SlideShare a Scribd company logo
Srajan Institute of Technology
Management & Science
Minor Project Synopsis
Session: 2016-2017
Submitted To: Submitted By:
Mr.Deepak Tiwari Love Kothari &
1
Table of contents
Abstract
1. Introduction…………………………………………………………..
2. Problems with Alphanumeric Passwords……………………............
3. Why Graphical Passwords………………………………………….
4. Problem domain……………………………………………………...
5. Design of PassPoints…………………………………………………
6. Solution domain……………………………………………………...
7. System domain……………………………………………………….
8. Application domain…………………………………………………..
9. Color Choice Studey………………………………………………..
10. Methodology…………………………………………………………
11. Implementation………. …………………………………………………….
12. Result…………………………………………………………………
13. Expected domain……………………………………………………..
References:
Abstract
Graphical password to avoid shoulder shuffling (G-PASS) is software required by each
employer to manage and assigned task to their employees via continent and secure
medium. Graphical password to avoid shoulder shuffling (G-PASS) works on local LAN
instead of working on Web server; hence Graphical password to avoid shoulder shuffling
(G-PASS) provides a hazel free and secure solution. Emplon.of (G-PASS) allows
multiple users to plan, schedule, share, track and report tasks, appointments, projects,
business processes, and any company activities simultaneously through Local Network
(LAN) and also from Wind Area Network(WAN).
1
INTRODUCTION
The current system is the manual system in which tasks are allotted to Employees
manually or by using any mail client. The current system required multiple status mails
for a single task and we cannot easily manage that as well. There are no special notes or
reminder facility and we cannot even set any priority tasks. So the employees are not
aware of the importance of tasks. There is no role system and every employee enjoys
same set of permissions and restrictions. Graphical password to avoid shoulder shuffling
(G-PASS) is software required by each employer to manage and assigned task to their
employees via continent and secure medium. Graphical password to avoid shoulder
shuffling (G-PASS) works on local LAN instead of working on Web server; hence
Graphical password to avoid shoulder shuffling (G-PASS) provides a hazel free and
secure solution. Graphical password to avoid shoulder shuffling (G-PASS) allows
multiple users to plan, schedule, share, track and report tasks, appointments, projects,
business processes, and any company activities simultaneously through Local Network
(LAN).
Background on Passwords
Problems with Alphanumeric Passwords
The password problem arises largely from limitations of humans’ long-term memory
(LTM). Once a password has been chosen and learned the user must be able to recall it to
log in. But, people regularly forget their passwords. Decay and interference explain why
people forget their passwords. Items in memory may compete with a password and
prevent its accurate recall (Wixted, 2004). If a password is not used frequently it will be
even more susceptible to forgetting. A further complication is that users have many
passwords for computers, networks, and web sites. The large number of passwords
increases interference and is likely to lead to forgetting or confusing passwords.
1
Why Graphical Passwords?
Graphical passwords were originally described by Blonder (1996). In his description of
the concept an image would appear on the screen, and the user would click on a few
chosen regions of it. If the correct regions were clicked in, the user would be
authenticated.
Memory of passwords and efficiency of their input are two key human factors criteria.
Memorability has two aspects: how the user chooses and encodes the password and
what task the user does when later retrieving the password. In a graphical password
system, a user needs to choose memorable locations in an image. Choosing memorable
locations depends on the nature of the image itself and the specific sequence of click
locations. To support memorability, images should have semantically meaningful content
because meaning for arbitrary things is poor (Norman, 1988). This suggests that jumbled
or abstract images will be less memorable than concrete, realworld scenes. LTM does not
store a replica of the image itself, but rather a meaningful interpretation (Mandler &
Ritchey, 1977). To retrieve the locations a user will be dependent on the encoding used
while learning. A poor encoding will hurt retrieval by failing to distinguish similar
objects.
Design of PassPoints
Background on Graphical Password Systems
Here we discuss some graphical password systems based on recognition or cued recall of
images. Most existing systems are based on recognition. The best known of these systems
are Passfaces (Brostoff & Sasse, 2000; Real User Corporation, 2001) and Déjà Vu
(Dhamija & Perrig, 2000). Brostoff and Sasse (2000) carried out an empiricial study of
Passfaces, which illustrates well how a graphical password recognition system typically
operates. To create a password, the user chose four images of human faces from a
portfolio of faces. To log in the user saw a grid of nine faces, which included one face
previously chosen by the user and eight decoy faces. The user had to click anywhere on
the known face. This procedure was repeated with different target and decoy faces, for a
total of four rounds. If the user chose all four correct faces, he or she successfully logged
in. Data from this study suggest that Passfaces are more memorable than alphanumeric
passwords. A small study of the use of Déjà Vu came to the same conclusion. On the
other hand, passwords based on image recognition have a serious disadvantage. Only a
small number of faces can be displayed on each screen, e.g., in Passfaces nine faces. An
attacker has a 1-in-9 chance of guessing this passface. Consequently, the login process
requires repetitive rounds of face recognition. If four rounds are used the chance of
guessing the password is With a few thousand random guesses an attacker would be
likely to find the password. To increase security similar to that of 8-character
alphanumeric password, 1 or 10 rounds would be required. This could be slow and
annoying to the user.
1
PROBLEM DOMAIN
The current system used is manual system in which tasks are allotted to Employees
manually or by using any mail client. The current system required multiple status mails
for a single task and we cannot easily manage that as well. There are no special notes or
reminder facility and we cannot even set any priority tasks. So the employees are not
aware of the importance of tasks. There is no role system and every employee enjoys
samesetofpermissionsandrestrictions.
SOLUTION DOMAIN
To overcome this problem our team decided to develop a software which we called as
Graphical password to avoid shoulder shuffling (G-PASS). Graphical password to avoid
1
shoulder shuffling (G-PASS) allows multiple users to plan, schedule, share, track and
report tasks, appointments, projects, business processes, and any company activities
simultaneously through Local Network (LAN). Graphical password to avoid shoulder
shuffling (G-PASS) is software required by each employer to manage and assigned task
to their employees via continent and secure medium. Graphical password to avoid
shoulder shuffling (G-PASS) works on local LAN instead of working on Web server;
hence Graphical password to avoid shoulder shuffling (G-PASS) provides a hazel free
and secure solution
4. SYSTEM DOMAIN
Graphical Password To Avoid Shoulder Shuffling (G-PASS) will be developed using:
• Java Technology.
• HTML Contains.
• CSS Animation.
• AJAX Contains.
• JavaScript.
• Backend will be based on SQL SERVER.
• Since Graphical password to avoid shoulder shuffling (G-PASS) is LAN based
software it will require the Local Area Network to work and Java Technology.
SQL For Data Base Connection
APPLICATION DOMAIN
G-PASS software is being developed specifically for the businesses where employees
work on regular tasks. Basically it is targeted to the Service Based businesses where
Employees are regularly allotted a task and they need to report to their senior level.
Following are few of the points on which this software will be focused on:
1
•Create, Edit, Delete and Duplicate Tasks
• Create, Edit and Delete Employees' Accounts
• Allow or Deny Viewing, Creating, Editing, Deleting Tasks
• Assign Tasks to Task Groups
• Assign Tasks to Employees
• Set Task Recurrence
•Set Popup Reminder and Sound Alarm for Employees
• Create, Edit and Delete Notes
• Create, Edit and Delete Roles
COLOR CHOICE STUDY
The objective of this study was to understand the effect of different images on user
performance. Our question is how does varying the image affect success in graphical
password use. There is a dearth of knowledge about memorability of specific kinds of
images. First, to our knowledge, there is no theory or taxonomy of classes of images that
might structure image choice. Second, psychologists have studied images, but much of
the research has focused on the memorability of images compared to words and
sentences, i.e. the “picture superiority effect” . Studies of characteristics of images exist,
but are not highly directive for our purposes. Some research studies have investigated
image memorability in the context of free recall of images, others in the context of
recognition memory. These studies do not give us sufficient guidance about cued recall of
images, as used in Blonder-style systems such as PassPoints. We chose several everyday
images based on the existing psychological research and our own intuition, with the
purpose of gaining some initial knowledge about learnability and memorability when
using different images. Thus, this is an exploratory study.
BACKGROUND(LITERATURE REVIEW)
The term graphical password was originally introduced by Greg Blonder in 1996.
Graphical password is the password where user set his/her password as picture or image.
Graphical password has been proposed as an alternative to text based, because human
1
ability to recall pictures is more than text. Psychological studies had shown that people
can remember pictures better than text Picture. Text Images are generally easier to be
remembered or recognized than text, especially images which are even easier to be
remembered than random images. Graphical passwords are divided into two important
categories:-
1. Recognition based techniques
2. Recall based techniques
A. Recognition based technique:- In this technique user is presented with a number of
images and user have to select an images among them as password. At the time of
authentication user have to recognize their registration choice image. In this section we
describe merit and demerit of some recognition techniques
1. Passcolor Scheme:-
METHODOLOGY
Proposed system mainly consists of two authentication
step. 1. Is in the time of Registration and
2. At the time of uploading or downloading file (or an accessing account). In proposed
system first user will create account by entering details such as Username, Textual
password, Email Id, Contact No.etc. Then in next window system use CaRP
authentication Scheme. In that system generate set of images for the user. & ask user to
select a correct graphical captcha. After selecting graphical captcha if this captcha is
correct user can enter into the account otherwise not. In next while accessing account if
user want to set the security for his/her files. Then he can set using the next
authentication process. In that system will ask user that do you want security? If answer
is yes then an image is presented to user and user has to select click-point as the
password. And next time if the click-point is correct then & then he can upload &
download files from the account
Discussion
Participants had little difficulty creating a valid graphical password, but learning their
password via repeated password inputs posed challenges to some. While there were no
significant differences, there appeared to be a trend for individuals in the smaller
tolerance to make more errors and for the input time for their erroneous password
attempts to take longer. Another indicator of this trend is the long trail of participants
who took many practice trials in the smaller tolerance (Table 3). The two tolerance
groups were essentially equivalent in the number of individuals who input their password
10 times with no errors. In the larger tolerance group 15 of 16 individuals met the
criterion of 10 correct inputs with 2 errors or less. In the smaller tolerance group only 8
participants met the criterion with 2 errors or less. The other 8 participants took from 3 to
25 incorrect password inputs before achieving the 10 correct trials. Using a graphical
password was new to the participants and we expected errors in the learning phase, but
the long trail of errors in the 10 х 10 group is quite striking. The difficulties that users had
in the 10 х 10 group were also reflected in several of the questionnaire items, in which
they tended to have poorer perceptions on key items, such as ability to input the password
correctly, ease of using the password, and pleasantness of using the password system. On
the other hand, it should be noted that the time for participants in the two groups to input
1
IMPLEMENTATION
Step 1. Start
Step 2. User can register by username, password, Email-id Contact no.
Step 3. Computer generate graphical captcha for registered user
Step 4. User will select Captcha
Step 5. Authentication of User: User will enter his details Which he entered at the time of
registration Step 6. Computer program ask the user to choose the correct graphical
Captcha
Step 7. User selects the graphical captch
Step 8. Is selected image captcha is correct? 1. If Yes
Step 9. User can access his account. Step I: User can Upload & Download file From File
Storage Step II: If User Want Security for Individual File. Login step -User click on point
of image & Set the Security for individual file 2. if NO
Step 10. User can login again
Step 11. Stop.
RESULT
In testing session, 15 completed with no mistakes in proposed CaRP method based on
File store while the others, to a greater or less extent, made some incorrect submissions.
This captcha method gain best human success rate 92%. 75% of test participant say that
CARP is easy to use. Or also no complicated operation on password. Or easy to
remember than other text or graphical, captcha passwords High Human success rate
shows that less chances of requiring multiple attempts of captcha to access account. This
comparison shows that proposed CaRP (Captcha as a graphical password) system is user
friendly, easy to use, language independent.
EXPECTED OUTCOME
• Admin will be able to create employee accounts
• Admin will be able to assign tasks to employees
1
• Employees or team members will be able to complete the task and submit report
• Employee will be able to manage notes
• Submitted reports are visible to admin
• Admin will review the task report and revert to employee
• Tasks can be re-assigned or marked as complete.
CONCLUSION
Alternative to textual password is graphical password. In this paper, a survey over
existing graphical password protection techniques and Captcha techniques has been
presented. A review over the advantages and limitation of the password protection
techniques is also presented. The goal of this research is study the existing graphical
password techniques and captcha techniques & develop a new improved graphical
password technique combined with a CaRP. CaRP introduces new primitive of graphical
password. Also password of system will easy to remember and highly secure. CaRP is
built on Captcha technology. which take random images at all time. This survey on
existing techniques will help in developing more efficient & secure graphical password
based authentication schemes to provide the better security to the user data. The proposed
system consists of text password, CaRP authentication scheme and individual graphical
password technique. This technique is highly secure. It provides protection from various
1
References:
The reference must be completely mentioned in the list and cite in the text of the synopsis
above. There should be at least 5 latest references. Formats (it is just like IEEE style ) are
as under:
Some Links :-
1) W3c School
2) JavaTpoint
3) Tutorials point
4) Java Concepts
Some Web Sites :-
1) www.graphicalsystem.in
2) www.passwordworld.com
Some Other Use Full Books And Authors :-
[1] Authors’ name(s), “Paper Title,” Journal’s Name, Vol._, No_, Month, Year, pp.
[2] Authors’ name(s),“Paper Title,” Proceedings of <Conference Name>, Place, Date, pp.
[3] Authors’ name(s), Book Title, Edition No. Publisher, Year, pp.
[4] www.websitename.com , the title of the white paper/ any other documents.

More Related Content

Similar to Synopsis

finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
Graphical password
Graphical passwordGraphical password
Graphical password
sowji888
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
Love Kothari
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
Umesh Kumar
 
Graphical password
Graphical passwordGraphical password
Graphical password
vitam,berhampur
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
IRJET Journal
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
RohitSabale4
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
IOSR Journals
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
IJNSA Journal
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
cscpconf
 
Usenix04
Usenix04Usenix04
Usenix04
981nikhil
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
Geetha982072
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 

Similar to Synopsis (20)

finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDSUSER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Usenix04
Usenix04Usenix04
Usenix04
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Synopsis

  • 1. Srajan Institute of Technology Management & Science Minor Project Synopsis Session: 2016-2017 Submitted To: Submitted By: Mr.Deepak Tiwari Love Kothari & 1
  • 2. Table of contents Abstract 1. Introduction………………………………………………………….. 2. Problems with Alphanumeric Passwords……………………............ 3. Why Graphical Passwords…………………………………………. 4. Problem domain……………………………………………………... 5. Design of PassPoints………………………………………………… 6. Solution domain……………………………………………………... 7. System domain………………………………………………………. 8. Application domain………………………………………………….. 9. Color Choice Studey……………………………………………….. 10. Methodology………………………………………………………… 11. Implementation………. ……………………………………………………. 12. Result………………………………………………………………… 13. Expected domain…………………………………………………….. References:
  • 3. Abstract Graphical password to avoid shoulder shuffling (G-PASS) is software required by each employer to manage and assigned task to their employees via continent and secure medium. Graphical password to avoid shoulder shuffling (G-PASS) works on local LAN instead of working on Web server; hence Graphical password to avoid shoulder shuffling (G-PASS) provides a hazel free and secure solution. Emplon.of (G-PASS) allows multiple users to plan, schedule, share, track and report tasks, appointments, projects, business processes, and any company activities simultaneously through Local Network (LAN) and also from Wind Area Network(WAN). 1
  • 4. INTRODUCTION The current system is the manual system in which tasks are allotted to Employees manually or by using any mail client. The current system required multiple status mails for a single task and we cannot easily manage that as well. There are no special notes or reminder facility and we cannot even set any priority tasks. So the employees are not aware of the importance of tasks. There is no role system and every employee enjoys same set of permissions and restrictions. Graphical password to avoid shoulder shuffling (G-PASS) is software required by each employer to manage and assigned task to their employees via continent and secure medium. Graphical password to avoid shoulder shuffling (G-PASS) works on local LAN instead of working on Web server; hence Graphical password to avoid shoulder shuffling (G-PASS) provides a hazel free and secure solution. Graphical password to avoid shoulder shuffling (G-PASS) allows multiple users to plan, schedule, share, track and report tasks, appointments, projects, business processes, and any company activities simultaneously through Local Network (LAN).
  • 5. Background on Passwords Problems with Alphanumeric Passwords The password problem arises largely from limitations of humans’ long-term memory (LTM). Once a password has been chosen and learned the user must be able to recall it to log in. But, people regularly forget their passwords. Decay and interference explain why people forget their passwords. Items in memory may compete with a password and prevent its accurate recall (Wixted, 2004). If a password is not used frequently it will be even more susceptible to forgetting. A further complication is that users have many passwords for computers, networks, and web sites. The large number of passwords increases interference and is likely to lead to forgetting or confusing passwords. 1
  • 6. Why Graphical Passwords? Graphical passwords were originally described by Blonder (1996). In his description of the concept an image would appear on the screen, and the user would click on a few chosen regions of it. If the correct regions were clicked in, the user would be authenticated. Memory of passwords and efficiency of their input are two key human factors criteria. Memorability has two aspects: how the user chooses and encodes the password and what task the user does when later retrieving the password. In a graphical password system, a user needs to choose memorable locations in an image. Choosing memorable locations depends on the nature of the image itself and the specific sequence of click locations. To support memorability, images should have semantically meaningful content because meaning for arbitrary things is poor (Norman, 1988). This suggests that jumbled or abstract images will be less memorable than concrete, realworld scenes. LTM does not store a replica of the image itself, but rather a meaningful interpretation (Mandler & Ritchey, 1977). To retrieve the locations a user will be dependent on the encoding used while learning. A poor encoding will hurt retrieval by failing to distinguish similar objects.
  • 7. Design of PassPoints Background on Graphical Password Systems Here we discuss some graphical password systems based on recognition or cued recall of images. Most existing systems are based on recognition. The best known of these systems are Passfaces (Brostoff & Sasse, 2000; Real User Corporation, 2001) and Déjà Vu (Dhamija & Perrig, 2000). Brostoff and Sasse (2000) carried out an empiricial study of Passfaces, which illustrates well how a graphical password recognition system typically operates. To create a password, the user chose four images of human faces from a portfolio of faces. To log in the user saw a grid of nine faces, which included one face previously chosen by the user and eight decoy faces. The user had to click anywhere on the known face. This procedure was repeated with different target and decoy faces, for a total of four rounds. If the user chose all four correct faces, he or she successfully logged in. Data from this study suggest that Passfaces are more memorable than alphanumeric passwords. A small study of the use of Déjà Vu came to the same conclusion. On the other hand, passwords based on image recognition have a serious disadvantage. Only a small number of faces can be displayed on each screen, e.g., in Passfaces nine faces. An attacker has a 1-in-9 chance of guessing this passface. Consequently, the login process requires repetitive rounds of face recognition. If four rounds are used the chance of guessing the password is With a few thousand random guesses an attacker would be likely to find the password. To increase security similar to that of 8-character alphanumeric password, 1 or 10 rounds would be required. This could be slow and annoying to the user. 1
  • 8. PROBLEM DOMAIN The current system used is manual system in which tasks are allotted to Employees manually or by using any mail client. The current system required multiple status mails for a single task and we cannot easily manage that as well. There are no special notes or reminder facility and we cannot even set any priority tasks. So the employees are not aware of the importance of tasks. There is no role system and every employee enjoys samesetofpermissionsandrestrictions.
  • 9. SOLUTION DOMAIN To overcome this problem our team decided to develop a software which we called as Graphical password to avoid shoulder shuffling (G-PASS). Graphical password to avoid 1
  • 10. shoulder shuffling (G-PASS) allows multiple users to plan, schedule, share, track and report tasks, appointments, projects, business processes, and any company activities simultaneously through Local Network (LAN). Graphical password to avoid shoulder shuffling (G-PASS) is software required by each employer to manage and assigned task to their employees via continent and secure medium. Graphical password to avoid shoulder shuffling (G-PASS) works on local LAN instead of working on Web server; hence Graphical password to avoid shoulder shuffling (G-PASS) provides a hazel free and secure solution 4. SYSTEM DOMAIN Graphical Password To Avoid Shoulder Shuffling (G-PASS) will be developed using: • Java Technology. • HTML Contains. • CSS Animation. • AJAX Contains. • JavaScript. • Backend will be based on SQL SERVER.
  • 11. • Since Graphical password to avoid shoulder shuffling (G-PASS) is LAN based software it will require the Local Area Network to work and Java Technology. SQL For Data Base Connection APPLICATION DOMAIN G-PASS software is being developed specifically for the businesses where employees work on regular tasks. Basically it is targeted to the Service Based businesses where Employees are regularly allotted a task and they need to report to their senior level. Following are few of the points on which this software will be focused on: 1
  • 12. •Create, Edit, Delete and Duplicate Tasks • Create, Edit and Delete Employees' Accounts • Allow or Deny Viewing, Creating, Editing, Deleting Tasks • Assign Tasks to Task Groups • Assign Tasks to Employees • Set Task Recurrence •Set Popup Reminder and Sound Alarm for Employees • Create, Edit and Delete Notes • Create, Edit and Delete Roles COLOR CHOICE STUDY The objective of this study was to understand the effect of different images on user performance. Our question is how does varying the image affect success in graphical password use. There is a dearth of knowledge about memorability of specific kinds of images. First, to our knowledge, there is no theory or taxonomy of classes of images that might structure image choice. Second, psychologists have studied images, but much of
  • 13. the research has focused on the memorability of images compared to words and sentences, i.e. the “picture superiority effect” . Studies of characteristics of images exist, but are not highly directive for our purposes. Some research studies have investigated image memorability in the context of free recall of images, others in the context of recognition memory. These studies do not give us sufficient guidance about cued recall of images, as used in Blonder-style systems such as PassPoints. We chose several everyday images based on the existing psychological research and our own intuition, with the purpose of gaining some initial knowledge about learnability and memorability when using different images. Thus, this is an exploratory study. BACKGROUND(LITERATURE REVIEW) The term graphical password was originally introduced by Greg Blonder in 1996. Graphical password is the password where user set his/her password as picture or image. Graphical password has been proposed as an alternative to text based, because human 1
  • 14. ability to recall pictures is more than text. Psychological studies had shown that people can remember pictures better than text Picture. Text Images are generally easier to be remembered or recognized than text, especially images which are even easier to be remembered than random images. Graphical passwords are divided into two important categories:- 1. Recognition based techniques 2. Recall based techniques A. Recognition based technique:- In this technique user is presented with a number of images and user have to select an images among them as password. At the time of authentication user have to recognize their registration choice image. In this section we describe merit and demerit of some recognition techniques 1. Passcolor Scheme:- METHODOLOGY Proposed system mainly consists of two authentication step. 1. Is in the time of Registration and
  • 15. 2. At the time of uploading or downloading file (or an accessing account). In proposed system first user will create account by entering details such as Username, Textual password, Email Id, Contact No.etc. Then in next window system use CaRP authentication Scheme. In that system generate set of images for the user. & ask user to select a correct graphical captcha. After selecting graphical captcha if this captcha is correct user can enter into the account otherwise not. In next while accessing account if user want to set the security for his/her files. Then he can set using the next authentication process. In that system will ask user that do you want security? If answer is yes then an image is presented to user and user has to select click-point as the password. And next time if the click-point is correct then & then he can upload & download files from the account Discussion Participants had little difficulty creating a valid graphical password, but learning their password via repeated password inputs posed challenges to some. While there were no significant differences, there appeared to be a trend for individuals in the smaller tolerance to make more errors and for the input time for their erroneous password attempts to take longer. Another indicator of this trend is the long trail of participants who took many practice trials in the smaller tolerance (Table 3). The two tolerance groups were essentially equivalent in the number of individuals who input their password 10 times with no errors. In the larger tolerance group 15 of 16 individuals met the criterion of 10 correct inputs with 2 errors or less. In the smaller tolerance group only 8 participants met the criterion with 2 errors or less. The other 8 participants took from 3 to 25 incorrect password inputs before achieving the 10 correct trials. Using a graphical password was new to the participants and we expected errors in the learning phase, but the long trail of errors in the 10 х 10 group is quite striking. The difficulties that users had in the 10 х 10 group were also reflected in several of the questionnaire items, in which they tended to have poorer perceptions on key items, such as ability to input the password correctly, ease of using the password, and pleasantness of using the password system. On the other hand, it should be noted that the time for participants in the two groups to input 1
  • 16. IMPLEMENTATION Step 1. Start Step 2. User can register by username, password, Email-id Contact no. Step 3. Computer generate graphical captcha for registered user Step 4. User will select Captcha Step 5. Authentication of User: User will enter his details Which he entered at the time of registration Step 6. Computer program ask the user to choose the correct graphical Captcha Step 7. User selects the graphical captch Step 8. Is selected image captcha is correct? 1. If Yes Step 9. User can access his account. Step I: User can Upload & Download file From File Storage Step II: If User Want Security for Individual File. Login step -User click on point of image & Set the Security for individual file 2. if NO Step 10. User can login again Step 11. Stop. RESULT In testing session, 15 completed with no mistakes in proposed CaRP method based on File store while the others, to a greater or less extent, made some incorrect submissions. This captcha method gain best human success rate 92%. 75% of test participant say that CARP is easy to use. Or also no complicated operation on password. Or easy to remember than other text or graphical, captcha passwords High Human success rate shows that less chances of requiring multiple attempts of captcha to access account. This
  • 17. comparison shows that proposed CaRP (Captcha as a graphical password) system is user friendly, easy to use, language independent. EXPECTED OUTCOME • Admin will be able to create employee accounts • Admin will be able to assign tasks to employees 1
  • 18. • Employees or team members will be able to complete the task and submit report • Employee will be able to manage notes • Submitted reports are visible to admin • Admin will review the task report and revert to employee • Tasks can be re-assigned or marked as complete. CONCLUSION Alternative to textual password is graphical password. In this paper, a survey over existing graphical password protection techniques and Captcha techniques has been presented. A review over the advantages and limitation of the password protection techniques is also presented. The goal of this research is study the existing graphical
  • 19. password techniques and captcha techniques & develop a new improved graphical password technique combined with a CaRP. CaRP introduces new primitive of graphical password. Also password of system will easy to remember and highly secure. CaRP is built on Captcha technology. which take random images at all time. This survey on existing techniques will help in developing more efficient & secure graphical password based authentication schemes to provide the better security to the user data. The proposed system consists of text password, CaRP authentication scheme and individual graphical password technique. This technique is highly secure. It provides protection from various 1
  • 20. References: The reference must be completely mentioned in the list and cite in the text of the synopsis above. There should be at least 5 latest references. Formats (it is just like IEEE style ) are as under: Some Links :- 1) W3c School 2) JavaTpoint 3) Tutorials point 4) Java Concepts Some Web Sites :- 1) www.graphicalsystem.in 2) www.passwordworld.com Some Other Use Full Books And Authors :- [1] Authors’ name(s), “Paper Title,” Journal’s Name, Vol._, No_, Month, Year, pp. [2] Authors’ name(s),“Paper Title,” Proceedings of <Conference Name>, Place, Date, pp. [3] Authors’ name(s), Book Title, Edition No. Publisher, Year, pp. [4] www.websitename.com , the title of the white paper/ any other documents.