new ijcsmc, vol. 6, issue. 2, february 2017, pg.67 authentication … · 2017. 2. 28. · priyanka...
TRANSCRIPT
![Page 1: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/1.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 67
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X IMPACT FACTOR: 6.017
IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 – 74
Authentication Using Image
Selection and Voice Recognition
Priyanka Raut1, Shubhangi Kolte
2, Swati Pachare
3, Prof. Ashwin Shinde
4
1Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India
²Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India
³Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India
4Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India
1 [email protected]; 2 [email protected]; 3 [email protected]; 4 [email protected]
Abstract— This thought presents another development in the field of information security that is an
application with picture based confirmation and voice based verification and these both will go about as
qualification. The picture based watchword inserting with noticeable watermark and discourse
acknowledgment for desktop application helps in accomplishing abnormal state of security than the basic
alphanumeric secret key and in the meantime more simple to-utilize.
Keywords— ―Security‖, ―Verification‖, ―Watermark‖
I. INTRODUCTION
Confirmation assumes an imperative part in ensuring assets against unapproved utilize. Numerous
validation forms exist from basic secret key based verification framework to exorbitant biometric confirmation
frameworks. So while expanding security is an issue content based passwords are insufficient to handle such
issues. The requirement for something more secure alongside being easy to use is required. The procedure of
approval can be accomplished by utilizing certification, however these days qualification can be effortlessly
gotten to and the data is more powerless against such assault. Animal compel assault and there are numerous
product accessible which can help in speculating the accreditation. The alphanumeric watchword can be
speculated effortlessly by checking the predefined design in this way verification in view of content based
passwords has significant downsides. More refined confirmation process is expensive and may require extra
gear or equipment. To beat such disadvantages we built up a framework for check of individual character
utilizing C# ASP.NET. In the proposed framework, picture based verification and voice based confirmation can give abnormal state of security and will go about as accreditation. The picture based watchword installed with
watermark and Speech Recognition for desktop application helps in accomplishing abnormal state of security
than the basic alphanumeric secret key and in the meantime simpler to-utilize. [1][2]
![Page 2: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/2.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 68
II. RELATED WORK
Password based authentication system
This is a straightforward framework where a client displays a client ID and a secret word to the framework.
On the off chance that the client ID and secret key match with the one put away on the framework, then the
client is verified. A client may have many records on numerous PCs. He needs to recollect numerous passwords. Examine on human subjective capacity has produced a considerable measure of information on what an
individual can recall [1]. For instance, space names are utilized rather than IP addresses and phone numbers are
softened up to lumps for a person to recall effectively. It is additionally demonstrated that people can recall
pictures more effortlessly than the content. The general propensity is that an individual may not recall content
passwords effortlessly and he may record it. This can prompt to taking watchword to increase unapproved
access to a framework. Since passwords can't be long, they are anything but difficult to break utilizing savage
constrain assaults like endeavoring distinctive passwords (online assault) or by disconnected assault on the
secret key hash record. There are numerous different approaches to break passwords like parcel sniffing, by
unplanned disclosure. Arrange activity is anything but difficult to catch and investigate utilizing the instruments
accessible in the web. Organize convention analyzers, for example, Ethereal Packet Sniffer and tcp dump can be
utilized to gather both approaching and active system information including content based passwords. [1]
Biometric based authentication system
Biometrics, the utilization of factual examination to distinguish people through their natural or
physiological qualities, is developing as a key viewpoint in new security frameworks. Utilizing biometrics, it is
conceivable to dodge pitfalls experienced with conventional security frameworks where clients are required to
keep data, for example, passwords, safe. Biometric validation frameworks might be extremely sheltered and secure and solid however these frameworks are exorbitant and require extra equipment and programming
support. These frameworks are hard to change and keep up. Sending such frameworks for web might be
extremely mind boggling and not reasonable. [1]
III. PROPOSED WORK
MODULES
A. Registration
Another client should finish the enrollment procedure by filling the fundamental data. In this module client
need to give fundamental data and all the data is put away in the database. The data will contain subtle elements
as username, client id, watchword, versatile number, email id and watermark. The client distinguishing proof
should be exceptional and will go about as essential key amid enrollment prepare. The watermark will go about
as a special code which when inserted with chose picture will give us more level of security. On the off chance
that he/she is as of now enrolled then they ought to login for further process.
B. Image based credential generation
In this module, client need to choose one picture and enter a watermark and should be installed keeping in mind
the end goal to separate the picture, and this picture will be exceptional in view of the watermark which was
implanted in the picture. Here watermark will be noticeable and as numeric and letters in order. Accordingly the
new produced pictures utilizing watermark will go about as first level of certification era.
C. Voice based credential generation
In this module, client needs to give the voice summon and which will go about as second level of qualification
generation.Asp.net give us an instrument to perceive discourse. The System.Speech.Recognition namespace
contains window desktop discourse innovation sorts for actualizing discourse recognition.SetupSpeech.ToText()
is capacity that calls the correct technique to change over discourse to content .Thus this will be our voice
charge for validation.
![Page 3: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/3.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 69
D. Image based authentication
In this module, client needs to choose the required picture with a specific end goal to accomplish first level of
confirmation. On the off chance that the client gives required qualification then just can move to second level of
verification.
E. Voice based authentication
In this module, client needs to give the required voice charge with a specific end goal to accomplish second
level of confirmation. In the event that the client gives required accreditation then just can get to further process.
IV. FLOW DIAGRAM
The work flow diagram is shown below:
V. IMPLEMENTATION
Implementation of our work is as follows:
A.For opening the required application the user will have to first register himself by clicking to New User here ?
if user is already registered then he can directly login.
![Page 4: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/4.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 70
(a) (b)
(c)
B.The process for image based credential generation are as follows in given snapshots:
(a) (b)
![Page 5: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/5.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 71
(c) (d)
(e)
C. The process for voice based credential generation are as follows in given snapshots:
(a) (b)
![Page 6: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/6.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 72
(c)
(d)
D. The process for image based authentication are as follows in given snapshots:
(a) (b)
![Page 7: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/7.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 73
E.The process for voice based authentication are as follows in given snapshots:
(a) (b)
![Page 8: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6](https://reader036.vdocument.in/reader036/viewer/2022071110/5fe4f51345f7c64505446afd/html5/thumbnails/8.jpg)
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74
© 2017, IJCSMC All Rights Reserved 74
VI. CONCLUSION
This paper introduces a picture and voice confirmation plot as another option to supplant content based
verification framework. The two level of validation gives heartier framework when contrasted with
alphanumeric verification prepares. Picture based validation utilizing watermark method makes picture based
confirmation more solid. Different applications can be shielded from different sorts of assault and the data can
be secured.
REFERENCES [1] Srinath Akula and Veerabhadram Devisetty “Image Based Registration and Authentication System,”
Department of Computer Science St cloud State University, St. Cloud, MN 56301
[2] Manish Kumar and Prof (Dr.) Jayant Shekhar “A Study of Implementation of Image Based Authentication System,”Subharti Institute of Technology and Engineering, Meerut, India Volume 4, Issue 4, April 2014.
[3] Prof.Shivashankar M.Rampur and Miss.Kavita S.Rampur, “An Approach of Speech Recognition System for Desktop Application,”Volume 5 Issue 12 Dec. 2016, Page No. 19471-19475