Three Level Security System Using Image Based Aunthentication

Preview:

Citation preview

loading

WELCOME

THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION

PRESENTED BY: K. JAYARAM B. SASIKARAN K. VADIVEL S. MOHAN BABU G. SATHISH

What is Security

CONTENTS Introduction Existing System Propose System Hardware Specification Software Specification SECURITY LEVEL 1 SECURITY LEVEL 2 SECURITY LEVEL 3 FLOW CHART

INTRODUCTION

Texts passwords are the most commonly used technique for authentication and have several drawbacks.

Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.

In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.

This authentication system employs the user’s personal handheld device as the second factor of authentication.

With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords. Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images.

Existing System

Security-sensitive environments protect their access

control mechanisms. resources against unauthorized access by enforcing

Text based passwords are not secure enough for such applications.

User authentication can be improved by using both

text passwords and structured images.

The existing system is Pass Points.

It proposed Passwords which could be composed of several points anywhere on an Image.

They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted

Propose System

A password authentication system should encourage strong

passwords while maintaining memo ability.

We propose that authentication schemes allow user choice while influencing users toward stronger passwords

In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach

HARDWARE SPECIFICATION

PROCESSOR : Dual CoreHARD DISK : 256 GBRAM : 1 GBKEYBOARD : 104 keys Standard KeyboardMONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse

SOFTWARE SPECIFICATION

Operating System : Windows XP, -Windows8Front end : JAVA SwingBack end : MYSQL

SECURITY LEVEL 1

Username Password & Color PattenSECURITY LEVEL 1

SECURITY LEVEL 2

Axis identifying the image SECURITY LEVEL 2

SECURITY LEVEL 3

Opt code & Character button SECURITY LEVEL 3

FLOW CHART

ANY QUERIES…..

?????

THANK U

by TEAM MEMBERS

END

Recommended