SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
PassBYOP: Bring Your Own Picture for Securing Graphical
Passwords
Abstract :
PassBYOP is a new graphical password scheme for public terminals that replaces
the static digital images typically used in graphical password systems with
personalized physical tokens, herein in the form of digital pictures displayed on a
physical user-owned device such as a mobile phone. Users present these images to
a system camera and then enter their password as a sequence of selections on live
video of the token. Highly distinctive optical features are extracted from these
selections and used as the password.We present three feasibility studies of
PassBYOP examining its reliability, usability, and security against observation.
The reliability study shows that image-feature based passwords are viable and
suggests appropriate system thresholds—password items should contain a
minimum of seven features, 40% of which must geometrically match originals
stored on an authentication server in order to be judged equivalent. The usability
study measures task completion times and error rates, revealing these to be 7.5 s
and 9%, broadly comparable with prior graphical password systems that use static
digital images. Finally, the security study highlights PassBYOP’s resistance to
observation attack—three attackers are unable to compromise a password using
shoulder surfing, camerabased observation, or malware. These results indicate that
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Pass- BYOP shows promise for security while maintaining the usability of current
graphical password schemes.
Existing system:
Graphical password schemes that rely on input such as selecting portions of an
image. These systems have been shown to improve memorability without
sacrificing input time or error rates while also maintaining a high resistance to
brute force and guessing attacks. However, graphical passwords present their own
problems. surfing attacks. Such attacks are effective because the sections of images
that users select as password items are both easy for an attacker to observe by
snooping over shoulders or setting up a camera to record input and also relatively
predictable—users tend to choose hotspots such as the eyes in a facial portrait .
Disadvantage :
 This issue is particularly problematic as the image contents for graphical
password
 Systems are typically stored on authentication servers and readily presented
to attackers in response to input of easily accessible user identity
information..
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
 Above Diagram represent Overview PassBYOP system
Proposed system:
PassBYOP—Bring Your Own Picture, that increases resistance to observation
attack by coupling the user’s password to an image or object physically possessed.
This is achieved by using live video of a physical token, such as an object, a
photograph, or even an image of a body part (e.g., a palm), as the canvas for
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
entering a graphical password. This physical object replaces easily accessible
server-based images, and we argue that attackers will struggle to capture useful
replicas of this content. We present an implementation for the scheme based on
SIFT image features and a demonstration of its viability through three feasibility
studies covering: 1) the reliability and robustness of PassBYOP feature based
input; 2) participant task performance times and error rates using Pass- BYOP; and
3) the security of PassBYOP against observation attack.
Advantages:
 PassBYOP seeks to make graphical passwords more secure against
intelligent guessing and shoulder-surfing attacks.
 This is a highly positive conclusion as the underlying complexity of
the recognition and comparison system in PassBYOP is substantial—
PassBYOP does not place additional burdens on users
Conclusion :
We presented three empirical examinations of the PassBYOP system. In the first,
we established the feasibility of using image features as password items in terms
of their uniqueness and the reliability with which they can be entered. In the
second, we established basic user performance data while operating PassBYOP:
Login took a median of 7.5 s, and although error data was unevenly distributed,
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
mean rates were 9%. Finally, in the third study, we examined security and
established that the use of an external token image increases the resistance to
observation attack without compromising security against other vectors such as
intelligent guessing or brute force. These results compare well with seminal prior
work such as Passpoints, which yielded mean login times of 8.78–24.25 s and
1.55–2.75 failed authentication attempts prior to successfully entering a
password. Similarly, Chiasson et al. present a lab study of click-point-based
graphical passwords using multiple images and report a median login time of 7 s
and an error rate of 6%.
Hardware Specification :
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Software Specification :
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Android Studio
Reference :
[1] “Global mobile statistics 2014 part a: Mobile subscribers; handset market [1]
A. Adams and M. Sasse, “Users are not the enemy,” Commun. ACM, vol. 42, pp.
40–46, 1999.
[2] M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, “How to attack twofactor
authentication internet banking,” in Proc. 17th Int. Conf. Financial Cryptography,
2013, pp. 322–328.
[3] ARTigo, http://www.artigo.org/.
[4] F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile
phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644. [5] R. Biddle, S. Chiasson,
and P. van Oorschot, “Graphical passwords: Learning from the first twelve years,”
ACM Comput. Surveys vol. 44, no. 4, p. 19, 2012.

Weitere ähnliche Inhalte

Was ist angesagt?

Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
ijtsrd
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
Shaibi Varkey
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 

Was ist angesagt? (20)

Vshantaram
VshantaramVshantaram
Vshantaram
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Sudhanshu Raman
Sudhanshu RamanSudhanshu Raman
Sudhanshu Raman
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
11aman
11aman11aman
11aman
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Comprehensive study of the usability features of the Graphical Password
Comprehensive study of the usability features of the  Graphical  Password Comprehensive study of the usability features of the  Graphical  Password
Comprehensive study of the usability features of the Graphical Password
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

Andere mochten auch

Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
Zhi Guan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
презентация повышение эффективности мышления
презентация повышение эффективности мышленияпрезентация повышение эффективности мышления
презентация повышение эффективности мышления
kmr17863
 
Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
danielhfowler
 
Technology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelleTechnology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelle
Rochelle Ryan
 
Week 4 proposal power point public
Week 4 proposal power point   publicWeek 4 proposal power point   public
Week 4 proposal power point public
collegeagain
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
Swedish Technology
 
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
Yelena Shaulova
 

Andere mochten auch (18)

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
 
3D Password
3D Password3D Password
3D Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Sample Seminar slides
Sample Seminar slidesSample Seminar slides
Sample Seminar slides
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Abc ppt1
Abc ppt1Abc ppt1
Abc ppt1
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
презентация повышение эффективности мышления
презентация повышение эффективности мышленияпрезентация повышение эффективности мышления
презентация повышение эффективности мышления
 
Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
 
Technology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelleTechnology will save our minds and bodies rochelle
Technology will save our minds and bodies rochelle
 
Sara Bareilles website analysis
Sara Bareilles website analysisSara Bareilles website analysis
Sara Bareilles website analysis
 
Week 4 proposal power point public
Week 4 proposal power point   publicWeek 4 proposal power point   public
Week 4 proposal power point public
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
 
Q2
Q2Q2
Q2
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networks
 
A novel control scheme of quasi resonant valley-switching for high-power-fact...
A novel control scheme of quasi resonant valley-switching for high-power-fact...A novel control scheme of quasi resonant valley-switching for high-power-fact...
A novel control scheme of quasi resonant valley-switching for high-power-fact...
 
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
НОВАЯ ВОЛНА КОМАНДНАЯ ЭФФЕКТИВНОСТЬ_Развитие Лидеров Коучинг(1)
 

Ähnlich wie Pass byo bring your own picture for securing graphical passwords

Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 

Ähnlich wie Pass byo bring your own picture for securing graphical passwords (20)

Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
IRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based AuthenticationIRJET- Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
 
IRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based AuthenticationIRJET - Securing Social Media using Pair based Authentication
IRJET - Securing Social Media using Pair based Authentication
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 

Mehr von LeMeniz Infotech

Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 

Mehr von LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Pass byo bring your own picture for securing graphical passwords

  • 1. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com PassBYOP: Bring Your Own Picture for Securing Graphical Passwords Abstract : PassBYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password.We present three feasibility studies of PassBYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures task completion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights PassBYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camerabased observation, or malware. These results indicate that
  • 2. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Pass- BYOP shows promise for security while maintaining the usability of current graphical password schemes. Existing system: Graphical password schemes that rely on input such as selecting portions of an image. These systems have been shown to improve memorability without sacrificing input time or error rates while also maintaining a high resistance to brute force and guessing attacks. However, graphical passwords present their own problems. surfing attacks. Such attacks are effective because the sections of images that users select as password items are both easy for an attacker to observe by snooping over shoulders or setting up a camera to record input and also relatively predictable—users tend to choose hotspots such as the eyes in a facial portrait . Disadvantage :  This issue is particularly problematic as the image contents for graphical password  Systems are typically stored on authentication servers and readily presented to attackers in response to input of easily accessible user identity information..
  • 3. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com  Above Diagram represent Overview PassBYOP system Proposed system: PassBYOP—Bring Your Own Picture, that increases resistance to observation attack by coupling the user’s password to an image or object physically possessed. This is achieved by using live video of a physical token, such as an object, a photograph, or even an image of a body part (e.g., a palm), as the canvas for
  • 4. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com entering a graphical password. This physical object replaces easily accessible server-based images, and we argue that attackers will struggle to capture useful replicas of this content. We present an implementation for the scheme based on SIFT image features and a demonstration of its viability through three feasibility studies covering: 1) the reliability and robustness of PassBYOP feature based input; 2) participant task performance times and error rates using Pass- BYOP; and 3) the security of PassBYOP against observation attack. Advantages:  PassBYOP seeks to make graphical passwords more secure against intelligent guessing and shoulder-surfing attacks.  This is a highly positive conclusion as the underlying complexity of the recognition and comparison system in PassBYOP is substantial— PassBYOP does not place additional burdens on users Conclusion : We presented three empirical examinations of the PassBYOP system. In the first, we established the feasibility of using image features as password items in terms of their uniqueness and the reliability with which they can be entered. In the second, we established basic user performance data while operating PassBYOP: Login took a median of 7.5 s, and although error data was unevenly distributed,
  • 5. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com mean rates were 9%. Finally, in the third study, we examined security and established that the use of an external token image increases the resistance to observation attack without compromising security against other vectors such as intelligent guessing or brute force. These results compare well with seminal prior work such as Passpoints, which yielded mean login times of 8.78–24.25 s and 1.55–2.75 failed authentication attempts prior to successfully entering a password. Similarly, Chiasson et al. present a lab study of click-point-based graphical passwords using multiple images and report a median login time of 7 s and an error rate of 6%. Hardware Specification :  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID
  • 6. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Software Specification :  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Android Studio Reference : [1] “Global mobile statistics 2014 part a: Mobile subscribers; handset market [1] A. Adams and M. Sasse, “Users are not the enemy,” Commun. ACM, vol. 42, pp. 40–46, 1999. [2] M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, “How to attack twofactor authentication internet banking,” in Proc. 17th Int. Conf. Financial Cryptography, 2013, pp. 322–328. [3] ARTigo, http://www.artigo.org/. [4] F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644. [5] R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys vol. 44, no. 4, p. 19, 2012.