SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1461
Graphical Password Authentication using image
Segmentation for Web Based Applications
Maw Maw Naing, Ohnmar Win
Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar
How to cite this paper: Maw Maw
Naing | Ohnmar Win "Graphical
Password Authentication using image
Segmentation for Web Based
Applications" Published inInternational
Journal of Trend in Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.1461-1464, URL:
https://www.ijtsrd.c
om/papers/ijtsrd25
184.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
One of the most important topics in information security today is user
authentication. User authentication is a fundamental component in most
computer security contexts. It provides the basis for access control and user
accountability. While there are various types of user authentication systems,
alphanumeric passwordsare themostcommontypeof user authentication. They
are versatile and easy to implement and use. However, it can either be long and
secure or short and hard to remember. A graphical based password is one
promising alternatives of textual passwords. According to human psychology,
humans are able to remember pictures easily. Inthispaper,graphicalpasswords
have been designed to try to make password more memorable and easier for
people to use, and it is less vulnerable to brute force attacks than a text-based
password. The aim of the system is to implementastrongsecurity.Theproposed
system segments the image like a grid, which has a maximum four fragments.
Then, each segment of the image is dragged in a particular sequence onto an
empty grid of size 6x6 and placed on a particular segment of the empty grid, to
form the user’ password. When the user logs into the system, the user needs to
drag each segment of the image onto the same empty grid of size 6x6 in the
correct sequence and position of the segments that user had specified during
registration.
Keywords: Authentication, Graphical Passwords, Images Segmentation
I. INTRODUCTION
Authentication based on passwords is used largely in
applications for computer security and privacy. Currently
the authentication methods can be broadly divided into
three main areas. Token based, Biometric based, and
Knowledge based authentication [1]. Text Based Password
and Graphical Password are the type of Knowledge based
Authentication. Graphical based passwords schemes can be
broadly classified into four main categories: First is
Recognition based Systems which are also known as
Cognometric Systems or Searchmetric Systems. Recognition
based techniques involve identifying whether one has seen
an image before. The user must only be able to recognize
previously seen images, not generate them unaided from
memory. Second is Pure Recall based systemswhich are also
known as Drwanmetric Systems. In pure recall-based
methods the user has to reproduce something that he or she
created or selected earlier during the registration stage.
Third is Cued Recall based systems which are also called
Iconmetric Systems. In cued recall-based methods, a user is
provided with a hint so that he or she can recall his/her
password. Fourth is Hybrid systems which are typically the
combination of two or more schemes. Like recognition and
recall based or textual with graphical passwordschemes[2].
The most common computer authentication method is for a
user to submit a user name and a text password. The
vulnerabilities of this method have been well known. One of
the main problems is the difficulty of remembering
passwords. Graphical passwords systems are the most
promising alternative to conventional password based
authentication systems.
Graphical passwords (GP) use pictures instead of textual
passwords and are partially motivated by the fact that
humans can remember pictures more easily than a string of
characters [3]. The idea of graphical passwords was
originally described by Greg Blonder in 1996 [4]. An
important advantage of GP is that they are easier to
remember than textual passwords. Human beings have the
ability to remember faces of people, places they visit and
things they have seen for a longer duration. Thus, graphical
passwords provide a means for making more user-friendly
passwords while increasing the level of security. The key
feature of the system is that it uses image as a password
which makes it more memorable. The proposed system
requires a user to upload a memorable image and also
remember the position of segmented images as registration.
II. Overview of proposed system
A. Appliances of Web Technology
Web is the most critical technology tocarrydataviainternet.
The primary function of a web server is to store,processand
deliver web pages to clients. Generally, most of the web
IJTSRD25184
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1462
servers support server-side scripting using Active Server
Pages (ASP), PHP or other scripting languages. Web servers
are not only used for serving the World Wide Web but also
found embedded in devices such as printers, routers, and
webcam. No additional software has to be installed on the
client computer because only a web browser is required.
There are three main parts in this technology. They are
hypertext document, web server and web browser.
The communication between client and server takes place
using the Hypertext Transfer Protocol (HTTP). Pages
delivered are most frequently Hypertext Mark-up Language
(HTML) documents, which may include images, style sheets
and scripts in addition to text content. Hypertext document
also called web document is a text document including
HTML element.
Web server is a system collecting the web document by
using computer and can retrieve when it is required. The
heart of the web is Uniform Resource Locater (URL). The
address consisting of domain name and Uniform Resource
Identifier (URI) is called URL. A URL will have the following
format such as protocol name, domain name, path and
parameter.
The basic function of web browser is to carry the data from
user to web server and vice versa. The most popular web
browsers are Microsoft Internet Explorer, Mozilla Firefox,
Google Chrome, Apple Safari and Opera.
B. Database Management System
Database Management System is an application/ program-
enabling user to store, organize, select and analyse data in a
database. Hence it is needed for accessing information from
a database. Some of Database Management Systems are
MySQL, Microsoft SQL Server, Oracle,IBMDB2etc.Thereare
different types of DBMSs according to the management of
database structures. Some of the types of DBMS are
Hierarchical DBMS, Network DBMS, Relational DBMS, and
Object-oriented DBMS. The most common used is the
relational database. In relational database, data are store in
data form. The table contains listof columnsin whichrelated
data are entered, stored and also retrieve when required.
MySQL Database Server uses Relational database model for
managing data. It is an open-source relational database
application that uses structured query languages. MySQL
Database Server is one of the widely used databases used in
web applications. With MySQL, the user can add, access and
manage content in database. SQL offersfastprocessing,ease,
scalable and flexibility in use. Also MySQL is part of open-
source PHP application. It is client-server system that
consists of multi-threaded SQLserverthatsupportsdifferent
client programs, wide range of applications programming
interface.
C. Image Segmentation
The system segments the uploaded image. The initiations
steps are (1) upload a photo, (2)ask user aboutthesegments
they want and (3) take upload photo width and height. The
basis methods for segmenting the image are as follows:
A. Assign the width and height of image. width=width of
image and height=height of image.
B. Compute the horizontal and vertical segment of image.
Horizontal segment= square root (fragment) and
Vertical segment=square root (fragment).
C. Compute the width and height of segment. Width of
segment= width/ Horizontal segment and High of
segment= height/ Vertical segment.
D. Hash Function
The segmented image is encrypted by usingHash function in
the system and it is stored into database. Firstly, theimage is
compared whether it is jpg or png format. If it is compact
with the image format type, the format type is changed into
the standard type again. The image is resized into (8*8)
pixels which are converted into gray scale format. The
system computes the mean value of the grayscaleimageand
it also computes the bits which are based on whether the
color value is above or below the mean value. The mean
value will take out the bit value in 0, 1. If a gray value is
higher than the mean value, it will be 1. Otherwise, it will be
0. In constructing Hash function, it sets the 64bits binary
from left to right, top to bottom using big endian.
III. System FLOW
This figure below explains the flow of the system i.e. how
data is being transferred from one module to another.
Figure 1: Flowchart of Graphical Password
Authentication Using Image Segmentation for Web
Based Applications
IV. System Implementation
The proposed system is aimed to provide a system which
gives strong authentication to the user and protects user
data from unauthorized access. The proposed system
consists of four parts:
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1463
A. Registration Process:
Input module: The user will be asked to upload a
unique image to the system and enter username
password and email address as shown in fig.2.
Image divides into segments: Then the system will
divide the uploaded image into 2x2 grid segments as
shown in fig.3. Each segment will be associated with a
unique number.
Mapping of image segments to empty grid: The
system will then presentthesegmented imagealongside
an empty grid and ask the user to place the grid
segments from segmented image into the empty grid.
The segments of the empty grid will also be associated
with a unique number.
of segment: The position in which the user places the
segments into the empty grid is stored in database and
will act as authentication of the user.
Figure 2. Registration Form
Figure 3. Segmented Image
User has to drag and drop each segment of image anywhere
on a 6x6 empty grid as shown in fig.4. User is supposed to
remember the sequence and position of where the segment
is mapped in an empty grid.
Fig.5 shows how each segment and their position number
are saved represented by imghash and position. System is
implemented by encryption and decryption of data for the
authentic user’s data. Further the data cannot be retrieved
by any hacker as it will be in encrypted form.
Figure 4. Setting of User
Figure 5. Snapshot of Database for 2x2 Fragments
B. The Login Process:
Matching of input image with registered image: The
system will ask the user to upload the same image that
he/she had provided at the time of registration.
Image divides into segments: The system then
segments the image using algorithm and presents it to
the user along with an empty grid.
Verify sequence and position of segments mapped and
authenticate user: The user has to place the segments in
the empty grid in the correct position (Same as saved in
the database during the registration process) to be
considered as an authorized user.
C. The Learning Management System:
After the user is authenticated he will be directed to theweb
page. This is an application which is developed for the
department of a university, wherein data can be shared
between the students and the faculty, faculty and the HOD,
and HOD and students.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1464
Figure6. Learning Management System User
Homepage
D. Forget Password
If the uploaded photo is damaged or lost then the user can
click forget password as shown in fig.5. After clicking forget
password user will be redirected to a page wherein the
recovery email and password will be entered.Iftherecovery
email and password is correct then the uploaded photo will
be given to him.
Figure 7. Forget password Form
V. CONCLUSION
The proposed graphical password authentication system is
based on exclusive segmentation methods and Hash
Visualization technique. The graphical password is the
alternative approach of the current text passwords. Text
passwords are the most common computer authentication
methods using alphanumerical usernames and passwords
but the methods have some significant drawbacks such as it
is hard to remember the type passwords for users. Themain
advantage of graphical password authenticated systems is
that users are better at memorizing graphical passwords
than text-based passwords and it is more difficult to break
graphical passwords using the traditional attack methods
such as brute force search,dictionaryattack, orspyware. The
proposed graphical password authentication use the image
as a password and the system is designed to provide strong
security to computer systems. Although the images are
easier to remember or to recognize than texts,itisnecessary
more storage space to store the image. In thesystem, MYSQL
database management systemisused tostoretheimagedata
and also use the data encryption methodsthatmaketheuser
data more secure and the data cannot be easily attacked by
the hackers. The graphical passwords are used in web log-in
application, ATM machines and also mobile devices and the
proposed system is aimed to the authentication process of
web based application.
ACKNOWLEDGEMENT
The authors would like to thank Dr.Ohnmar Win, Professor,
Department of Electronic and Communication Engineering
for kindly permitting to prepare for this paper, for her
fruitful advice, close supervision, encouragement and
numerous invaluable guidance. The author would alsothank
to all teachers and friends who willingly helped the author
throughout the preparation of the paper.
REFERENCES
[1] Mayur H Patel, Nimit S Modind “Authentication Using
Text and Graphical Password” International Journal of
Science and Research (IJSR) Volume 4, Issue 5, May
2015
[2] Wazir Zada Khan, Mohammed Y Aalsalemand Yang
Xiang “A Graphical Password Based System for Small
Mobile Devices ” IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 5, No 2,
September 2011
[3] Patric Elftmann, Diploma Thesis, “Secure Alternatives
to Password- Based Authentication Mechanisms”
Aachen, Germany October 2006
[4] G. E. Blonder. Graphicalpassword,U.S. Patent5559961,
Lucent Technologies, Inc. (Murray Hill, NJ), August
1995.
[5] Krishan Chand, Ashish Anand “Graphical Password
System Using Image Segmentation” Volume 2, Issue 5,
May 2016
[6] Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav
“Graphical Password System Using Image
Segmentation” International Research Journal of
Engineering and Technology (IRJET) Volume 04, Issue
03, Mar -2017
[7] Rupali Deshmukh; Smita Rukhande “Authentication by
Image Segmentation and Shuffling”IJCAT-
International Journal of Computing and Technology,
Volume 4, Issue 12, December 2017
[8] Rashika Koul, Tanya Kumar, Ashwini Dhongade,
Radhika Malpani, Rupali Deshmukh “Graphical
Password by Segmentation of Image” International
Journal of Research and Scientific Innovation (IJRSI)/
Volume III, Issue XI, November 2016
[9] Sana Ansari, Prof. Avinash Shrivas “Implementation of
Authentication Mechanism Using Image Segmentation
for Web Based Applications”

Weitere ähnliche Inhalte

Was ist angesagt?

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical passwordParag Tamhane
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password taniamutholil
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using HmacArpana shree
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationSuraj Swarnakar
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 

Was ist angesagt? (20)

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
11aman
11aman11aman
11aman
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 

Ähnlich wie Graphical Password Authentication using image Segmentation for Web Based Applications

Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Passwordijtsrd
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET Journal
 
Detecting Phishing Websites Using Machine Learning
Detecting Phishing Websites Using Machine LearningDetecting Phishing Websites Using Machine Learning
Detecting Phishing Websites Using Machine LearningIRJET Journal
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationnuruladnan11
 
Agent based Authentication for Deep Web Data Extraction
Agent based Authentication for Deep Web Data ExtractionAgent based Authentication for Deep Web Data Extraction
Agent based Authentication for Deep Web Data ExtractionAM Publications,India
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureTiffany Graham
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 

Ähnlich wie Graphical Password Authentication using image Segmentation for Web Based Applications (20)

Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
 
Detecting Phishing Websites Using Machine Learning
Detecting Phishing Websites Using Machine LearningDetecting Phishing Websites Using Machine Learning
Detecting Phishing Websites Using Machine Learning
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
Agent based Authentication for Deep Web Data Extraction
Agent based Authentication for Deep Web Data ExtractionAgent based Authentication for Deep Web Data Extraction
Agent based Authentication for Deep Web Data Extraction
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
publishable paper
publishable paperpublishable paper
publishable paper
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Kürzlich hochgeladen (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Graphical Password Authentication using image Segmentation for Web Based Applications

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1461 Graphical Password Authentication using image Segmentation for Web Based Applications Maw Maw Naing, Ohnmar Win Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar How to cite this paper: Maw Maw Naing | Ohnmar Win "Graphical Password Authentication using image Segmentation for Web Based Applications" Published inInternational Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.1461-1464, URL: https://www.ijtsrd.c om/papers/ijtsrd25 184.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwordsare themostcommontypeof user authentication. They are versatile and easy to implement and use. However, it can either be long and secure or short and hard to remember. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. Inthispaper,graphicalpasswords have been designed to try to make password more memorable and easier for people to use, and it is less vulnerable to brute force attacks than a text-based password. The aim of the system is to implementastrongsecurity.Theproposed system segments the image like a grid, which has a maximum four fragments. Then, each segment of the image is dragged in a particular sequence onto an empty grid of size 6x6 and placed on a particular segment of the empty grid, to form the user’ password. When the user logs into the system, the user needs to drag each segment of the image onto the same empty grid of size 6x6 in the correct sequence and position of the segments that user had specified during registration. Keywords: Authentication, Graphical Passwords, Images Segmentation I. INTRODUCTION Authentication based on passwords is used largely in applications for computer security and privacy. Currently the authentication methods can be broadly divided into three main areas. Token based, Biometric based, and Knowledge based authentication [1]. Text Based Password and Graphical Password are the type of Knowledge based Authentication. Graphical based passwords schemes can be broadly classified into four main categories: First is Recognition based Systems which are also known as Cognometric Systems or Searchmetric Systems. Recognition based techniques involve identifying whether one has seen an image before. The user must only be able to recognize previously seen images, not generate them unaided from memory. Second is Pure Recall based systemswhich are also known as Drwanmetric Systems. In pure recall-based methods the user has to reproduce something that he or she created or selected earlier during the registration stage. Third is Cued Recall based systems which are also called Iconmetric Systems. In cued recall-based methods, a user is provided with a hint so that he or she can recall his/her password. Fourth is Hybrid systems which are typically the combination of two or more schemes. Like recognition and recall based or textual with graphical passwordschemes[2]. The most common computer authentication method is for a user to submit a user name and a text password. The vulnerabilities of this method have been well known. One of the main problems is the difficulty of remembering passwords. Graphical passwords systems are the most promising alternative to conventional password based authentication systems. Graphical passwords (GP) use pictures instead of textual passwords and are partially motivated by the fact that humans can remember pictures more easily than a string of characters [3]. The idea of graphical passwords was originally described by Greg Blonder in 1996 [4]. An important advantage of GP is that they are easier to remember than textual passwords. Human beings have the ability to remember faces of people, places they visit and things they have seen for a longer duration. Thus, graphical passwords provide a means for making more user-friendly passwords while increasing the level of security. The key feature of the system is that it uses image as a password which makes it more memorable. The proposed system requires a user to upload a memorable image and also remember the position of segmented images as registration. II. Overview of proposed system A. Appliances of Web Technology Web is the most critical technology tocarrydataviainternet. The primary function of a web server is to store,processand deliver web pages to clients. Generally, most of the web IJTSRD25184
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1462 servers support server-side scripting using Active Server Pages (ASP), PHP or other scripting languages. Web servers are not only used for serving the World Wide Web but also found embedded in devices such as printers, routers, and webcam. No additional software has to be installed on the client computer because only a web browser is required. There are three main parts in this technology. They are hypertext document, web server and web browser. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently Hypertext Mark-up Language (HTML) documents, which may include images, style sheets and scripts in addition to text content. Hypertext document also called web document is a text document including HTML element. Web server is a system collecting the web document by using computer and can retrieve when it is required. The heart of the web is Uniform Resource Locater (URL). The address consisting of domain name and Uniform Resource Identifier (URI) is called URL. A URL will have the following format such as protocol name, domain name, path and parameter. The basic function of web browser is to carry the data from user to web server and vice versa. The most popular web browsers are Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari and Opera. B. Database Management System Database Management System is an application/ program- enabling user to store, organize, select and analyse data in a database. Hence it is needed for accessing information from a database. Some of Database Management Systems are MySQL, Microsoft SQL Server, Oracle,IBMDB2etc.Thereare different types of DBMSs according to the management of database structures. Some of the types of DBMS are Hierarchical DBMS, Network DBMS, Relational DBMS, and Object-oriented DBMS. The most common used is the relational database. In relational database, data are store in data form. The table contains listof columnsin whichrelated data are entered, stored and also retrieve when required. MySQL Database Server uses Relational database model for managing data. It is an open-source relational database application that uses structured query languages. MySQL Database Server is one of the widely used databases used in web applications. With MySQL, the user can add, access and manage content in database. SQL offersfastprocessing,ease, scalable and flexibility in use. Also MySQL is part of open- source PHP application. It is client-server system that consists of multi-threaded SQLserverthatsupportsdifferent client programs, wide range of applications programming interface. C. Image Segmentation The system segments the uploaded image. The initiations steps are (1) upload a photo, (2)ask user aboutthesegments they want and (3) take upload photo width and height. The basis methods for segmenting the image are as follows: A. Assign the width and height of image. width=width of image and height=height of image. B. Compute the horizontal and vertical segment of image. Horizontal segment= square root (fragment) and Vertical segment=square root (fragment). C. Compute the width and height of segment. Width of segment= width/ Horizontal segment and High of segment= height/ Vertical segment. D. Hash Function The segmented image is encrypted by usingHash function in the system and it is stored into database. Firstly, theimage is compared whether it is jpg or png format. If it is compact with the image format type, the format type is changed into the standard type again. The image is resized into (8*8) pixels which are converted into gray scale format. The system computes the mean value of the grayscaleimageand it also computes the bits which are based on whether the color value is above or below the mean value. The mean value will take out the bit value in 0, 1. If a gray value is higher than the mean value, it will be 1. Otherwise, it will be 0. In constructing Hash function, it sets the 64bits binary from left to right, top to bottom using big endian. III. System FLOW This figure below explains the flow of the system i.e. how data is being transferred from one module to another. Figure 1: Flowchart of Graphical Password Authentication Using Image Segmentation for Web Based Applications IV. System Implementation The proposed system is aimed to provide a system which gives strong authentication to the user and protects user data from unauthorized access. The proposed system consists of four parts:
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1463 A. Registration Process: Input module: The user will be asked to upload a unique image to the system and enter username password and email address as shown in fig.2. Image divides into segments: Then the system will divide the uploaded image into 2x2 grid segments as shown in fig.3. Each segment will be associated with a unique number. Mapping of image segments to empty grid: The system will then presentthesegmented imagealongside an empty grid and ask the user to place the grid segments from segmented image into the empty grid. The segments of the empty grid will also be associated with a unique number. of segment: The position in which the user places the segments into the empty grid is stored in database and will act as authentication of the user. Figure 2. Registration Form Figure 3. Segmented Image User has to drag and drop each segment of image anywhere on a 6x6 empty grid as shown in fig.4. User is supposed to remember the sequence and position of where the segment is mapped in an empty grid. Fig.5 shows how each segment and their position number are saved represented by imghash and position. System is implemented by encryption and decryption of data for the authentic user’s data. Further the data cannot be retrieved by any hacker as it will be in encrypted form. Figure 4. Setting of User Figure 5. Snapshot of Database for 2x2 Fragments B. The Login Process: Matching of input image with registered image: The system will ask the user to upload the same image that he/she had provided at the time of registration. Image divides into segments: The system then segments the image using algorithm and presents it to the user along with an empty grid. Verify sequence and position of segments mapped and authenticate user: The user has to place the segments in the empty grid in the correct position (Same as saved in the database during the registration process) to be considered as an authorized user. C. The Learning Management System: After the user is authenticated he will be directed to theweb page. This is an application which is developed for the department of a university, wherein data can be shared between the students and the faculty, faculty and the HOD, and HOD and students.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1464 Figure6. Learning Management System User Homepage D. Forget Password If the uploaded photo is damaged or lost then the user can click forget password as shown in fig.5. After clicking forget password user will be redirected to a page wherein the recovery email and password will be entered.Iftherecovery email and password is correct then the uploaded photo will be given to him. Figure 7. Forget password Form V. CONCLUSION The proposed graphical password authentication system is based on exclusive segmentation methods and Hash Visualization technique. The graphical password is the alternative approach of the current text passwords. Text passwords are the most common computer authentication methods using alphanumerical usernames and passwords but the methods have some significant drawbacks such as it is hard to remember the type passwords for users. Themain advantage of graphical password authenticated systems is that users are better at memorizing graphical passwords than text-based passwords and it is more difficult to break graphical passwords using the traditional attack methods such as brute force search,dictionaryattack, orspyware. The proposed graphical password authentication use the image as a password and the system is designed to provide strong security to computer systems. Although the images are easier to remember or to recognize than texts,itisnecessary more storage space to store the image. In thesystem, MYSQL database management systemisused tostoretheimagedata and also use the data encryption methodsthatmaketheuser data more secure and the data cannot be easily attacked by the hackers. The graphical passwords are used in web log-in application, ATM machines and also mobile devices and the proposed system is aimed to the authentication process of web based application. ACKNOWLEDGEMENT The authors would like to thank Dr.Ohnmar Win, Professor, Department of Electronic and Communication Engineering for kindly permitting to prepare for this paper, for her fruitful advice, close supervision, encouragement and numerous invaluable guidance. The author would alsothank to all teachers and friends who willingly helped the author throughout the preparation of the paper. REFERENCES [1] Mayur H Patel, Nimit S Modind “Authentication Using Text and Graphical Password” International Journal of Science and Research (IJSR) Volume 4, Issue 5, May 2015 [2] Wazir Zada Khan, Mohammed Y Aalsalemand Yang Xiang “A Graphical Password Based System for Small Mobile Devices ” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011 [3] Patric Elftmann, Diploma Thesis, “Secure Alternatives to Password- Based Authentication Mechanisms” Aachen, Germany October 2006 [4] G. E. Blonder. Graphicalpassword,U.S. Patent5559961, Lucent Technologies, Inc. (Murray Hill, NJ), August 1995. [5] Krishan Chand, Ashish Anand “Graphical Password System Using Image Segmentation” Volume 2, Issue 5, May 2016 [6] Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav “Graphical Password System Using Image Segmentation” International Research Journal of Engineering and Technology (IRJET) Volume 04, Issue 03, Mar -2017 [7] Rupali Deshmukh; Smita Rukhande “Authentication by Image Segmentation and Shuffling”IJCAT- International Journal of Computing and Technology, Volume 4, Issue 12, December 2017 [8] Rashika Koul, Tanya Kumar, Ashwini Dhongade, Radhika Malpani, Rupali Deshmukh “Graphical Password by Segmentation of Image” International Journal of Research and Scientific Innovation (IJRSI)/ Volume III, Issue XI, November 2016 [9] Sana Ansari, Prof. Avinash Shrivas “Implementation of Authentication Mechanism Using Image Segmentation for Web Based Applications”