SlideShare a Scribd company logo
1 of 16
Graphical Password
 Authentication System with
association of Sound Signature



Under the Supervision of   By
Shilpi Sharma              Vikram Verma
(Assistant Professor)      (A2300912017)
Aim:
Implement a system to generate graphical password & associate
sound signature to enhance security.
Existing Graphical Password Systems

  •   Recognition Based Technique
  •   Passfaces
  •   Convex Hull of Pass Objects
  •   Et- al Graphical Password
  •   Draw a secret
Recognition based technique
Passface
Convex Hull of Pass Objects
Et-al Graphical Password
Draw a Secret
Present Systems Comparision
        Technique                       Usability                         Drawback
   Text based Passwords           Typing alpha numeric          Dictionary attack, brute force
                                       password                    search, guess, spyware,
                                                                      shoulder surfing.

Recognition based technique    Pick several pass-pictures out   Takes longer to create than text
                                     of many choices.            password, creates heavy load
                                                                  on database to store many
                                                                           images.

     Passface technique        Recognize and pick the pre-      Very much predictable, creates
                                 registered face images.            load of decoy faces on
                                                                           database.

Convex hull formed by pass        Click within an area          Hard to remember when large
         objects                bounded by pre-registered          numbers of objects are
                                     picture objects                      involved.

Man et-al graphical password      Type in the code of pre-         Needs to memorize both
                                 registered picture objects     picture objects and their codes.
                                                                More difficult than text-based
                                                                           password

       Draw a secret            Users draw something on a          User studies showed the
                                         2D grid                 drawing sequence is hard to
                                                                          remember
Proposed System
The system intends to create a graphical
password using a single/multiple images and
associate a sound file.
Password is generated by assigning click points
in each image and associating sound file above
that SQL server is used to maintain users and
provide another security layer.
Proposed
              System Modules
• User Maintenance
      The users are registered with the SQL
Server database.
• Graph password Generator
     The module allows the user to generate
password from image. The user clicks on the
image to generate strokes, which are stored in
database.
• Associate Sound Signature
     This module allows the end user to choose
an audio file at runtime. The file is converted to
binary form and then it is associated with the
graphical password.
• Data Protection and Non-protection
     This module allows the user to specify text
content or file at runtime for whom data
protection is to be provided and also specifies
the container image to perform steganography.
Use Case Diagram
Activity Diagram
Advantages of proposed system
• Click points are used as passwords thus load on
  database is very low.
• Matrix of images for creating graphical passwords
  is used which adds an additional level of security.
• Sound signature strengthens graphical passwords
• Encoding and decoding hides data in unreadable
  form.
• User accounts stored in RDBMS which further
  enhances security as hacker cannot access or
  create own account.
Thank you!!
     

More Related Content

What's hot

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDKarishma Khan
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor reportLove Kothari
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication ProtocolsTrinity Dwarka
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Achieving quality contraints
Achieving quality contraintsAchieving quality contraints
Achieving quality contraintsK Senthil Kumar
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Deepak Yadav
 

What's hot (20)

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
3d passwords
3d passwords3d passwords
3d passwords
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Achieving quality contraints
Achieving quality contraintsAchieving quality contraints
Achieving quality contraints
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 

Viewers also liked

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical passwordGopinath Ramanna
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Denial of password guessing attack using turing test
Denial of password guessing attack using turing testDenial of password guessing attack using turing test
Denial of password guessing attack using turing testVikram Verma
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkarsamarai_apoc
 
Improving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingImproving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingAnna Russo
 

Viewers also liked (15)

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
11aman
11aman11aman
11aman
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Denial of password guessing attack using turing test
Denial of password guessing attack using turing testDenial of password guessing attack using turing test
Denial of password guessing attack using turing test
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkar
 
SSDT unleashed
SSDT unleashedSSDT unleashed
SSDT unleashed
 
Improving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester TrainingImproving Software Quality- 2-day Tester Training
Improving Software Quality- 2-day Tester Training
 

Similar to Graphical password authentication system with association of sound

Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptxRohitSabale4
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxGeetha982072
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfKumudhaKumar1
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Ayisha M Kalburgi
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...Mark Matienzo
 
Reversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationReversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationAswin Raju
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Snehal Wankhede
 
A Lap Around Silverlight 5
A Lap Around Silverlight 5A Lap Around Silverlight 5
A Lap Around Silverlight 5Frank La Vigne
 
Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11영호 라
 

Similar to Graphical password authentication system with association of sound (20)

Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 
Graphical authentication system.pptx
Graphical authentication system.pptxGraphical authentication system.pptx
Graphical authentication system.pptx
 
558 120127064951-phpapp01
558 120127064951-phpapp01558 120127064951-phpapp01
558 120127064951-phpapp01
 
Nilesh
Nilesh Nilesh
Nilesh
 
graphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptxgraphicalpswrdauth-130518230955-phpapp02.pptx
graphicalpswrdauth-130518230955-phpapp02.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...Defence against large scale online guessing attacks using persuasive cued cli...
Defence against large scale online guessing attacks using persuasive cued cli...
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
 
Reversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationReversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulation
 
Poster fyp 047072
Poster fyp 047072Poster fyp 047072
Poster fyp 047072
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-Graphicalpasswordauthentication 130907104619-
Graphicalpasswordauthentication 130907104619-
 
A Lap Around Silverlight 5
A Lap Around Silverlight 5A Lap Around Silverlight 5
A Lap Around Silverlight 5
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11
 

Graphical password authentication system with association of sound

  • 1. Graphical Password Authentication System with association of Sound Signature Under the Supervision of By Shilpi Sharma Vikram Verma (Assistant Professor) (A2300912017)
  • 2. Aim: Implement a system to generate graphical password & associate sound signature to enhance security.
  • 3. Existing Graphical Password Systems • Recognition Based Technique • Passfaces • Convex Hull of Pass Objects • Et- al Graphical Password • Draw a secret
  • 6. Convex Hull of Pass Objects
  • 9. Present Systems Comparision Technique Usability Drawback Text based Passwords Typing alpha numeric Dictionary attack, brute force password search, guess, spyware, shoulder surfing. Recognition based technique Pick several pass-pictures out Takes longer to create than text of many choices. password, creates heavy load on database to store many images. Passface technique Recognize and pick the pre- Very much predictable, creates registered face images. load of decoy faces on database. Convex hull formed by pass Click within an area Hard to remember when large objects bounded by pre-registered numbers of objects are picture objects involved. Man et-al graphical password Type in the code of pre- Needs to memorize both registered picture objects picture objects and their codes. More difficult than text-based password Draw a secret Users draw something on a User studies showed the 2D grid drawing sequence is hard to remember
  • 10. Proposed System The system intends to create a graphical password using a single/multiple images and associate a sound file. Password is generated by assigning click points in each image and associating sound file above that SQL server is used to maintain users and provide another security layer.
  • 11. Proposed System Modules • User Maintenance The users are registered with the SQL Server database. • Graph password Generator The module allows the user to generate password from image. The user clicks on the image to generate strokes, which are stored in database.
  • 12. • Associate Sound Signature This module allows the end user to choose an audio file at runtime. The file is converted to binary form and then it is associated with the graphical password. • Data Protection and Non-protection This module allows the user to specify text content or file at runtime for whom data protection is to be provided and also specifies the container image to perform steganography.
  • 15. Advantages of proposed system • Click points are used as passwords thus load on database is very low. • Matrix of images for creating graphical passwords is used which adds an additional level of security. • Sound signature strengthens graphical passwords • Encoding and decoding hides data in unreadable form. • User accounts stored in RDBMS which further enhances security as hacker cannot access or create own account.
  • 16. Thank you!!