Three Level Security System Using Image Based Aunthentication
-
Upload
bro-jayaram -
Category
Education
-
view
43 -
download
1
Transcript of Three Level Security System Using Image Based Aunthentication
![Page 1: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/1.jpg)
loading
![Page 2: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/2.jpg)
WELCOME
![Page 3: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/3.jpg)
THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION
PRESENTED BY: K. JAYARAM B. SASIKARAN K. VADIVEL S. MOHAN BABU G. SATHISH
![Page 4: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/4.jpg)
What is Security
![Page 5: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/5.jpg)
CONTENTS Introduction Existing System Propose System Hardware Specification Software Specification SECURITY LEVEL 1 SECURITY LEVEL 2 SECURITY LEVEL 3 FLOW CHART
![Page 6: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/6.jpg)
INTRODUCTION
![Page 7: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/7.jpg)
Texts passwords are the most commonly used technique for authentication and have several drawbacks.
Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.
![Page 8: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/8.jpg)
In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.
This authentication system employs the user’s personal handheld device as the second factor of authentication.
![Page 9: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/9.jpg)
With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords. Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images.
![Page 10: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/10.jpg)
Existing System
![Page 11: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/11.jpg)
Security-sensitive environments protect their access
control mechanisms. resources against unauthorized access by enforcing
Text based passwords are not secure enough for such applications.
User authentication can be improved by using both
text passwords and structured images.
![Page 12: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/12.jpg)
The existing system is Pass Points.
It proposed Passwords which could be composed of several points anywhere on an Image.
They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted
![Page 13: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/13.jpg)
Propose System
![Page 14: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/14.jpg)
A password authentication system should encourage strong
passwords while maintaining memo ability.
We propose that authentication schemes allow user choice while influencing users toward stronger passwords
In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach
![Page 15: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/15.jpg)
HARDWARE SPECIFICATION
![Page 16: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/16.jpg)
PROCESSOR : Dual CoreHARD DISK : 256 GBRAM : 1 GBKEYBOARD : 104 keys Standard KeyboardMONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse
![Page 17: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/17.jpg)
SOFTWARE SPECIFICATION
![Page 18: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/18.jpg)
Operating System : Windows XP, -Windows8Front end : JAVA SwingBack end : MYSQL
![Page 19: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/19.jpg)
SECURITY LEVEL 1
![Page 20: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/20.jpg)
Username Password & Color PattenSECURITY LEVEL 1
![Page 21: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/21.jpg)
SECURITY LEVEL 2
![Page 22: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/22.jpg)
Axis identifying the image SECURITY LEVEL 2
![Page 23: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/23.jpg)
SECURITY LEVEL 3
![Page 24: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/24.jpg)
Opt code & Character button SECURITY LEVEL 3
![Page 25: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/25.jpg)
FLOW CHART
![Page 26: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/26.jpg)
![Page 27: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/27.jpg)
![Page 28: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/28.jpg)
ANY QUERIES…..
?????
![Page 29: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/29.jpg)
THANK U
![Page 30: Three Level Security System Using Image Based Aunthentication](https://reader035.fdocuments.in/reader035/viewer/2022070600/58abdb0f1a28ab212a8b52ff/html5/thumbnails/30.jpg)
by TEAM MEMBERS
END