three level security system using image based aunthentication
TRANSCRIPT
loading
WELCOME
THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION
PRESENTED BY: K. JAYARAM B. SASIKARAN K. VADIVEL S. MOHAN BABU G. SATHISH
What is Security
CONTENTS Introduction Existing System Propose System Hardware Specification Software Specification SECURITY LEVEL 1 SECURITY LEVEL 2 SECURITY LEVEL 3 FLOW CHART
INTRODUCTION
Texts passwords are the most commonly used technique for authentication and have several drawbacks.
Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.
In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.
This authentication system employs the user’s personal handheld device as the second factor of authentication.
With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords. Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images.
Existing System
Security-sensitive environments protect their access
control mechanisms. resources against unauthorized access by enforcing
Text based passwords are not secure enough for such applications.
User authentication can be improved by using both
text passwords and structured images.
The existing system is Pass Points.
It proposed Passwords which could be composed of several points anywhere on an Image.
They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted
Propose System
A password authentication system should encourage strong
passwords while maintaining memo ability.
We propose that authentication schemes allow user choice while influencing users toward stronger passwords
In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach
HARDWARE SPECIFICATION
PROCESSOR : Dual CoreHARD DISK : 256 GBRAM : 1 GBKEYBOARD : 104 keys Standard KeyboardMONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse
SOFTWARE SPECIFICATION
Operating System : Windows XP, -Windows8Front end : JAVA SwingBack end : MYSQL
SECURITY LEVEL 1
Username Password & Color PattenSECURITY LEVEL 1
SECURITY LEVEL 2
Axis identifying the image SECURITY LEVEL 2
SECURITY LEVEL 3
Opt code & Character button SECURITY LEVEL 3
FLOW CHART
ANY QUERIES…..
?????
THANK U
by TEAM MEMBERS
END