SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 46
GRAPHICAL PASSWORD AUTHENTICATION USING PCCP WITH
SOUND SIGNATURE
Nilesh Changune1
, Ganesh Shinde2
, Sagar Chaugule3
, Sandeep Helkar4
1
Student, Department of Computer Engineering, AISSMS COE, Pune, India
2
Student, Department of Computer Engineering, AISSMS COE, Pune, India
3
Student, Department of Computer Engineering, AISSMS COE, Pune, India
4
Student, Department of Computer Engineering, AISSMS COE, Pune, India
Abstract
Persuasive Cued-Click Point is an advanced method of cued click point of graphical password technique which includes usability
and security evaluations. It also useful for reduces hotspot problem and hence it helps the user in selecting password of higher
security. This paper includes the persuasion to influence user choice in click based graphical passwords, so that users select more
desultory and more difficult to guess the passwords. In this paper includes sound signature for recover the password if user
forgot password or click point ,then playing the sound signature which is selected at registration time then it set new password
and access the account. This paper include dead zone new concept to avoiding Shoulder surfing attack in graphical password
authentication.
Keywords: Graphical Password, Authentication, Password Images, and PCCP etc…
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Until recently computer and network security has been
formulated as a technical problem. It is now widely
acknowledged that most security mechanism cannot succeed
without taking into account the user view. Human Being's
are incapable of securely storing high-quality cryptographic
keys and they have acceptable speed and accuracy when
performing cryptographic operations [1]. With the in
invention in technology new method develops to break
security of system. Security engineers and researchers have
making strides in protecting system to avoid damage. New
passwords techniques are evolved in password security to
protect system. With the drawbacks of token based and
biometric based authentication system .New system of
graphical password authentication developed.
Chart-1: Classification of Graphical password
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 47
1.1 Recognition Based Techniques
At the time of registration user select set of images and
during accessing system user must recognize that set of
image while entering password.
1.2 Recall Based Techniques
Recall based is the technique in which system asked to the
user to redraw or select something that is user is created or
his selected at the registration time.
In this paper our technique is also recall based technique.
2. LITRATURE SURVEY
2.1 Pass Point
In the pass point technique user select the any one of the
image .On that image user must select N click point at time
of selecting a password. At the time of login user must
select accordance with that sequence of click numbers. In
the type user just recalling no. of clicks on that image.
Within the specified system given tolerance square users
pixel accept. The usability and security of this password
scheme evaluated by original authors[2][3]. Though all
precaution we took security concern is still an issue. The
main problem in this type is creation of hotspot. User
always tends to select similar click points which are already
click by another user. Through harvesting sample or
building attack dictionaries by image processing technique
which leads to successful guessing of password.[4].
Fig-1: Passpoint
2.2 Cued Click Point
To reduce the hotspot creation problem in pass point method
next cued click point method is useful. A password includes
one click point per image for a sequence of images. The
next image is displayed on previous click point. Different
click point have different set of images path. It also makes
attack based on analysis of hotspots more challenging. The
wrong click goes to wrong path without an indication of
failure login it only shows after final click on that image.
Fig-2: Cued Click Point
2.3 Persuasive Cued Click Points
Using cued click point as a base system new feature to
encourage user to select more secure password and to make
it more difficult to select passwords where all five click
points fall within hotspots. When users creates password at
the time of registration the image is slightly shaded only
viewport part is visible to user which give user
persuasiveness while creating password by which the
hotspot problem is minimized. The Persuasive technology
originally articulated by fogg[7] as using technology to
motivate & influence people to behave in desired manner.
The theoretical password space for password system is the
total number of unique passwords that could be generated
according to system specification. Ideally, a larger
theoretical password space lowers the like hood that any
particular guess is correct for given password. For
persuasive cued click points, the theoretical password space
is ((w*h)/ where the size of image pixels is (w*h) is
divided by the size of tolerance square ( ) to get number of
tolerance square per image, raised to power of the number of
click point in password.
Fig-3: PCCP
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 48
3 PROPOSED SYSTEM
From literature survey it is conclude that in graphical
password PCCP techniques is strong but not satisfied. In
pccp technique the chances of shoulder surfing attack is
more for avoiding shoulder surfing attack we are adding
dead zone concept. Using the dead zone in pccp we create
the password is more strong secure And also adding sound
signature for forgot password. both are concept descripted
below.
3.1 Sound Signature
User must select sound at the time of registration. When
user not memorize the password that time the user click on
forgot password button then system gives sound clip if user
play the correct sound then system gives the permission to
create new password and gives the image sequence for
creating password otherwise system goes through exit mode.
3.2 Dead Zone
Dead zone is concept take for avoiding shoulder surfing
attack. Shoulder surfing concept is if user enter the
password and select the images sequence of his password
and any person standing backside of user and looking the
password sequence then there is many chances of hack your
account by using guessing attack. This concept is shoulder
surfing.
But using the dead zone concept we can avoid that attack.
The dead zone is some particular area that is allocated user
on registration time which is store in all image sequence. If
click on that area the system shows image sequence from
starting image. If user enter the password and some person
looking that then user can select the wrong click point then
system gives wrong image sequence to user which is dead
zone is present then user click on dead zone then again
system gives correct image sequence. This process we can
repeated many time then this person is confused and the
very hard to crack password by using shoulder surfing
attack.
3.3 Modules Description
3.3.1 Registration
1. Sign up initiate
2. Select password images sequence
3. Select manual image
4. Select graphical password for each image
5. Calculate hash (digital signature algorithm) for each
point using discretized centralization
6. Accept string for sound signature
7. Register
3.3.2 User Sign In
1. Start sign in
2. Display image #1
3. Accept password
4. If required generated sound signature
5. Calculate hash using digital signature algorithm and
discretized centralization
6. Authenticate each image
7. If invalid signature found show random invalid image
for re-verification
8. If re-verification is ok continue accepting graphical
password for next image
9. If all image authenticate login
Fig-4: Architecture of Proposed System
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 49
4. CONCLUSION
In graphical password authentication pccp technique is
strong but it is not avoided the shoulder surfing attack.
That’s why we are adding dead zone concept in pccp
technique by using this concept we are avoiding the
shoulder surfing attack, and try to create strong password for
security. Also adding the sound signature for forgot the
password.
ACKNOWLEDGEMENTS
The authors would like to thanks to all which are working
related to graphical password authentication field. All this
helps me to improve my presentation work.
REFERENCES
[1] C.Kaufman, R.Perlman and M.speciner. “Network
Security:PRIVATE Communication in a PUBLIC
World.Prentice Hall,2nd edition” 2002.
[2] Wiedenbeck, S., Birget, J. C., Brodskiy, A., and
Memon, N. “Authentication Using Graphical
Passwords: Effects of Tolerance and Image Choice.
Symp. On Usable Privacy and Security (SOUPS)”
2005
[3] Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy,
A., and Memon, N. PassPoints: “Design and
longitudinal evaluation of a graphical password
system.” Int. Journal of Human- Computer Studies
63, 102-127, 2005.
[4] Thorpe, J. and van Oorschot, P.C. “Human-Seeded
Attacks and Exploiting Hot-Spots in Graphical
Passwords. USENIX Security” Symp. 2007.
[5] S. Chiasson, A. Forget, R. Biddle, and P.C. van
Oorschot, “User Interface Design Affects Security:
Patterns in Click-Based Graphical Passwords,” Int‟l
J. Information Security, vol. 8, no. 6, pp. 387- 398,
2009.
[6] S. Chiasson, A. Forget, R. Biddle, and P. van
Oorschot, “Influencing Users towards Better
Passwords: Persuasive Cued Click- Points,” Proc.
British HCI Group Ann. Conf. People and
Computers: Culture, Creativity, Interaction, Sept.
2008.
[7] B. Fogg, Persuasive Technologies: Using Computers
to Change What We Think and Do. Morgan
Kaufmann Publishers, 2003
[8] Jermyn, A. Mayer, F. Monrose, M. Reiter, and A.
Rubin. The design and analysis of graphical
passwords. In 8th USENIX Security Symposium,
August 1999.
[9] Security Analysis of Graphical Passwords over the
Alphanumeric Passwords by G. Agarwal,1Deptt.of
Computer Science, IIET, Bareilly, India 2,3 Deptt.
of Information Technology, IIET, Bareilly, India 27-
11-2010.
BIOGRAPHIES
Nilesh Changune is a student at AISSMS
COE, Pune. He is pursuing Bachelor’s
Degree in Computer Engineering in
Savitribai Phule Pune University, Pune,
Maharashtra, India.
Ganesh Shinde is a student at AISSMS
COE, Pune. He is pursuing Bachelor’s
Degree in Computer Engineering in
Savitribai Phule Pune University, Pune,
Maharashtra, India
Sagar Chaugule is a student at AISSMS
COE, Pune. He is pursuing Bachelor’s
Degree in Computer Engineering in
Savitribai Phule Pune University, Pune,
Maharashtra, India.
Sandeep Helkar is a student at AISSMS
COE, Pune. He is pursuing Bachelor’s
Degree in Computer Engineering in
Savitribai Phule Pune University, Pune,
Maharashtra, India

Weitere ähnliche Inhalte

Was ist angesagt?

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 

Was ist angesagt? (20)

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition report
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D Password
3D Password3D Password
3D Password
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password
3D Password3D Password
3D Password
 
3D Password
3D Password3D Password
3D Password
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 

Andere mochten auch

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
Kailas Patil
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Snehal Raut
 
Mind reading computers
Mind reading computersMind reading computers
Mind reading computers
Daman Kathuria
 

Andere mochten auch (20)

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
screen less display documentation
screen less display documentationscreen less display documentation
screen less display documentation
 
Mind reading computer report
Mind reading computer reportMind reading computer report
Mind reading computer report
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
screen less display
screen less displayscreen less display
screen less display
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
Screenless display
Screenless displayScreenless display
Screenless display
 
SCREENLESS DISPLAY
SCREENLESS DISPLAYSCREENLESS DISPLAY
SCREENLESS DISPLAY
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Mind reading computers
Mind reading computersMind reading computers
Mind reading computers
 
Screenless display report
Screenless display reportScreenless display report
Screenless display report
 
Hadoop
HadoopHadoop
Hadoop
 
Screenless display
Screenless display Screenless display
Screenless display
 
Hacking
HackingHacking
Hacking
 

Ähnlich wie Graphical password authentication using pccp with sound signature

Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Journals
 

Ähnlich wie Graphical password authentication using pccp with sound signature (20)

Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
Research ppr
Research pprResearch ppr
Research ppr
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 

Mehr von eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

Mehr von eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Kürzlich hochgeladen

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

Graphical password authentication using pccp with sound signature

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 46 GRAPHICAL PASSWORD AUTHENTICATION USING PCCP WITH SOUND SIGNATURE Nilesh Changune1 , Ganesh Shinde2 , Sagar Chaugule3 , Sandeep Helkar4 1 Student, Department of Computer Engineering, AISSMS COE, Pune, India 2 Student, Department of Computer Engineering, AISSMS COE, Pune, India 3 Student, Department of Computer Engineering, AISSMS COE, Pune, India 4 Student, Department of Computer Engineering, AISSMS COE, Pune, India Abstract Persuasive Cued-Click Point is an advanced method of cued click point of graphical password technique which includes usability and security evaluations. It also useful for reduces hotspot problem and hence it helps the user in selecting password of higher security. This paper includes the persuasion to influence user choice in click based graphical passwords, so that users select more desultory and more difficult to guess the passwords. In this paper includes sound signature for recover the password if user forgot password or click point ,then playing the sound signature which is selected at registration time then it set new password and access the account. This paper include dead zone new concept to avoiding Shoulder surfing attack in graphical password authentication. Keywords: Graphical Password, Authentication, Password Images, and PCCP etc… --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Until recently computer and network security has been formulated as a technical problem. It is now widely acknowledged that most security mechanism cannot succeed without taking into account the user view. Human Being's are incapable of securely storing high-quality cryptographic keys and they have acceptable speed and accuracy when performing cryptographic operations [1]. With the in invention in technology new method develops to break security of system. Security engineers and researchers have making strides in protecting system to avoid damage. New passwords techniques are evolved in password security to protect system. With the drawbacks of token based and biometric based authentication system .New system of graphical password authentication developed. Chart-1: Classification of Graphical password
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 47 1.1 Recognition Based Techniques At the time of registration user select set of images and during accessing system user must recognize that set of image while entering password. 1.2 Recall Based Techniques Recall based is the technique in which system asked to the user to redraw or select something that is user is created or his selected at the registration time. In this paper our technique is also recall based technique. 2. LITRATURE SURVEY 2.1 Pass Point In the pass point technique user select the any one of the image .On that image user must select N click point at time of selecting a password. At the time of login user must select accordance with that sequence of click numbers. In the type user just recalling no. of clicks on that image. Within the specified system given tolerance square users pixel accept. The usability and security of this password scheme evaluated by original authors[2][3]. Though all precaution we took security concern is still an issue. The main problem in this type is creation of hotspot. User always tends to select similar click points which are already click by another user. Through harvesting sample or building attack dictionaries by image processing technique which leads to successful guessing of password.[4]. Fig-1: Passpoint 2.2 Cued Click Point To reduce the hotspot creation problem in pass point method next cued click point method is useful. A password includes one click point per image for a sequence of images. The next image is displayed on previous click point. Different click point have different set of images path. It also makes attack based on analysis of hotspots more challenging. The wrong click goes to wrong path without an indication of failure login it only shows after final click on that image. Fig-2: Cued Click Point 2.3 Persuasive Cued Click Points Using cued click point as a base system new feature to encourage user to select more secure password and to make it more difficult to select passwords where all five click points fall within hotspots. When users creates password at the time of registration the image is slightly shaded only viewport part is visible to user which give user persuasiveness while creating password by which the hotspot problem is minimized. The Persuasive technology originally articulated by fogg[7] as using technology to motivate & influence people to behave in desired manner. The theoretical password space for password system is the total number of unique passwords that could be generated according to system specification. Ideally, a larger theoretical password space lowers the like hood that any particular guess is correct for given password. For persuasive cued click points, the theoretical password space is ((w*h)/ where the size of image pixels is (w*h) is divided by the size of tolerance square ( ) to get number of tolerance square per image, raised to power of the number of click point in password. Fig-3: PCCP
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 48 3 PROPOSED SYSTEM From literature survey it is conclude that in graphical password PCCP techniques is strong but not satisfied. In pccp technique the chances of shoulder surfing attack is more for avoiding shoulder surfing attack we are adding dead zone concept. Using the dead zone in pccp we create the password is more strong secure And also adding sound signature for forgot password. both are concept descripted below. 3.1 Sound Signature User must select sound at the time of registration. When user not memorize the password that time the user click on forgot password button then system gives sound clip if user play the correct sound then system gives the permission to create new password and gives the image sequence for creating password otherwise system goes through exit mode. 3.2 Dead Zone Dead zone is concept take for avoiding shoulder surfing attack. Shoulder surfing concept is if user enter the password and select the images sequence of his password and any person standing backside of user and looking the password sequence then there is many chances of hack your account by using guessing attack. This concept is shoulder surfing. But using the dead zone concept we can avoid that attack. The dead zone is some particular area that is allocated user on registration time which is store in all image sequence. If click on that area the system shows image sequence from starting image. If user enter the password and some person looking that then user can select the wrong click point then system gives wrong image sequence to user which is dead zone is present then user click on dead zone then again system gives correct image sequence. This process we can repeated many time then this person is confused and the very hard to crack password by using shoulder surfing attack. 3.3 Modules Description 3.3.1 Registration 1. Sign up initiate 2. Select password images sequence 3. Select manual image 4. Select graphical password for each image 5. Calculate hash (digital signature algorithm) for each point using discretized centralization 6. Accept string for sound signature 7. Register 3.3.2 User Sign In 1. Start sign in 2. Display image #1 3. Accept password 4. If required generated sound signature 5. Calculate hash using digital signature algorithm and discretized centralization 6. Authenticate each image 7. If invalid signature found show random invalid image for re-verification 8. If re-verification is ok continue accepting graphical password for next image 9. If all image authenticate login Fig-4: Architecture of Proposed System
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 49 4. CONCLUSION In graphical password authentication pccp technique is strong but it is not avoided the shoulder surfing attack. That’s why we are adding dead zone concept in pccp technique by using this concept we are avoiding the shoulder surfing attack, and try to create strong password for security. Also adding the sound signature for forgot the password. ACKNOWLEDGEMENTS The authors would like to thanks to all which are working related to graphical password authentication field. All this helps me to improve my presentation work. REFERENCES [1] C.Kaufman, R.Perlman and M.speciner. “Network Security:PRIVATE Communication in a PUBLIC World.Prentice Hall,2nd edition” 2002. [2] Wiedenbeck, S., Birget, J. C., Brodskiy, A., and Memon, N. “Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. Symp. On Usable Privacy and Security (SOUPS)” 2005 [3] Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., and Memon, N. PassPoints: “Design and longitudinal evaluation of a graphical password system.” Int. Journal of Human- Computer Studies 63, 102-127, 2005. [4] Thorpe, J. and van Oorschot, P.C. “Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. USENIX Security” Symp. 2007. [5] S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot, “User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords,” Int‟l J. Information Security, vol. 8, no. 6, pp. 387- 398, 2009. [6] S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click- Points,” Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008. [7] B. Fogg, Persuasive Technologies: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, 2003 [8] Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, August 1999. [9] Security Analysis of Graphical Passwords over the Alphanumeric Passwords by G. Agarwal,1Deptt.of Computer Science, IIET, Bareilly, India 2,3 Deptt. of Information Technology, IIET, Bareilly, India 27- 11-2010. BIOGRAPHIES Nilesh Changune is a student at AISSMS COE, Pune. He is pursuing Bachelor’s Degree in Computer Engineering in Savitribai Phule Pune University, Pune, Maharashtra, India. Ganesh Shinde is a student at AISSMS COE, Pune. He is pursuing Bachelor’s Degree in Computer Engineering in Savitribai Phule Pune University, Pune, Maharashtra, India Sagar Chaugule is a student at AISSMS COE, Pune. He is pursuing Bachelor’s Degree in Computer Engineering in Savitribai Phule Pune University, Pune, Maharashtra, India. Sandeep Helkar is a student at AISSMS COE, Pune. He is pursuing Bachelor’s Degree in Computer Engineering in Savitribai Phule Pune University, Pune, Maharashtra, India