is can’t to access easily.
If the click point select as randomly so formation of hotspot is
minimized.
In Pass-Points, the user password use continues five click
points provides on particular image. A User might choose the
appropriate pixel for password. Mostly pass point is frequently used
[15-16], if the given security is poor then password is quite simple
International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 157
for attackers to crack. In the method of various define click point
[17] that make for simplify pattern for helpfulness for hotspot for
attackers. Instead of five click point on single image the cued click
point method apply only single click point on various five images,
which presented as continues images. The display of next image is
depending on previously image. In the fig 1 there are path provides
for all image set. In this user selected given image which is amount
of their click point provided.
Fig. 2 Create the Pattern on image and login
3 PERSUASIVE CUED CLICK POINTS
In previous approach describe the weak password is mostly
possible only in case of hotspot and lower security. If attackers is to
determine and prioritize higher probability passwords for more
appropriate guessing attacks. Basically survey shows those various
user highlighted the common area on that image. In this case user
choose their own click-based graphical passwords without direction,
hotspots will remain an issue. Final thing is that to satisfies strong
security to providing reduced number of choices it extra overriding
and very much difficult. In result, the safe selection root of least
resistance defined by user [2].the selection of this method [7],
proposed the user make a password, User select image from database
and choose pattern as password and they choose a click point that to
selected area for click point, an area on image button appears only
during password creation. Normally next entry of password the
image generated simply without the shading of that view point so
user can click anywhere on the images. In the click point and pass-
point the login define the tolerance squares of main points.
I. In the first step user feasible to pick click-points that put
fervent to recognized hotspots.
II. Click-point share diagonally users will be additional
randomly separate and will not form latest hotspots.
III. User login security success rates will be better to those of
the original CCP system.
IV. Login security success rates will boost, when receipt value
is lower value.
V. User will get their passwords which are more protected
with PCCP than participants of the original CCP system.
Password space for a system is the all number of unique
password will generate depend on system rules. Normally,
complicated of long password is more difficult to identify to given
actual password. In the method of click point password space is
(w x h )/t2
)c in this the size is in pixel (w x h) is separated with the
size of tolerance square (t2
), the total number of tolerance squares/
image, raised to power of number of click point provided in image
password.
4. SYSTEM DESIGN
The system designed with the help of three modules such
as Authentication Process, User registration /Sign Up process
modules , Loading video and creating frame module, picture
selection module and system login module (see Figure 3).
Fig. 3.System design modules
User authentication process user select login screen ask
user id and password, then user will retrieve the image from data
base and ask user for click point here minimum 3 point are necessary
require, this process is continuously repeat until the no match found ,
so user will continue to re- login into the page.
In user registration module user enter the user name in user
name field and also suitable tolerance value. When user entered the
all user details in registration phase, these registration data of
different users stored in data base and used during login phase for
verification. In the previous section select image from system and
create minimum 3 click points then store the total information of user
to the data base and ask the user to select more images. Otherwise
ask for load the video and select a particular frame from the video
and provide object name, finally store the information into data base.
Two Types of flowchart:
I. User Authentication Process/ Login flow chart
II. User registration-Sign up Process flow chart
Below flowchart (see Figure 4 & 5) defines the user
registration define main procedure, this procedure include two
registration phase (user ID) and picture selection phase. The flow of
the given process generates from registering user id and clearance
value. Once user completes all the user details then precede to next
stage, which are given selecting click points on generated images,
which ranges from 1-5. After done with all these above procedure, if
clue is define then frame will be created.
VERIFY USER LOGIN
RETRIVE THE USER
DATABASE [IMAGE]
ASK USED ID & TEXT
PASSWORD
Modules
Authentication
Process
Loading image/
Loading video and
creating frame
User registration –
Sign Up process
International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 158
Fig.4. Authentication Process/ Login
In picture selection phase user select any image as
passwords and provides continues of three click points on image.
Any pixel on the image can choose for the password by user. The
user select image from database. Then asking for click point then
asking for frame number of object, if the appropriate thing is match
with the database then user show the login screen otherwise the user
must be re enter the user id and password.
Fig.5. User registration –Sign Up process
After selecting procedure, the click point normal click base or
Persuasive Cued Click-Points, next step to upload image or video.
Here image can be taken from any location and video is predefined,
and then create a single frame. During system login, the user must
repeat the procedure of login otherwise they will be getting no match
found message.
5. IMPLEMENTATION
Fig 6 main menu user registration process login, signup, forgot
password
Fig.7 Creating Password interface using Cued click points
Fig. 8 security question if user forgot password
REGISTRATION FORM
PROVIDE TO USER
REGISTRATER USER BASIC
INFORMATION
CREATE BASIC TEXT USER
ID & PASSWORD
SELECT IMAGE FROM
SYSTEM CLICK BASED
PASSWORD
CREATE CLICK POINTS
MINIMUM 3
STORE THE INFORMATION TO
DATABASE TO ASK USER TO
SELECT ANOTHER IMAGE
ASK FOR LOAD VIDEO
SELECT A PARTICULAR FRAME
NO. & PROVIDE OBJECT NAME
STORE THE INFORMATION TO
DATABASE
YES
NO
ASK FOR CLICKPOINT
ASK FOR FRAME NO. &
OBJECT NAME
WEL COME TO LOGIN
COMPAIRE THE
CLICK POINT
NO MATCHES
FOUND
MATCHES WITH
DATABASE
NO MATCHES
FOUND RE-LOGIN
YES
NO
YES
NO
International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 159
Fig.9 sign up process if user is not registered
Fig.10 loading more images for cued click point connects
Fig.11 loading video and creating frame
6. RESULTS AND ANALYSIS
The study and analysis of normal point( CCP) and persuasive cued
click point (PCCP) was designed to explore ways of increasing the
efficiency of tolerance value and also conducted lab study for
comparison between login success rate and security success rate of
existing CCP’s and proposed PCCP’s.
A. Efficiency of the tolerance value
Initially eight participants are considered for the
experiment. Each participant has a unique password which includes
clicking on 5 click points in 5 different images. Each image contain
of different characters (image details), among which the participant
needs to click on any one point of his choice to make it a click point
in the series. Similarly the participant select a click point each of the
images. Then, the participant logs in with that password, meantime
the other participants are made to stand in a group behind the
participant who is entering the password and are made to peek in
over the shoulder of the participant and observe his password (the
click points on the images). The first participant has logged out once,
the other participants are asked to enter the same password which
they have observed of the first participant.
Tolerance value: It is the value which defines the degree of
closeness to the actual click point.
Tolerance region: The area describes an original click point is
accepted as correct since it is unrealistic to expect user to accurately
target an exact pixel.
Success rate: It is the rate which gives the number of successful
trails for a certain number of trials, the success rates calculated as the
number of trails given completed without errors or restarts.
Shoulder surfing: It is the process by which the person standing
behind the person entering the password observes the password. It is
a type of capture attack. This attack occurs when attackers are
directly obtaining the passwords by intercept the user put values and
password for that.
The below table 1 shows the result of the tolerance value
efficiency of the PCCP method.
No Tolerance
value
Success
rate
Percentage
of success
rate
Security
(in
percentage)
1 5 7/8 87.5 12.5
2 4 6/8 75.8 37.5
3 3 3/8 37.8 62.5
4 2 2/8 25 75
5 1 0/8 0 100
7. POSSIBLE SECURITY ATTACK
Here the number of possible attack regarding to security
concern.
7.1 Password guessing attack
Most critical guessing attack against Cued Click Points is a
brute force attack, through the predictable achievement behind
explore partially of the password space yet, skewed password
separation that provides attacker to give on this harm for that
metadata of information can be formed of server-side information.
Then this dictionary information can be used for the guessing of the
click point in an image.
7.2 Password Capture attacks
In this attacks when attackers directly obtain passwords by
intercepting user entered data and tricking users into revealing their
passwords. In capturing one sign in instance allows deceptive access
by a simple replay attack. Some security schemes are vulnerable to
carry surfing threat. Examine the estimated location of click points
may reduce the figure of guesses essential to decide the user’s
password. User crossing point, normally attacks against cued-recall
graphical passwords, a frame of orientation must be recognized
International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 160
between parties to correspond the password in enough detail.
Graphical passwords may also be shared by taking picture, capturing
screen shots, or drawing, although requiring more attempt than for
text passwords.
7.3 Image Pattern Attack
In this pattern-based attack that provides passwords with of
click-points ordered in a consistent horizontal and vertical direction
(with straight lines in any direction, arcs, and step patterns), as well
as ignores any image-specific characteristics such as hotspots. Given
that Cued Click Point passwords are fundamentally impossible to tell
apart from arbitrary for click-point distributions among the x- and y-
axes, angles, shapes and slopes.
8. CONCLUSION
As we are providing the only one image for the
authentication purpose it is easier for the user to remember and
difficult for the attacker to attack because it is difficult for the
attacker to see at click points area of the image. Using of the
graphical password method it is undeveloped. In the various research
and study the various approach the graphical password method is
provide wide strong security and very convenience.
By using database image or creating a frame from video
password become strong. This approach encourages and guides users
in selecting more random click-based graphical passwords. A key
feature in this method is that creating a secure password is the given
path-of-least-resistance, it likely to be more productive than schemes
where it securely adds an extra load on users.
REFERENCES
[1] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look
at the Usability of Click-Based Graphical Passwords,” Proc.
ACM Symp. Usable Privacy and Security (SOUPS), July
2007.
[2] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot,
“Influencing Users towards Better Passwords: Persuasive
Cued Click- Points,” British HCI Group Ann. Conf. People
and Computers: Culture, Creativity, Interaction, Sept. 2008.
[3] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R.
Bddle, “Multiple Password Interference in Text and Click-
Based Graphical Passwords,” Proc. ACM Conf. Computer
and Comm. Security CCS), Nov. 2009.
[4] E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and
R.Biddle, “Exploring Usability Effects of Increasing Security
in Click-Based Graphical Passwords,” Proc. Ann. Computer
Security Applications Conf. (ACSAC), 2010.
[5] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot,
“User Interface Design Affects Security: Patterns in Click-
Based Graphical Passwords,” Intl J. Information Security, vol.
8, no. 6, pp. 387- 398, 2009.
[6] J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The
Memorability and Security of Passwords,” Security and
Usability: Designing Secure Systems That People Can Use, L.
Cranor and S. Garfinkel, eds., ch. 7, pp. 129-142, O‟ Reilly
Media, 2005.
[7] L. Jones, A. Anton, and J. Earp, “Towards Understanding
User Perceptions of Authentication Technologies,” Proc.
ACM Workshop Privacy in Electronic Soc., 2007.
[8] L. O’Gorman, “Comparing Passwords, Tokens, and
Biometrics for User Authentication,” Proc. IEEE, vol. 91, no.
12, pp. 2019-2020, Dec. 2003.
[9] A. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for
Information Security,” IEEE Trans. Information Forensics
and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006.
[10] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical
Password Authentication Using Cued Click Points,” Proc.
European Symp. Research in Computer Security (ESORICS),
pp. 359-374, Sept. 2007.
[11] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert
Biddle , and Paul C. van Oorschot “Persuasive Cued Click-
Points: Design, Implementation, and Evaluation of
aKnowledge-Based Authentication Mechanism”, IEEE
Transactions On Dependable And Secure Computing, Vol. 9,
No. 2, March/April 2012
[12] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical
Passwords: Learning from the First Twelve Years,” to be
published in ACM Computing Surveys, vol. 44, no. 4, 2012.
[13] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a
Picture Really Worth a Thousand Words? Exploring the
Feasibility of Graphical Authentication Systems,” Int’l J.
Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152,
2005.
[14] P.C. van Oorschot and J. Thorpe, “Exploiting Predictability in
Click-Based Graphical Passwords,” J. Computer Security,
vol. 19, no. 4, pp. 669-702, 2011.
[15] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N.
Memon, “PassPoints: Design and Longitudinal Evaluation of
a Graphical Password System,” Int’l J. Human-Computer
Studies, vol. 63,nos. 1/2, pp. 102-127, 2005.
[16] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a
Picture Really Worth a Thousand Words? Exploring the
Feasibilityof Graphical Authentication Systems,” Int’l J.
Human-Computer Studies, vol. 63, nos.128-152, 2005.
[17] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical
Password Authentication Using Cued Click Points,” Proc.
European Symp.Research in Computer Security (ESORICS),
pp. 359-374, Sept. 2007.
[18] Dimitri Van De Ville, W.P., Rik Van de Walle, Ignace
Lemahieu, Image Scrambling Without Bandwidth Expansion.
IEEE Transactions on Cirsuits and Systems for Video
Technology, 2004. 14
[19] R. Biddle, S. Chiasson, P. van Oorschot, “Graphical
passwords: Learning from the first twelve years,” vol. 44, no.
4, 2012.

More Related Content

What's hot

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Deepak Yadav
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSIJNSA Journal
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System IRJET Journal
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 

What's hot (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 
H364752
H364752H364752
H364752
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 

Viewers also liked

Can We Really Run Our Businesses On Open Source Software
Can We Really Run Our Businesses On Open Source SoftwareCan We Really Run Our Businesses On Open Source Software
Can We Really Run Our Businesses On Open Source SoftwareDigium
 

Viewers also liked (6)

Spangram
SpangramSpangram
Spangram
 
לוגו
לוגולוגו
לוגו
 
Lesson 8 Memory Storage And Management
Lesson 8 Memory Storage And ManagementLesson 8 Memory Storage And Management
Lesson 8 Memory Storage And Management
 
Can We Really Run Our Businesses On Open Source Software
Can We Really Run Our Businesses On Open Source SoftwareCan We Really Run Our Businesses On Open Source Software
Can We Really Run Our Businesses On Open Source Software
 
SaraPIC
SaraPICSaraPIC
SaraPIC
 
OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1OSOS SEM 4 Chapter 1
OSOS SEM 4 Chapter 1
 

Similar to Research ppr

An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsIRJET Journal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET Journal
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET Journal
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 

Similar to Research ppr (20)

An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
CNS Review PPT.pptx
CNS  Review PPT.pptxCNS  Review PPT.pptx
CNS Review PPT.pptx
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 

Recently uploaded

Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Recently uploaded (20)

Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Research ppr

  • 1. International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 156 Secure User Authentication & Graphical Password using Cued Click-Points Miss.Saraswati B.Sahu #1 , Associate Prof. Angad Singh*2 # M.Tech Scholar & Information Technology & RGPV NIIST ,Bhopal,India Abstract: The major problem of user registration, mostly text base password, is well known. In the login user be inclined to select simple passwords which is frequently in mind that are straightforward for attackers to guess, difficult machine created password mostly complicated to user take in mind. User authenticate password using cued click points and Persuasive Cued Click Points graphical password scheme which includes usability and security evaluations. This paper includes the persuasion to secure user authentication & graphical password using cued click-points so that users select more random or more difficult to guess the passwords. In click-based graphical passwords, image or video frame that provide database to load the image, and then store all information into database. Mainly passwords are composed of strings which have letters as well as digits. Example is alpha-numeric type letters and digits. Keywords: User Authentication, Graphical Password, Persuasive Cued Click-Points, Cued Click Point. 1. INTRODUCTION There are a lot of effects that are most well-known about passwords; such as that user cannot memorize complicated password which is simple to identify [1-6]. A user registration is supposed to support strong passwords for preserve to keep in mind and protection. The user registration process allows choosing while influencing users proposed for difficult passwords. The task of selecting weak passwords is more monotonous, avoids users from making like choice. This type of registration schemes it is use for very protected password. Instead of increasing the burden on users, it is much easier to use the system’s suggestions for a secure password - a feature absent in most schemes. In this approach to create the primary normal click point visible password and cued click point created an inter lab connecting study with a variety of participants. The results shows and explained that Cued Click Points method is useful at condensed the number of user connected areas of the image where users are more likely to select click points while still maintaining usability. In this paper also analyze the efficiency of tolerance value and security rate. While we are not at variance that graphical passwords are the best approach to authentication, in research finding that it provide an excellent environment for exploring strategies for helping users select better passwords since it is easy to compare user choices. This method completely use simple of the user about his selected images. If user cannot define the total area of the image, the user can’t register even though he is a authentic user. The user feels comfortable with this type of graphical passwords when compared with text passwords. 2. BACKGROUND Instead of text password, Graphical passwords have been proposed to improve both usability and security issues. For registration process the text based password is better, while it is not more secure. By the use of bio metric or token base password is weak and problem oriented [7-9].In this method to moderate the troubles with conventional methods. Greg Blonder first described the idea of graphical password in the year 1996. In the use of Graphical passwords that provides alternative, and are the center of this paper. 2.1 Graphical Passwords Using Normal Click Points The password which is secure information for every user if the password is used like graphical is use for user registration process. Graphical password is attempts to influence the user stored in mind for visible data. Previous survey of visible passwords is obtainable in a different place of interest in this are normal click click-based graphical passwords. In such systems, users identify and target formerly preferred locations within more than one images. Example systems include Pass Points [15] and Cued Click- Points (CCP) [10]. Fig.1. click point password for user navigation process. The next image determine with each click. [11] The Click Points is a planned to set pass point. The method of click-point user selects single points instead of 3 point on 3 images. The method provides cued-recall the facilities visible cued immediately provide message if they enter wrong click point. Using the previous survey Persuasive technology is to inspire to encourage new concept. This method provides solution to user for selecting best password. User will not avoid the effective elements as well as final password must be memorable. The path for candidate to choose difficult password which is can’t to access easily. If the click point select as randomly so formation of hotspot is minimized. In Pass-Points, the user password use continues five click points provides on particular image. A User might choose the appropriate pixel for password. Mostly pass point is frequently used [15-16], if the given security is poor then password is quite simple
  • 2. International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 157 for attackers to crack. In the method of various define click point [17] that make for simplify pattern for helpfulness for hotspot for attackers. Instead of five click point on single image the cued click point method apply only single click point on various five images, which presented as continues images. The display of next image is depending on previously image. In the fig 1 there are path provides for all image set. In this user selected given image which is amount of their click point provided. Fig. 2 Create the Pattern on image and login 3 PERSUASIVE CUED CLICK POINTS In previous approach describe the weak password is mostly possible only in case of hotspot and lower security. If attackers is to determine and prioritize higher probability passwords for more appropriate guessing attacks. Basically survey shows those various user highlighted the common area on that image. In this case user choose their own click-based graphical passwords without direction, hotspots will remain an issue. Final thing is that to satisfies strong security to providing reduced number of choices it extra overriding and very much difficult. In result, the safe selection root of least resistance defined by user [2].the selection of this method [7], proposed the user make a password, User select image from database and choose pattern as password and they choose a click point that to selected area for click point, an area on image button appears only during password creation. Normally next entry of password the image generated simply without the shading of that view point so user can click anywhere on the images. In the click point and pass- point the login define the tolerance squares of main points. I. In the first step user feasible to pick click-points that put fervent to recognized hotspots. II. Click-point share diagonally users will be additional randomly separate and will not form latest hotspots. III. User login security success rates will be better to those of the original CCP system. IV. Login security success rates will boost, when receipt value is lower value. V. User will get their passwords which are more protected with PCCP than participants of the original CCP system. Password space for a system is the all number of unique password will generate depend on system rules. Normally, complicated of long password is more difficult to identify to given actual password. In the method of click point password space is (w x h )/t2 )c in this the size is in pixel (w x h) is separated with the size of tolerance square (t2 ), the total number of tolerance squares/ image, raised to power of number of click point provided in image password. 4. SYSTEM DESIGN The system designed with the help of three modules such as Authentication Process, User registration /Sign Up process modules , Loading video and creating frame module, picture selection module and system login module (see Figure 3). Fig. 3.System design modules User authentication process user select login screen ask user id and password, then user will retrieve the image from data base and ask user for click point here minimum 3 point are necessary require, this process is continuously repeat until the no match found , so user will continue to re- login into the page. In user registration module user enter the user name in user name field and also suitable tolerance value. When user entered the all user details in registration phase, these registration data of different users stored in data base and used during login phase for verification. In the previous section select image from system and create minimum 3 click points then store the total information of user to the data base and ask the user to select more images. Otherwise ask for load the video and select a particular frame from the video and provide object name, finally store the information into data base. Two Types of flowchart: I. User Authentication Process/ Login flow chart II. User registration-Sign up Process flow chart Below flowchart (see Figure 4 & 5) defines the user registration define main procedure, this procedure include two registration phase (user ID) and picture selection phase. The flow of the given process generates from registering user id and clearance value. Once user completes all the user details then precede to next stage, which are given selecting click points on generated images, which ranges from 1-5. After done with all these above procedure, if clue is define then frame will be created. VERIFY USER LOGIN RETRIVE THE USER DATABASE [IMAGE] ASK USED ID & TEXT PASSWORD Modules Authentication Process Loading image/ Loading video and creating frame User registration – Sign Up process
  • 3. International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 158 Fig.4. Authentication Process/ Login In picture selection phase user select any image as passwords and provides continues of three click points on image. Any pixel on the image can choose for the password by user. The user select image from database. Then asking for click point then asking for frame number of object, if the appropriate thing is match with the database then user show the login screen otherwise the user must be re enter the user id and password. Fig.5. User registration –Sign Up process After selecting procedure, the click point normal click base or Persuasive Cued Click-Points, next step to upload image or video. Here image can be taken from any location and video is predefined, and then create a single frame. During system login, the user must repeat the procedure of login otherwise they will be getting no match found message. 5. IMPLEMENTATION Fig 6 main menu user registration process login, signup, forgot password Fig.7 Creating Password interface using Cued click points Fig. 8 security question if user forgot password REGISTRATION FORM PROVIDE TO USER REGISTRATER USER BASIC INFORMATION CREATE BASIC TEXT USER ID & PASSWORD SELECT IMAGE FROM SYSTEM CLICK BASED PASSWORD CREATE CLICK POINTS MINIMUM 3 STORE THE INFORMATION TO DATABASE TO ASK USER TO SELECT ANOTHER IMAGE ASK FOR LOAD VIDEO SELECT A PARTICULAR FRAME NO. & PROVIDE OBJECT NAME STORE THE INFORMATION TO DATABASE YES NO ASK FOR CLICKPOINT ASK FOR FRAME NO. & OBJECT NAME WEL COME TO LOGIN COMPAIRE THE CLICK POINT NO MATCHES FOUND MATCHES WITH DATABASE NO MATCHES FOUND RE-LOGIN YES NO YES NO
  • 4. International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 159 Fig.9 sign up process if user is not registered Fig.10 loading more images for cued click point connects Fig.11 loading video and creating frame 6. RESULTS AND ANALYSIS The study and analysis of normal point( CCP) and persuasive cued click point (PCCP) was designed to explore ways of increasing the efficiency of tolerance value and also conducted lab study for comparison between login success rate and security success rate of existing CCP’s and proposed PCCP’s. A. Efficiency of the tolerance value Initially eight participants are considered for the experiment. Each participant has a unique password which includes clicking on 5 click points in 5 different images. Each image contain of different characters (image details), among which the participant needs to click on any one point of his choice to make it a click point in the series. Similarly the participant select a click point each of the images. Then, the participant logs in with that password, meantime the other participants are made to stand in a group behind the participant who is entering the password and are made to peek in over the shoulder of the participant and observe his password (the click points on the images). The first participant has logged out once, the other participants are asked to enter the same password which they have observed of the first participant. Tolerance value: It is the value which defines the degree of closeness to the actual click point. Tolerance region: The area describes an original click point is accepted as correct since it is unrealistic to expect user to accurately target an exact pixel. Success rate: It is the rate which gives the number of successful trails for a certain number of trials, the success rates calculated as the number of trails given completed without errors or restarts. Shoulder surfing: It is the process by which the person standing behind the person entering the password observes the password. It is a type of capture attack. This attack occurs when attackers are directly obtaining the passwords by intercept the user put values and password for that. The below table 1 shows the result of the tolerance value efficiency of the PCCP method. No Tolerance value Success rate Percentage of success rate Security (in percentage) 1 5 7/8 87.5 12.5 2 4 6/8 75.8 37.5 3 3 3/8 37.8 62.5 4 2 2/8 25 75 5 1 0/8 0 100 7. POSSIBLE SECURITY ATTACK Here the number of possible attack regarding to security concern. 7.1 Password guessing attack Most critical guessing attack against Cued Click Points is a brute force attack, through the predictable achievement behind explore partially of the password space yet, skewed password separation that provides attacker to give on this harm for that metadata of information can be formed of server-side information. Then this dictionary information can be used for the guessing of the click point in an image. 7.2 Password Capture attacks In this attacks when attackers directly obtain passwords by intercepting user entered data and tricking users into revealing their passwords. In capturing one sign in instance allows deceptive access by a simple replay attack. Some security schemes are vulnerable to carry surfing threat. Examine the estimated location of click points may reduce the figure of guesses essential to decide the user’s password. User crossing point, normally attacks against cued-recall graphical passwords, a frame of orientation must be recognized
  • 5. International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 4 – Dec 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 160 between parties to correspond the password in enough detail. Graphical passwords may also be shared by taking picture, capturing screen shots, or drawing, although requiring more attempt than for text passwords. 7.3 Image Pattern Attack In this pattern-based attack that provides passwords with of click-points ordered in a consistent horizontal and vertical direction (with straight lines in any direction, arcs, and step patterns), as well as ignores any image-specific characteristics such as hotspots. Given that Cued Click Point passwords are fundamentally impossible to tell apart from arbitrary for click-point distributions among the x- and y- axes, angles, shapes and slopes. 8. CONCLUSION As we are providing the only one image for the authentication purpose it is easier for the user to remember and difficult for the attacker to attack because it is difficult for the attacker to see at click points area of the image. Using of the graphical password method it is undeveloped. In the various research and study the various approach the graphical password method is provide wide strong security and very convenience. By using database image or creating a frame from video password become strong. This approach encourages and guides users in selecting more random click-based graphical passwords. A key feature in this method is that creating a secure password is the given path-of-least-resistance, it likely to be more productive than schemes where it securely adds an extra load on users. REFERENCES [1] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp. Usable Privacy and Security (SOUPS), July 2007. [2] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click- Points,” British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008. [3] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Bddle, “Multiple Password Interference in Text and Click- Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security CCS), Nov. 2009. [4] E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R.Biddle, “Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,” Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010. [5] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot, “User Interface Design Affects Security: Patterns in Click- Based Graphical Passwords,” Intl J. Information Security, vol. 8, no. 6, pp. 387- 398, 2009. [6] J. Yan, A. Blackwell, R. Anderson, and A. Grant, “The Memorability and Security of Passwords,” Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129-142, O‟ Reilly Media, 2005. [7] L. Jones, A. Anton, and J. Earp, “Towards Understanding User Perceptions of Authentication Technologies,” Proc. ACM Workshop Privacy in Electronic Soc., 2007. [8] L. O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003. [9] A. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006. [10] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007. [11] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle , and Paul C. van Oorschot “Persuasive Cued Click- Points: Design, Implementation, and Evaluation of aKnowledge-Based Authentication Mechanism”, IEEE Transactions On Dependable And Secure Computing, Vol. 9, No. 2, March/April 2012 [12] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical Passwords: Learning from the First Twelve Years,” to be published in ACM Computing Surveys, vol. 44, no. 4, 2012. [13] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems,” Int’l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152, 2005. [14] P.C. van Oorschot and J. Thorpe, “Exploiting Predictability in Click-Based Graphical Passwords,” J. Computer Security, vol. 19, no. 4, pp. 669-702, 2011. [15] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and Longitudinal Evaluation of a Graphical Password System,” Int’l J. Human-Computer Studies, vol. 63,nos. 1/2, pp. 102-127, 2005. [16] A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, “Is a Picture Really Worth a Thousand Words? Exploring the Feasibilityof Graphical Authentication Systems,” Int’l J. Human-Computer Studies, vol. 63, nos.128-152, 2005. [17] S. Chiasson, P. van Oorschot, and R. Biddle, “Graphical Password Authentication Using Cued Click Points,” Proc. European Symp.Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007. [18] Dimitri Van De Ville, W.P., Rik Van de Walle, Ignace Lemahieu, Image Scrambling Without Bandwidth Expansion. IEEE Transactions on Cirsuits and Systems for Video Technology, 2004. 14 [19] R. Biddle, S. Chiasson, P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” vol. 44, no. 4, 2012.