Graphical password authentication system with association of sound
1. Graphical Password
Authentication System with
association of Sound Signature
Under the Supervision of By
Shilpi Sharma Vikram Verma
(Assistant Professor) (A2300912017)
2. Aim:
Implement a system to generate graphical password & associate
sound signature to enhance security.
3. Existing Graphical Password Systems
• Recognition Based Technique
• Passfaces
• Convex Hull of Pass Objects
• Et- al Graphical Password
• Draw a secret
9. Present Systems Comparision
Technique Usability Drawback
Text based Passwords Typing alpha numeric Dictionary attack, brute force
password search, guess, spyware,
shoulder surfing.
Recognition based technique Pick several pass-pictures out Takes longer to create than text
of many choices. password, creates heavy load
on database to store many
images.
Passface technique Recognize and pick the pre- Very much predictable, creates
registered face images. load of decoy faces on
database.
Convex hull formed by pass Click within an area Hard to remember when large
objects bounded by pre-registered numbers of objects are
picture objects involved.
Man et-al graphical password Type in the code of pre- Needs to memorize both
registered picture objects picture objects and their codes.
More difficult than text-based
password
Draw a secret Users draw something on a User studies showed the
2D grid drawing sequence is hard to
remember
10. Proposed System
The system intends to create a graphical
password using a single/multiple images and
associate a sound file.
Password is generated by assigning click points
in each image and associating sound file above
that SQL server is used to maintain users and
provide another security layer.
11. Proposed
System Modules
• User Maintenance
The users are registered with the SQL
Server database.
• Graph password Generator
The module allows the user to generate
password from image. The user clicks on the
image to generate strokes, which are stored in
database.
12. • Associate Sound Signature
This module allows the end user to choose
an audio file at runtime. The file is converted to
binary form and then it is associated with the
graphical password.
• Data Protection and Non-protection
This module allows the user to specify text
content or file at runtime for whom data
protection is to be provided and also specifies
the container image to perform steganography.
15. Advantages of proposed system
• Click points are used as passwords thus load on
database is very low.
• Matrix of images for creating graphical passwords
is used which adds an additional level of security.
• Sound signature strengthens graphical passwords
• Encoding and decoding hides data in unreadable
form.
• User accounts stored in RDBMS which further
enhances security as hacker cannot access or
create own account.