SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1694
Graphical Password Authentication Using Image Segmentation
Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav
Department of Information Technology,
Universal College of Engineering, Vasai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Authentication is performed using passwords
that are alphanumeric in nature. However, users find it
difficult in remembering a password that is long and needs to
be recalled again and again while implementing it. Instead,
they create short, simple, and insecure passwords that make
the user’s data vulnerable to outside attacks. Graphical
passwords provide a way out of this dilemma by making
passwords more rememberable and easier for peopletouse as
a password and, therefore, makes it more secure. Using a
graphical password, users clicks on images rather thantyping
text passwords which contains alphanumeric characters. A
new and more secure graphical password system has been
developed which uses image segmentation. The image
segmentation system presents the user with an image upon
which the user selects a number of grids on this image; when
entered in a proper sequence these points authenticate the
user. The findings showed alphanumeric passwords and
graphical passwords both worked in similar time but the
graphical passwords were easier to recall and remember.[1]
Thus, Graphical passwords were found to be hard to crack as
they are newly implemented and not many algorithms have
been devised to break through them.
Key Words: Authentication, Encryption, Graphical,
Password, Image, Login, Segmentation
1.INTRODUCTION
[1]Computer, network, data and information security
has been consider as a major technical problem faced
nowadays. However, it is now widely recognized and
accepted that most security mechanisms cannot
succeed without taking into account the user’s views
[2].Various graphical password schemes are used as
alternatives to alphanumeric passwords [3]. Research
has shownthatalphanumericpasswordsarefilledwith
both security and usability problems that make them
less than desirable solutions [4]. A key area in security
research is authentication which deals with the
determination of whether a particular user should be
granted access to a given system or resource. This
paper aims at providing understanding about a new
graphical passwordauthenticationsystem usingimage
segmentation. The significance of this study paper is
the comprehension of a flexible graphical password
authentication system with extensive findings to
support it. Graphical password authentication can be
implemented using two techniques - Recall based and
Recognition based. The basic idea of using the image
segmentation system is that using images as a security
will lead to high memorability and decrease the
chances to choose insecure passwords. This, in turn,
shouldincreaseoverallpasswordsecurity.Ourprimary
question is the following: Are graphical passwords
competitive to alphanumeric passwords in terms of
security, performance and retention?
1.1 Background and Related work
We refer to the security and usability problems
involved with alphanumeric passwords as ‘‘the
password problem.’’ The problem rises because
passwords are expected to act with two conflicting
requirements,namely: (1)Passwordsshouldbeeasyto
remember, and the authentication protocol should be
executable quickly and easily by humans. (2)
Passwords should be secure,i.e.theyshouldbehardto
guess and should lookrandom;theyshouldbechanged
frequently, and it should be different on different or
multiple accounts of the same user; they should not be
written down or stored in plain text. Meeting such
requirements is almost impossible for users. The
problem is well known in the security community.
Classical studies going back over 25 years[5] have
shown that, as a result, human users tend to choose
and handle alphanumeric passwords insecurely.
Recent studies confirm these results[6]. The password
problem arisesprimarilyfromfundamentallimitations
of human’slong-termmemory(LTM).Onceapassword
has been chosen and learned the user must be able to
remember and recall it to log in. However, people
usually forget their passwords. The Power Law of
Forgetting describes rapid forgetting soon after
learning, followed by very slow drop-off thereafter[7].
Psychological theories have attributed forgetting to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1695
decay through the passage of time and to interference,
in which new items in memory interrupt existing ones
(retroactive interference).Arecentreviewemphasizes
the importance of retroactive interference ineveryday
forgetting[8]. Decay and interference help to explain
why people forget passwords. Users are expected to
learn and recallapasswordandrememberitovertime.
However, other items in memory compete with the
password and makes it difficult to recall. If a password
is not used frequently it will be especially susceptible
to forgetting. Recent research has shown that when
users fail to recall a password, they often are able to
recall parts of it correctly[9]. However, the use of
passwords in the password authentication is
predicated oncompletely accurate recall, so a partially
correct password has no value now. Furthermore,
today users have many passwords for computers,
networks, websites, andmany more.Inaddition,some
system requires frequent password changes, in a
probablymisguidedefforttoincreasesecurity.Thisuse
of passwords increases potential interference and is
likely to lead either to forgetting passwords or
forgetting in which system a password is associated
with. What is a user to do? Most often a user will
decrease the burden in its memory at the expense of
security. Perhaps most commonly, the user will write
down passwords and keep them in a convenient place,
which will prevent in compromising of the passwords.
One approach to increasing password security is
education of the[10]. However, given the mismatch
between passwords and human capabilities, the
likelihood of fundamental change is not great[11]. A
better way to overcome the password problem is to
develop password systems that reduces thel memory
problems while preserving security. Recall based
techniques ask the user to recreate something that
he/she has previously createdintheregistrationstage.
An example of Recall based system includes Draw-A-
Secret scheme which asks user to draw a simple
picture on a 2-D grid at the time of registration and it
stores the co-ordinates of the grid in the order that it
has been drawn. This technique has a drawback
attached to it-Redrawing the image has to touch the
same grids in exactly the same sequence during
authentication. Recognition based techniques present
the user with a set of images and the user is asked to
recognize and identify the images he selected during
the registration stage. One such example which lies
between Recall and Recognition based techniques is
the Passpoint technique. The system allows any
random image to be used which should enable to have
many possible click points. The role of the image is just
to provide a clue to the user which helps in
remembering the click points. During login, the click
points should be selected in the same order asit was in
registration phase inside some adjustable tolerable
distance. This is very time consuming and requires to
recall those certain points. The setbacks attached to
this technique can be addressed by using the image
segmentation system. Image segmentation is a recall
based system as it offersapointwhichshouldestablish
context and trigger the stored memory[13].
1.2 Image Segmentation: A new graphical
password scheme
PassPoints Scheme is similar in many respects to the
Blonder’s scheme but uses only a single image. This
scheme is flexible because it allows to use any type of
image i.e it may either be provided by the system or
chosen by the user. The proposed system allows user
to change to put an image as its password and only the
user knows what image he or she has put in. On
receiving the image, the system segments the image
into an array of images in the grid format and stores
them accordingly. The next time, theuserlogsontothe
system, the segmented image is receivedbythesystem
in a jumbled order. Now if users chooses parts of an
image in an order so as to make the original image he
sent, the user is considered authenticate. Else the user
is not considered authentic. The only practical
requirement in selecting a particular image is that an
image should not comprise of a major portion of a
single coloured object. For example: a wall or the
picture of sea or ocean or a cloudless sky. That way, it
will be not be easy for the user to guess the right
sequence of grids to form a complete image. Rather an
image should be rich in content and contain various
components and objects that define a pattern only
recognizable to the user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1696
Fig -1: Original Image
Fig -1: Segmented Image with sequence clues
2. DISCUSSION
Image segmentation has the security advantage of a
large passwordspace overalphanumericpasswords.It
also has an advantage inpasswordspaceoverBlonder-
style graphical passwords and recognition-based
graphical password, such as Passfaces. In spite of the
difficulties at the beginning of the implementation of
graphical password authentication system, after some
practice the users would feel comfortable
implementing either alphanumeric or graphical based
password as input. The people using graphical
password authorization would be able to enter the
password correctly with a much faster pace after they
have improved with practice. This reflects that only a
minority ofgraphicalparticipantswouldhaveaserious
difficulty in learning[15]. However, any authentication
scheme needs to be evaluated in terms of possible
threats. We recommend that Image be implemented
and deployed in systems where online attacks are not
possible, and where any attack made against anonline
system can limit the number of guesses made per
account in a given time period. We assume that all
communication between the server and client will be
made securely through SSL, maintaining security of
selected click-points and corresponding images,
therefore avoiding simple attacks based on network
sniffing. We suggest that the image mappings be done
on a per-user basis as a function of the username i.e.
grant a different image to different groups of people
based on their username. We also suggest that the
image set across all users is a multiple set containing a
very large number of images and that users are
assignedasubsetoftheseimages fortheirimage-maps.
Attacks against such a system, where attackers try to
break into any account [16], are slowed due to the
precautions mentioned above. Hotspot analysis might
be used to increase the efficiency of an attack
dictionary but images areneedtobecollectedandsuch
dictionary would need to be generated on a per user
basis. Online attacks against specific users are more
bothersome and require further examination.
Shoulder-surfing and other information capture from
users. Most graphical passwords schemes are
vulnerable to shoulder-surfing attacks [17]. With
today’s small cameras and camera phones, it is easy to
capture a video of a user’s screen or keyboard as they
are logging in. Image segmentation is also susceptible
to such attacks and its present form the change in
images may be easier to see from further away than
mouse pointer movements in Image segmentation.
With knowledge of which images to lookforinsystems
allowing sufficientnumbersofguesses,attackerscould
try a brute-force attack of clicking on random grids
until the correct sequence is achieved. If the username
and the grid sequence are observed through shoulder-
surfing then an attacker has all of the information
needed to access the account, as is the case with most
other password systems. Having a compromised
computer is also a threat because some malwares may
capture the login information and relay that
information elsewhere. Whereas a keylogger success
for text passwords,forgraphicalpasswordssoftwareis
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1697
needed to capture the images and the mouse cursor
positions. When only limited information is known, it
can be used to narrow the search for a correct guess.
With the correct grid sequence, knowingtheusername
is enough to retrieve the user’s sole image. Hotspot
analysis [18] can only be conducted on that particular
images thus the images provided by the servers are
safe from Hotspot analyzers.ThusImagesegmentation
is not suitableinenvironmentswhereshoulder-surfing
is a realistic threat, or environments where user
images can be recorded (e.g., by insiders, malicious
software on the client machine, etc.).
Hotspots and dictionary attacks. In some of the cases
where attackers are not in a position to capture
information from the user, they are limited to what
theycanconcludethroughimageanalysis.Hotspotsare
specific areas in the image that have a higher
probability of being selected as partoftheirpasswords
by users. If attackers can accurately predict the
hotspots in an image, then it becomes easier to built a
dictionary of passwords containing combinations of
these hotspots. Hotspots are known to be problematic
for Imagesegmentation[19];furtheranalysisisneeded
to determine whether precautions such as carefully
selecting grids can minimize this threat. A key
advantage of Image Segmentation over any other
graphical password authentication is that it is feasible
to brute force and dictionary attacks. It also provides a
way of making more human friendly but strong
passwords. For example, if a user selects an image of
buildings he is familiar with. That way, not only does a
user is easily able to arrange the grids in the proper
sequence but also manage to protect its data from
infiltrators. As a result, the security of the system is
very high. The major disadvantage however is that it
takes a lot of time to register and log in to the system.
3. CONCLUSIONS AND FUTURE WORK
In conclusion, the study of Image segmentation
indicates its strengths and weaknesses. Graphical
password users would be able to easily create a valid
password, but they would have to shell out more
storage space than alphanumeric users, taking more
trails and time. An area of interest with using Image
Segmentation is that it satisfies both conflicting
requirements that is, it is easy to remember and hard
to guess. In principle, this could be an ideal solutionfor
all kinds of devices as opposed to the difficulty of
typing a long, secure alphanumeric password on the
keyboard all the time. The challenge is to provide a
large enough password space on a small image.
However, this might be handled by magnifying an area
of the image when the user moves his finger to a given
area of the screen. In conclusion, Image Segmentation
seems to hold out the prospect of a much more secure
system as it is easy to gain large passwords spaces,
based on complex, natural images. This reduces the
chance of an attacker being able to guess passwords.
The second most important thing this paper aims at is
the usability of Image Segmentation, the Image
Segmentation provides for the user not requiring to
remember the different passwords. Psychological
research indicates that interference can cause
remarkable memory problems[8]. Security research
[10]confirmsthatusershavedifficultyinremembering
multiple passwords and produce unsafe practices to
overcome the problem (writing passwords down, etc.)
REFERENCES
[1] Birget, J.C., Hong, d., Memon, N.Robust discretization,
with application to graphical passwords. Cryptology
ePrint Archive,
http://eprint.iacr.org/2003/168, accessed Jan 17,2005
M. Young, The Technical Writer’s Handbook. Mill Valley,
CA: University Science, 1989.
[2] Brown, A.S., Bracken, E., Zoccoli, S. and Douglas,
K.Generating and remembering passwords. Applied
Cognitive Psychology 18 (2004), 641-651.
[3] Boroditsky, M.Passlogix Password Schemes.
http://www.passlogix.com. Accessed Dec. 2, 2002.
[4] Brostoff, S. and Sasse, M.A. Are Passfaces more usable
than passwords: A field trial investigation.InPeopleand
Computers XIV - Usability or Else: Proceedings of HCI
2000 (Bath, U.K., Sept. 8-12, 2000).
[5] Adams, A. and Sasse, M.A. Users are not the enemy.
CACM 42, 12 (1999), 41-46.
[6] Blonder, G.E. Graphical passwords. United States Patent
5559961, (1996).
[7] Bradley, M.M., Grenwald, M.K., Petry, M.C. and Lang, P.J.
Remembering pictures: Pleasure and arousal in
memory. Journal of Experimental Psychology 81, 2
(1992), 379-390.
[8] Bahrick, H.P. semantic memory content in permastore:
Fifty years of memory for Spanish learned in school.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698
Journal of Verbal Learning and Verbal Behavior 14
(1984), 1-24.
[9] Borges, M.A., Stepnowsky, M.A., and Holt, L.H.Recall and
recognition of words and pictures by adults and
children. Bulletin of the Psychonomic Society 9, 2
(1977), 113-114.
[10] Biederman, I., Glass, A.L. and Stacy, E.W. Searching for
objects in real world scenes. Journal of Experimental
Psychology 97 (1973), 22-27.
[11] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and
N.Memon, “PassPoints: design and longitudinal
evaluation of agraphical password system,” Int. Journal
of HCI, vol. 63,2005, pp. 102–127.
[12] Real User Corporation. The science behind Passfaces.
Whitepaper,
http://www.realuser.com/published/ScienceBehindPas
sfaces.pdf, accessed Feb. 2012.
[13] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin,
“The design and analysis of graphical passwords,”in8th
USENIX Security Symposium, 1999.
[14] H. Tao and C. Adams, “Pass-Go: A proposal to improve
theusability of graphical passwords,” Int. Journal of
NetworkSecurity, vol. 7, no.
[15] P. C. van Oorschot and S. Stubblebine, “On countering
online dictionary attacks with login histories and
humans-in the- loop,” ACM Trans. Info. System Security,
vol. 9, no. 3,2006, pp. 235-258.
[16] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford,
“Captcha: Using hard AI problems for security,” in
Eurocrypt, 2003, pp. 294-311.
[17] S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical
password authentication using cued click points,” in
European SymposiumonResearchinComputerSecurity
(ESORICS), 2007, pp. 359-374.
[18] E. Stobert, A. Forget, S. Chiasson, et al. Exploring
usability effects of increasing security in click-based
graphical passwords. In Annual Computer Security
Applications Conference (ACSAC), 2010.
[19] Harsh Kumar Sarohi,Graphical PasswordAuthentication
Schemes: Current Status and Key Issues, International
Journal of Computer Science Issues,2013, 437-443.
[20] S.Singh, G.Agrawal ”Integration of sound signature in
graphical password authentication system” Invertis
University Bareilly,India, January ,2011.
BIOGRAPHIES
Mr. Rohitkumar Kolay is
currently completing B.E in
Information technologyfromthe
Universal CollegeofEngineering,
Vasai, Mumbai University,
Mumbai, India.
Mr. Animesh Vora is
currently completing B.E in
Information technologyfromthe
Universal CollegeofEngineering,
Vasai, Mumbai University,
Mumbai, India.
Mr. Vinaykumar Yadav is
currently completing B.E in
Information technologyfromthe
Universal CollegeofEngineering,
Vasai, Mumbai University,
Mumbai, India.

Weitere ähnliche Inhalte

Was ist angesagt?

Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
1crore projects
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
IAEME Publication
 

Was ist angesagt? (20)

IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication System
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...Design and Implementation of Enhanced Single Sign on System for Education Sys...
Design and Implementation of Enhanced Single Sign on System for Education Sys...
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
 

Ähnlich wie Graphical Password Authentication using Image Segmentation

A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
ijsptm
 

Ähnlich wie Graphical Password Authentication using Image Segmentation (20)

Ce36484489
Ce36484489Ce36484489
Ce36484489
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Research Paper on Android Graphical Image Password
Research Paper on Android Graphical Image PasswordResearch Paper on Android Graphical Image Password
Research Paper on Android Graphical Image Password
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
A novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and securityA novel multifactor authentication system ensuring usability and security
A novel multifactor authentication system ensuring usability and security
 
IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System             IRJET- A Shoulder-Surfing Resistant Graphical Password System
IRJET- A Shoulder-Surfing Resistant Graphical Password System
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Kürzlich hochgeladen (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

Graphical Password Authentication using Image Segmentation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1694 Graphical Password Authentication Using Image Segmentation Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav Department of Information Technology, Universal College of Engineering, Vasai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Authentication is performed using passwords that are alphanumeric in nature. However, users find it difficult in remembering a password that is long and needs to be recalled again and again while implementing it. Instead, they create short, simple, and insecure passwords that make the user’s data vulnerable to outside attacks. Graphical passwords provide a way out of this dilemma by making passwords more rememberable and easier for peopletouse as a password and, therefore, makes it more secure. Using a graphical password, users clicks on images rather thantyping text passwords which contains alphanumeric characters. A new and more secure graphical password system has been developed which uses image segmentation. The image segmentation system presents the user with an image upon which the user selects a number of grids on this image; when entered in a proper sequence these points authenticate the user. The findings showed alphanumeric passwords and graphical passwords both worked in similar time but the graphical passwords were easier to recall and remember.[1] Thus, Graphical passwords were found to be hard to crack as they are newly implemented and not many algorithms have been devised to break through them. Key Words: Authentication, Encryption, Graphical, Password, Image, Login, Segmentation 1.INTRODUCTION [1]Computer, network, data and information security has been consider as a major technical problem faced nowadays. However, it is now widely recognized and accepted that most security mechanisms cannot succeed without taking into account the user’s views [2].Various graphical password schemes are used as alternatives to alphanumeric passwords [3]. Research has shownthatalphanumericpasswordsarefilledwith both security and usability problems that make them less than desirable solutions [4]. A key area in security research is authentication which deals with the determination of whether a particular user should be granted access to a given system or resource. This paper aims at providing understanding about a new graphical passwordauthenticationsystem usingimage segmentation. The significance of this study paper is the comprehension of a flexible graphical password authentication system with extensive findings to support it. Graphical password authentication can be implemented using two techniques - Recall based and Recognition based. The basic idea of using the image segmentation system is that using images as a security will lead to high memorability and decrease the chances to choose insecure passwords. This, in turn, shouldincreaseoverallpasswordsecurity.Ourprimary question is the following: Are graphical passwords competitive to alphanumeric passwords in terms of security, performance and retention? 1.1 Background and Related work We refer to the security and usability problems involved with alphanumeric passwords as ‘‘the password problem.’’ The problem rises because passwords are expected to act with two conflicting requirements,namely: (1)Passwordsshouldbeeasyto remember, and the authentication protocol should be executable quickly and easily by humans. (2) Passwords should be secure,i.e.theyshouldbehardto guess and should lookrandom;theyshouldbechanged frequently, and it should be different on different or multiple accounts of the same user; they should not be written down or stored in plain text. Meeting such requirements is almost impossible for users. The problem is well known in the security community. Classical studies going back over 25 years[5] have shown that, as a result, human users tend to choose and handle alphanumeric passwords insecurely. Recent studies confirm these results[6]. The password problem arisesprimarilyfromfundamentallimitations of human’slong-termmemory(LTM).Onceapassword has been chosen and learned the user must be able to remember and recall it to log in. However, people usually forget their passwords. The Power Law of Forgetting describes rapid forgetting soon after learning, followed by very slow drop-off thereafter[7]. Psychological theories have attributed forgetting to
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1695 decay through the passage of time and to interference, in which new items in memory interrupt existing ones (retroactive interference).Arecentreviewemphasizes the importance of retroactive interference ineveryday forgetting[8]. Decay and interference help to explain why people forget passwords. Users are expected to learn and recallapasswordandrememberitovertime. However, other items in memory compete with the password and makes it difficult to recall. If a password is not used frequently it will be especially susceptible to forgetting. Recent research has shown that when users fail to recall a password, they often are able to recall parts of it correctly[9]. However, the use of passwords in the password authentication is predicated oncompletely accurate recall, so a partially correct password has no value now. Furthermore, today users have many passwords for computers, networks, websites, andmany more.Inaddition,some system requires frequent password changes, in a probablymisguidedefforttoincreasesecurity.Thisuse of passwords increases potential interference and is likely to lead either to forgetting passwords or forgetting in which system a password is associated with. What is a user to do? Most often a user will decrease the burden in its memory at the expense of security. Perhaps most commonly, the user will write down passwords and keep them in a convenient place, which will prevent in compromising of the passwords. One approach to increasing password security is education of the[10]. However, given the mismatch between passwords and human capabilities, the likelihood of fundamental change is not great[11]. A better way to overcome the password problem is to develop password systems that reduces thel memory problems while preserving security. Recall based techniques ask the user to recreate something that he/she has previously createdintheregistrationstage. An example of Recall based system includes Draw-A- Secret scheme which asks user to draw a simple picture on a 2-D grid at the time of registration and it stores the co-ordinates of the grid in the order that it has been drawn. This technique has a drawback attached to it-Redrawing the image has to touch the same grids in exactly the same sequence during authentication. Recognition based techniques present the user with a set of images and the user is asked to recognize and identify the images he selected during the registration stage. One such example which lies between Recall and Recognition based techniques is the Passpoint technique. The system allows any random image to be used which should enable to have many possible click points. The role of the image is just to provide a clue to the user which helps in remembering the click points. During login, the click points should be selected in the same order asit was in registration phase inside some adjustable tolerable distance. This is very time consuming and requires to recall those certain points. The setbacks attached to this technique can be addressed by using the image segmentation system. Image segmentation is a recall based system as it offersapointwhichshouldestablish context and trigger the stored memory[13]. 1.2 Image Segmentation: A new graphical password scheme PassPoints Scheme is similar in many respects to the Blonder’s scheme but uses only a single image. This scheme is flexible because it allows to use any type of image i.e it may either be provided by the system or chosen by the user. The proposed system allows user to change to put an image as its password and only the user knows what image he or she has put in. On receiving the image, the system segments the image into an array of images in the grid format and stores them accordingly. The next time, theuserlogsontothe system, the segmented image is receivedbythesystem in a jumbled order. Now if users chooses parts of an image in an order so as to make the original image he sent, the user is considered authenticate. Else the user is not considered authentic. The only practical requirement in selecting a particular image is that an image should not comprise of a major portion of a single coloured object. For example: a wall or the picture of sea or ocean or a cloudless sky. That way, it will be not be easy for the user to guess the right sequence of grids to form a complete image. Rather an image should be rich in content and contain various components and objects that define a pattern only recognizable to the user.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1696 Fig -1: Original Image Fig -1: Segmented Image with sequence clues 2. DISCUSSION Image segmentation has the security advantage of a large passwordspace overalphanumericpasswords.It also has an advantage inpasswordspaceoverBlonder- style graphical passwords and recognition-based graphical password, such as Passfaces. In spite of the difficulties at the beginning of the implementation of graphical password authentication system, after some practice the users would feel comfortable implementing either alphanumeric or graphical based password as input. The people using graphical password authorization would be able to enter the password correctly with a much faster pace after they have improved with practice. This reflects that only a minority ofgraphicalparticipantswouldhaveaserious difficulty in learning[15]. However, any authentication scheme needs to be evaluated in terms of possible threats. We recommend that Image be implemented and deployed in systems where online attacks are not possible, and where any attack made against anonline system can limit the number of guesses made per account in a given time period. We assume that all communication between the server and client will be made securely through SSL, maintaining security of selected click-points and corresponding images, therefore avoiding simple attacks based on network sniffing. We suggest that the image mappings be done on a per-user basis as a function of the username i.e. grant a different image to different groups of people based on their username. We also suggest that the image set across all users is a multiple set containing a very large number of images and that users are assignedasubsetoftheseimages fortheirimage-maps. Attacks against such a system, where attackers try to break into any account [16], are slowed due to the precautions mentioned above. Hotspot analysis might be used to increase the efficiency of an attack dictionary but images areneedtobecollectedandsuch dictionary would need to be generated on a per user basis. Online attacks against specific users are more bothersome and require further examination. Shoulder-surfing and other information capture from users. Most graphical passwords schemes are vulnerable to shoulder-surfing attacks [17]. With today’s small cameras and camera phones, it is easy to capture a video of a user’s screen or keyboard as they are logging in. Image segmentation is also susceptible to such attacks and its present form the change in images may be easier to see from further away than mouse pointer movements in Image segmentation. With knowledge of which images to lookforinsystems allowing sufficientnumbersofguesses,attackerscould try a brute-force attack of clicking on random grids until the correct sequence is achieved. If the username and the grid sequence are observed through shoulder- surfing then an attacker has all of the information needed to access the account, as is the case with most other password systems. Having a compromised computer is also a threat because some malwares may capture the login information and relay that information elsewhere. Whereas a keylogger success for text passwords,forgraphicalpasswordssoftwareis
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1697 needed to capture the images and the mouse cursor positions. When only limited information is known, it can be used to narrow the search for a correct guess. With the correct grid sequence, knowingtheusername is enough to retrieve the user’s sole image. Hotspot analysis [18] can only be conducted on that particular images thus the images provided by the servers are safe from Hotspot analyzers.ThusImagesegmentation is not suitableinenvironmentswhereshoulder-surfing is a realistic threat, or environments where user images can be recorded (e.g., by insiders, malicious software on the client machine, etc.). Hotspots and dictionary attacks. In some of the cases where attackers are not in a position to capture information from the user, they are limited to what theycanconcludethroughimageanalysis.Hotspotsare specific areas in the image that have a higher probability of being selected as partoftheirpasswords by users. If attackers can accurately predict the hotspots in an image, then it becomes easier to built a dictionary of passwords containing combinations of these hotspots. Hotspots are known to be problematic for Imagesegmentation[19];furtheranalysisisneeded to determine whether precautions such as carefully selecting grids can minimize this threat. A key advantage of Image Segmentation over any other graphical password authentication is that it is feasible to brute force and dictionary attacks. It also provides a way of making more human friendly but strong passwords. For example, if a user selects an image of buildings he is familiar with. That way, not only does a user is easily able to arrange the grids in the proper sequence but also manage to protect its data from infiltrators. As a result, the security of the system is very high. The major disadvantage however is that it takes a lot of time to register and log in to the system. 3. CONCLUSIONS AND FUTURE WORK In conclusion, the study of Image segmentation indicates its strengths and weaknesses. Graphical password users would be able to easily create a valid password, but they would have to shell out more storage space than alphanumeric users, taking more trails and time. An area of interest with using Image Segmentation is that it satisfies both conflicting requirements that is, it is easy to remember and hard to guess. In principle, this could be an ideal solutionfor all kinds of devices as opposed to the difficulty of typing a long, secure alphanumeric password on the keyboard all the time. The challenge is to provide a large enough password space on a small image. However, this might be handled by magnifying an area of the image when the user moves his finger to a given area of the screen. In conclusion, Image Segmentation seems to hold out the prospect of a much more secure system as it is easy to gain large passwords spaces, based on complex, natural images. This reduces the chance of an attacker being able to guess passwords. The second most important thing this paper aims at is the usability of Image Segmentation, the Image Segmentation provides for the user not requiring to remember the different passwords. Psychological research indicates that interference can cause remarkable memory problems[8]. Security research [10]confirmsthatusershavedifficultyinremembering multiple passwords and produce unsafe practices to overcome the problem (writing passwords down, etc.) REFERENCES [1] Birget, J.C., Hong, d., Memon, N.Robust discretization, with application to graphical passwords. Cryptology ePrint Archive, http://eprint.iacr.org/2003/168, accessed Jan 17,2005 M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Brown, A.S., Bracken, E., Zoccoli, S. and Douglas, K.Generating and remembering passwords. Applied Cognitive Psychology 18 (2004), 641-651. [3] Boroditsky, M.Passlogix Password Schemes. http://www.passlogix.com. Accessed Dec. 2, 2002. [4] Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation.InPeopleand Computers XIV - Usability or Else: Proceedings of HCI 2000 (Bath, U.K., Sept. 8-12, 2000). [5] Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 41-46. [6] Blonder, G.E. Graphical passwords. United States Patent 5559961, (1996). [7] Bradley, M.M., Grenwald, M.K., Petry, M.C. and Lang, P.J. Remembering pictures: Pleasure and arousal in memory. Journal of Experimental Psychology 81, 2 (1992), 379-390. [8] Bahrick, H.P. semantic memory content in permastore: Fifty years of memory for Spanish learned in school.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698 Journal of Verbal Learning and Verbal Behavior 14 (1984), 1-24. [9] Borges, M.A., Stepnowsky, M.A., and Holt, L.H.Recall and recognition of words and pictures by adults and children. Bulletin of the Psychonomic Society 9, 2 (1977), 113-114. [10] Biederman, I., Glass, A.L. and Stacy, E.W. Searching for objects in real world scenes. Journal of Experimental Psychology 97 (1973), 22-27. [11] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N.Memon, “PassPoints: design and longitudinal evaluation of agraphical password system,” Int. Journal of HCI, vol. 63,2005, pp. 102–127. [12] Real User Corporation. The science behind Passfaces. Whitepaper, http://www.realuser.com/published/ScienceBehindPas sfaces.pdf, accessed Feb. 2012. [13] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,”in8th USENIX Security Symposium, 1999. [14] H. Tao and C. Adams, “Pass-Go: A proposal to improve theusability of graphical passwords,” Int. Journal of NetworkSecurity, vol. 7, no. [15] P. C. van Oorschot and S. Stubblebine, “On countering online dictionary attacks with login histories and humans-in the- loop,” ACM Trans. Info. System Security, vol. 9, no. 3,2006, pp. 235-258. [16] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “Captcha: Using hard AI problems for security,” in Eurocrypt, 2003, pp. 294-311. [17] S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical password authentication using cued click points,” in European SymposiumonResearchinComputerSecurity (ESORICS), 2007, pp. 359-374. [18] E. Stobert, A. Forget, S. Chiasson, et al. Exploring usability effects of increasing security in click-based graphical passwords. In Annual Computer Security Applications Conference (ACSAC), 2010. [19] Harsh Kumar Sarohi,Graphical PasswordAuthentication Schemes: Current Status and Key Issues, International Journal of Computer Science Issues,2013, 437-443. [20] S.Singh, G.Agrawal ”Integration of sound signature in graphical password authentication system” Invertis University Bareilly,India, January ,2011. BIOGRAPHIES Mr. Rohitkumar Kolay is currently completing B.E in Information technologyfromthe Universal CollegeofEngineering, Vasai, Mumbai University, Mumbai, India. Mr. Animesh Vora is currently completing B.E in Information technologyfromthe Universal CollegeofEngineering, Vasai, Mumbai University, Mumbai, India. Mr. Vinaykumar Yadav is currently completing B.E in Information technologyfromthe Universal CollegeofEngineering, Vasai, Mumbai University, Mumbai, India.