new ijcsmc, vol. 6, issue. 2, february 2017, pg.67 authentication … · 2017. 2. 28. · priyanka...

8
Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74 © 2017, IJCSMC All Rights Reserved 67 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IMPACT FACTOR: 6.017 IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 74 Authentication Using Image Selection and Voice Recognition Priyanka Raut 1 , Shubhangi Kolte 2 , Swati Pachare 3 , Prof. Ashwin Shinde 4 1 Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India ²Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India ³Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India 4 Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India 1 [email protected]; 2 [email protected]; 3 [email protected]; 4 [email protected] AbstractThis thought presents another development in the field of information security that is an application with picture based confirmation and voice based verification and these both will go about as qualification. The picture based watchword inserting with noticeable watermark and discourse acknowledgment for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret key and in the meantime more simple to-utilize. KeywordsSecurity‖, ―Verification‖, ―WatermarkI. INTRODUCTION Confirmation assumes an imperative part in ensuring assets against unapproved utilize. Numerous validation forms exist from basic secret key based verification framework to exorbitant biometric confirmation frameworks. So while expanding security is an issue content based passwords are insufficient to handle such issues. The requirement for something more secure alongside being easy to use is required. The procedure of approval can be accomplished by utilizing certification, however these days qualification can be effortlessly gotten to and the data is more powerless against such assault. Animal compel assault and there are numerous product accessible which can help in speculating the accreditation. The alphanumeric watchword can be speculated effortlessly by checking the predefined design in this way verification in view of content based passwords has significant downsides. More refined confirmation process is expensive and may require extra gear or equipment. To beat such disadvantages we built up a framework for check of individual character utilizing C# ASP.NET. In the proposed framework, picture based verification and voice based confirmation can give abnormal state of security and will go about as accreditation. The picture based watchword installed with watermark and Speech Recognition for desktop application helps in accomplishing abnormal state of security than the basic alphanumeric secret key and in the meantime simpler to-utilize. [1][2]

Upload: others

Post on 03-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 67

Available Online at www.ijcsmc.com

International Journal of Computer Science and Mobile Computing

A Monthly Journal of Computer Science and Information Technology

ISSN 2320–088X IMPACT FACTOR: 6.017

IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 – 74

Authentication Using Image

Selection and Voice Recognition

Priyanka Raut1, Shubhangi Kolte

2, Swati Pachare

3, Prof. Ashwin Shinde

4

1Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India

²Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India

³Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India

4Computer Science and Engineering, DBACER, Nagpur, Maharashtra, India

1 [email protected]; 2 [email protected]; 3 [email protected]; 4 [email protected]

Abstract— This thought presents another development in the field of information security that is an

application with picture based confirmation and voice based verification and these both will go about as

qualification. The picture based watchword inserting with noticeable watermark and discourse

acknowledgment for desktop application helps in accomplishing abnormal state of security than the basic

alphanumeric secret key and in the meantime more simple to-utilize.

Keywords— ―Security‖, ―Verification‖, ―Watermark‖

I. INTRODUCTION

Confirmation assumes an imperative part in ensuring assets against unapproved utilize. Numerous

validation forms exist from basic secret key based verification framework to exorbitant biometric confirmation

frameworks. So while expanding security is an issue content based passwords are insufficient to handle such

issues. The requirement for something more secure alongside being easy to use is required. The procedure of

approval can be accomplished by utilizing certification, however these days qualification can be effortlessly

gotten to and the data is more powerless against such assault. Animal compel assault and there are numerous

product accessible which can help in speculating the accreditation. The alphanumeric watchword can be

speculated effortlessly by checking the predefined design in this way verification in view of content based

passwords has significant downsides. More refined confirmation process is expensive and may require extra

gear or equipment. To beat such disadvantages we built up a framework for check of individual character

utilizing C# ASP.NET. In the proposed framework, picture based verification and voice based confirmation can give abnormal state of security and will go about as accreditation. The picture based watchword installed with

watermark and Speech Recognition for desktop application helps in accomplishing abnormal state of security

than the basic alphanumeric secret key and in the meantime simpler to-utilize. [1][2]

Page 2: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 68

II. RELATED WORK

Password based authentication system

This is a straightforward framework where a client displays a client ID and a secret word to the framework.

On the off chance that the client ID and secret key match with the one put away on the framework, then the

client is verified. A client may have many records on numerous PCs. He needs to recollect numerous passwords. Examine on human subjective capacity has produced a considerable measure of information on what an

individual can recall [1]. For instance, space names are utilized rather than IP addresses and phone numbers are

softened up to lumps for a person to recall effectively. It is additionally demonstrated that people can recall

pictures more effortlessly than the content. The general propensity is that an individual may not recall content

passwords effortlessly and he may record it. This can prompt to taking watchword to increase unapproved

access to a framework. Since passwords can't be long, they are anything but difficult to break utilizing savage

constrain assaults like endeavoring distinctive passwords (online assault) or by disconnected assault on the

secret key hash record. There are numerous different approaches to break passwords like parcel sniffing, by

unplanned disclosure. Arrange activity is anything but difficult to catch and investigate utilizing the instruments

accessible in the web. Organize convention analyzers, for example, Ethereal Packet Sniffer and tcp dump can be

utilized to gather both approaching and active system information including content based passwords. [1]

Biometric based authentication system

Biometrics, the utilization of factual examination to distinguish people through their natural or

physiological qualities, is developing as a key viewpoint in new security frameworks. Utilizing biometrics, it is

conceivable to dodge pitfalls experienced with conventional security frameworks where clients are required to

keep data, for example, passwords, safe. Biometric validation frameworks might be extremely sheltered and secure and solid however these frameworks are exorbitant and require extra equipment and programming

support. These frameworks are hard to change and keep up. Sending such frameworks for web might be

extremely mind boggling and not reasonable. [1]

III. PROPOSED WORK

MODULES

A. Registration

Another client should finish the enrollment procedure by filling the fundamental data. In this module client

need to give fundamental data and all the data is put away in the database. The data will contain subtle elements

as username, client id, watchword, versatile number, email id and watermark. The client distinguishing proof

should be exceptional and will go about as essential key amid enrollment prepare. The watermark will go about

as a special code which when inserted with chose picture will give us more level of security. On the off chance

that he/she is as of now enrolled then they ought to login for further process.

B. Image based credential generation

In this module, client need to choose one picture and enter a watermark and should be installed keeping in mind

the end goal to separate the picture, and this picture will be exceptional in view of the watermark which was

implanted in the picture. Here watermark will be noticeable and as numeric and letters in order. Accordingly the

new produced pictures utilizing watermark will go about as first level of certification era.

C. Voice based credential generation

In this module, client needs to give the voice summon and which will go about as second level of qualification

generation.Asp.net give us an instrument to perceive discourse. The System.Speech.Recognition namespace

contains window desktop discourse innovation sorts for actualizing discourse recognition.SetupSpeech.ToText()

is capacity that calls the correct technique to change over discourse to content .Thus this will be our voice

charge for validation.

Page 3: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 69

D. Image based authentication

In this module, client needs to choose the required picture with a specific end goal to accomplish first level of

confirmation. On the off chance that the client gives required qualification then just can move to second level of

verification.

E. Voice based authentication

In this module, client needs to give the required voice charge with a specific end goal to accomplish second

level of confirmation. In the event that the client gives required accreditation then just can get to further process.

IV. FLOW DIAGRAM

The work flow diagram is shown below:

V. IMPLEMENTATION

Implementation of our work is as follows:

A.For opening the required application the user will have to first register himself by clicking to New User here ?

if user is already registered then he can directly login.

Page 4: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 70

(a) (b)

(c)

B.The process for image based credential generation are as follows in given snapshots:

(a) (b)

Page 5: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 71

(c) (d)

(e)

C. The process for voice based credential generation are as follows in given snapshots:

(a) (b)

Page 6: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 72

(c)

(d)

D. The process for image based authentication are as follows in given snapshots:

(a) (b)

Page 7: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 73

E.The process for voice based authentication are as follows in given snapshots:

(a) (b)

Page 8: New IJCSMC, Vol. 6, Issue. 2, February 2017, pg.67 Authentication … · 2017. 2. 28. · Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6

Priyanka Raut et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.2, February- 2017, pg. 67-74

© 2017, IJCSMC All Rights Reserved 74

VI. CONCLUSION

This paper introduces a picture and voice confirmation plot as another option to supplant content based

verification framework. The two level of validation gives heartier framework when contrasted with

alphanumeric verification prepares. Picture based validation utilizing watermark method makes picture based

confirmation more solid. Different applications can be shielded from different sorts of assault and the data can

be secured.

REFERENCES [1] Srinath Akula and Veerabhadram Devisetty “Image Based Registration and Authentication System,”

Department of Computer Science St cloud State University, St. Cloud, MN 56301

[2] Manish Kumar and Prof (Dr.) Jayant Shekhar “A Study of Implementation of Image Based Authentication System,”Subharti Institute of Technology and Engineering, Meerut, India Volume 4, Issue 4, April 2014.

[3] Prof.Shivashankar M.Rampur and Miss.Kavita S.Rampur, “An Approach of Speech Recognition System for Desktop Application,”Volume 5 Issue 12 Dec. 2016, Page No. 19471-19475