SlideShare a Scribd company logo
1 of 6
Download to read offline
DESIGN AND IMPLEMENTATION OF PERSUASIVE CUED
              CLICK-POINTS AND EVALUATION OF A
   KNOWLEDGE-BASED AUTHENTICATION MECHANISM


OBJECTIVE:


      The objective of this project is to provide the security for any websites by
using graphical passwords with view port and persuasive cued click-points.


PROBLEM DEFINITION:


      The problem with this scheme is that the number of predefined regions is
small, perhaps a few dozens in a picture. The password may have to be up to 12
clicks for adequate security, again tedious for the user. Another problem of this
system is the need for the predefined regions to be readily identifiable.


ABSTRACT:


      In this project, a graphical password system with a supportive sound
signature to increase the remembrance of the password is discussed. In proposed
work a click-based graphical password scheme called Cued Click Points (CCP) is
presented. In this system a password consists of sequence of some images in which
user can select one click-point per image. In addition user is asked to select a
sound signature corresponding to each click point this sound signature will be used
to help the user in recalling the click point on an image.
EXISTING SYSTEM:


      In the existing system, Brostoff and sasse carried out an empirical study of
passfaces, which illustrates well how a graphical password recognition system
typically operates. Blonder-style passwords are based on cued recall. A user clicks
on several previously chosen locations in a single image to log in. As implemented
by Passlogix Corporation, the user chooses several predefined regions in an image
as his or her password. To log in the user has to click on the same regions in effect,
cued click points (ccp) is a proposed alternative to passpoints. In ccp, users click
one point on each of 5 images rather than on five points on one image. It offers
cued-recall and introduces visual cues that instantly alert valid users if they have
made a mistake when entering their latest click-point (at which point they can
cancel their attempt and retry from the beginning). It also makes attacks based on
hotspot analysis more challenging. Each click results in showing a next-image, in
Effect leading users down a “path” as they click on their sequence of points. A
wrong click leads down an incorrect path, with an explicit indication of
authentication failure only after the final click. Users can choose their images only
to the extent that their click-point dictates the next image.


      While the predictability problem can be solved by disallowing user choice
and assigning passwords to users, this usually leads to usability issues since users
cannot easily remember such random passwords. Number of graphical password
systems have been developed, Study shows that text-based passwords suffers with
both security and usability problems
DISADVANTAGE:


      The problem with this scheme is that the number of predefined regions is
small, perhaps a few dozens in a picture. The password may have to be up to 12
clicks for adequate security, again tedious for the user. Another problem of this
system is the need for the predefined regions to be readily identifiable.


PROPOSED SYSTEM:


      In the proposed work we have integrated sound signature to help in recalling
the password. No system has been devolved so far which uses sound signature in
graphical password authentication. Study says that sound signature or tone can be
used to recall facts like images, text. In daily life we see various examples of
recalling an object by the sound related to that object enters User ID and select one
sound frequency which he want to be played at login time, a tolerance value is also
selected with will decide that the user is legitimate or an imposter. To create
detailed vector user has to select sequence of images and clicks on each image at
click points of his choice. Profile vector is created.


ADVANTAGE:


           To create detailed vector user has to select sequence of images and
             clicks on each image at click points of his choice. Profile vector is
             created.
 Users preferred CCP to Pass Points, saying that selecting and
       remembering only one point per image was easier and sound signature
       helps considerably in recalling the click points.
      System showed very good Performance in terms of speed, accuracy,
       and ease of use.


SYSTEM FLOW CHART:
Registration                             Login trail
             Process

                                                    Read User ID

      Get unique user ID from
               user                           Fetch User profile vector



       Select sound signature                  Show Image from user
                                                       profile
                                              Detect mouse position on
        Select tolerance level                        Image


            Select image                            If mouse
                                                    position=us
                                                    er profile
     Select & click on pass point


                                                Play sound signature
            Want More
            image
                                                 Play random sound



                                             Get click points and prepare
             No.of                                   login vector
             image<5


                                               Compare login and user
                                                     Vector
        Create User Profile
              vector
                                    Log on            If d<D                Imposter


       User Profile Vector




ALGORITHM USED:
1. MD 5(Message-Digest)
   2. DES(Data Encryption Standard)


SYSTEM REQUIREMENTS:


   Hardware Requirements:

             • System            : Pentium IV 2.4 GHz.
             • Hard Disk         : 40 GB.
             • Floppy Drive      : 1.44 Mb.
             • Monitor           : 15 VGA Colour.
             • Mouse             : Logitech.
             • Ram               : 512 Mb.


   Software Requirements:

             • Operating system : Windows XP.
             • Coding Language : ASP.Net with C#.
             • Data Base         : SQL Server 2005.


 APPLICATIONS:
   1. Secured Online Access.
   2. Multilevel Security For Remote Access.
   3. Security For Banking Sectors.

More Related Content

What's hot

Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Graphical password
Graphical passwordGraphical password
Graphical passwordsowji888
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password taniamutholil
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 

What's hot (20)

Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
11aman
11aman11aman
11aman
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 

Similar to Psdot 2 design and implementation of persuasive cued click-points and evaluation of a

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...AbhilashPasupula
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
Cued Click Point Authentication
Cued Click Point AuthenticationCued Click Point Authentication
Cued Click Point AuthenticationNouman Baloch
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 

Similar to Psdot 2 design and implementation of persuasive cued click-points and evaluation of a (20)

Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Defenses against large scale online password guessing attacks by using persu...
Defenses against large scale online password guessing attacks by using  persu...Defenses against large scale online password guessing attacks by using  persu...
Defenses against large scale online password guessing attacks by using persu...
 
An03402300234
An03402300234An03402300234
An03402300234
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
Research ppr
Research pprResearch ppr
Research ppr
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Cued Click Point Authentication
Cued Click Point AuthenticationCued Click Point Authentication
Cued Click Point Authentication
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 

More from ZTech Proje

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyZTech Proje
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...ZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...ZTech Proje
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualZTech Proje
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyZTech Proje
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...ZTech Proje
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...ZTech Proje
 

More from ZTech Proje (20)

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 

Psdot 2 design and implementation of persuasive cued click-points and evaluation of a

  • 1. DESIGN AND IMPLEMENTATION OF PERSUASIVE CUED CLICK-POINTS AND EVALUATION OF A KNOWLEDGE-BASED AUTHENTICATION MECHANISM OBJECTIVE: The objective of this project is to provide the security for any websites by using graphical passwords with view port and persuasive cued click-points. PROBLEM DEFINITION: The problem with this scheme is that the number of predefined regions is small, perhaps a few dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the user. Another problem of this system is the need for the predefined regions to be readily identifiable. ABSTRACT: In this project, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image.
  • 2. EXISTING SYSTEM: In the existing system, Brostoff and sasse carried out an empirical study of passfaces, which illustrates well how a graphical password recognition system typically operates. Blonder-style passwords are based on cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by Passlogix Corporation, the user chooses several predefined regions in an image as his or her password. To log in the user has to click on the same regions in effect, cued click points (ccp) is a proposed alternative to passpoints. In ccp, users click one point on each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning). It also makes attacks based on hotspot analysis more challenging. Each click results in showing a next-image, in Effect leading users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Number of graphical password systems have been developed, Study shows that text-based passwords suffers with both security and usability problems
  • 3. DISADVANTAGE: The problem with this scheme is that the number of predefined regions is small, perhaps a few dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the user. Another problem of this system is the need for the predefined regions to be readily identifiable. PROPOSED SYSTEM: In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. Study says that sound signature or tone can be used to recall facts like images, text. In daily life we see various examples of recalling an object by the sound related to that object enters User ID and select one sound frequency which he want to be played at login time, a tolerance value is also selected with will decide that the user is legitimate or an imposter. To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created. ADVANTAGE:  To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created.
  • 4.  Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.  System showed very good Performance in terms of speed, accuracy, and ease of use. SYSTEM FLOW CHART:
  • 5. Registration Login trail Process Read User ID Get unique user ID from user Fetch User profile vector Select sound signature Show Image from user profile Detect mouse position on Select tolerance level Image Select image If mouse position=us er profile Select & click on pass point Play sound signature Want More image Play random sound Get click points and prepare No.of login vector image<5 Compare login and user Vector Create User Profile vector Log on If d<D Imposter User Profile Vector ALGORITHM USED:
  • 6. 1. MD 5(Message-Digest) 2. DES(Data Encryption Standard) SYSTEM REQUIREMENTS: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. Software Requirements: • Operating system : Windows XP. • Coding Language : ASP.Net with C#. • Data Base : SQL Server 2005. APPLICATIONS: 1. Secured Online Access. 2. Multilevel Security For Remote Access. 3. Security For Banking Sectors.