SlideShare a Scribd company logo
loading
THREE LEVEL SECURITY SYSTEM
USING
IMAGE BASED AUTHENTICATION
What is Security
CONTENTS
 Introduction
 Existing System
 Propose System
 Hardware Specification
 Software Specification
 SECURITY LEVEL 1
 SECURITY LEVEL 2
 SECURITY LEVEL 3
 FLOW CHART
INTRODUCTION
 Texts passwords are the most commonly used
technique for authentication and have
several drawbacks.
 Graphical passwords provide a promising
alternative to traditional alphanumeric
passwords due to the fact that humans can
remember pictures better than text.
 In this paper, we propose a simple graphical
password authentication system that
consists of a sequence of ‘n’ images and the
user have to select the click points
associated with one of the ‘n’ image in
correct sequence for successful login.
 This authentication system employs the user’s
personal handheld device as the second factor of
authentication.
 With the increasing popularity of handheld
devices such as cell phones, our approach can
be leveraged by many organizations to
overcome threats such as key-loggers,
shoulder surfing, weak passwords.
 Click cued points is a click-based graphical password
scheme, a cued-recall graphical password technique.
 Users Click on one point per image for a sequence
of images.
Existing System
 Security-sensitive environments protect their access
control mechanisms. resources against
unauthorized access by enforcing
 Text based passwords are not secure enough for
such applications.
 User authentication can be improved by using both
 text passwords and structured images.
 The existing system is Pass Points.
 It proposed Passwords which could be
composed of several points anywhere on
an Image.
 They also proposed a scheme with
three overlapping grids, allowing for
login attempts that were approximately
correct to be accepted
Propose System
 A password authentication system should
encourage strong
 passwords while maintaining memo ability.
 We propose that authentication schemes allow
user choice while influencing users toward
stronger passwords
 In our system, the task of selecting weak
passwords (which are easy for attackers to
predict) is more tedious, discouraging users
from making such choices. In effect, this
approach
HARDWARE
SPECIFICATION
PROCESSOR : Dual Core
HARD DISK : 256 GB
RAM : 1 GB
KEYBOARD : 104 keys Standard Keyboard
MONITOR : 15” Color Monitor
MOUSE : Standard 3 Button Mouse
SOFTWARE
SPECIFICATION
Operating System : Windows XP,
-Windows8
Front end : JAVA Swing
Back end : MYSQL
SECURITY LEVEL 1
Username Password & Color Patten
SECURITY LEVEL 1
SECURITY LEVEL 2
Axis identifying the image
SECURITY LEVEL 2
SECURITY LEVEL 3
Opt code & Character button
SECURITY LEVEL 3
FLOW CHART
ANY QUERIES…..
?????
by
TEAM MEMBERS
END

More Related Content

What's hot

Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
SHA
SHASHA
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography document
Steganography documentSteganography document
Steganography document
BSheghembe
 
Graphical password
Graphical passwordGraphical password
Graphical password
vitam,berhampur
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
steganography
steganographysteganography
steganography
Manika Arora
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 

What's hot (20)

Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
SHA
SHASHA
SHA
 
Steganography
SteganographySteganography
Steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
steganography
steganographysteganography
steganography
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Cryptography
CryptographyCryptography
Cryptography
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Viewers also liked

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
Farah Shaikh
 
Cryptography
Cryptography Cryptography
IPsec
IPsecIPsec
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
Martin Bratina
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Ipsec
IpsecIpsec
Ipsec
IpsecIpsec
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
davisli
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (17)

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
IPsec
IPsecIPsec
IPsec
 
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Ipsec
IpsecIpsec
Ipsec
 
Ipsec
IpsecIpsec
Ipsec
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
IP Security
IP SecurityIP Security
IP Security
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Three Level Security System Using Image Based Aunthentication

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
IOSR Journals
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
IAESIJEECS
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
IJCSIS Research Publications
 
An03402300234
An03402300234An03402300234
An03402300234
ijceronline
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
AkashDongre7
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
eSAT Publishing House
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
Saurav Sinha
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
International Journal of Technical Research & Application
 
Research ppr
Research pprResearch ppr
Research ppr
Sara Sahu
 
J0704055058
J0704055058J0704055058
J0704055058
IJERD Editor
 

Similar to Three Level Security System Using Image Based Aunthentication (20)

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
An03402300234
An03402300234An03402300234
An03402300234
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Securing online password guessing attack
Securing online password guessing attackSecuring online password guessing attack
Securing online password guessing attack
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Research ppr
Research pprResearch ppr
Research ppr
 
J0704055058
J0704055058J0704055058
J0704055058
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Three Level Security System Using Image Based Aunthentication

  • 2.
  • 3. THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION
  • 5. CONTENTS  Introduction  Existing System  Propose System  Hardware Specification  Software Specification  SECURITY LEVEL 1  SECURITY LEVEL 2  SECURITY LEVEL 3  FLOW CHART
  • 7.  Texts passwords are the most commonly used technique for authentication and have several drawbacks.  Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.
  • 8.  In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.  This authentication system employs the user’s personal handheld device as the second factor of authentication.
  • 9.  With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords.  Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique.  Users Click on one point per image for a sequence of images.
  • 11.  Security-sensitive environments protect their access control mechanisms. resources against unauthorized access by enforcing  Text based passwords are not secure enough for such applications.  User authentication can be improved by using both  text passwords and structured images.
  • 12.  The existing system is Pass Points.  It proposed Passwords which could be composed of several points anywhere on an Image.  They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted
  • 14.  A password authentication system should encourage strong  passwords while maintaining memo ability.  We propose that authentication schemes allow user choice while influencing users toward stronger passwords  In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach
  • 16. PROCESSOR : Dual Core HARD DISK : 256 GB RAM : 1 GB KEYBOARD : 104 keys Standard Keyboard MONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse
  • 18. Operating System : Windows XP, -Windows8 Front end : JAVA Swing Back end : MYSQL
  • 20. Username Password & Color Patten SECURITY LEVEL 1
  • 22. Axis identifying the image SECURITY LEVEL 2
  • 24. Opt code & Character button SECURITY LEVEL 3
  • 26.
  • 27.
  • 29.