Graphical Authentication System
Graphical Authentication System
Graphical Authentication System
Abstract: Graphical password secure authentication system is one of technic for authentication of computer security. Today,
computer science's most crucial component for protecting user or client data is digital/computer security. And one of the
hazards is shoulder-surfing, in which a thief might obtain a password by keeping watch on the authentication process or
filming it. There are several approaches for this authentication, with the Graphical Password Technique being the most
popular and straightforward. So, we provide a fresh approach to solve this issue. To defend against shoulder surfing attacks,
we have created two ideas. To start, if there is no registration, the user must create one. Second, you need to sign in using a
legitimate user ID and password. It is the password an assortment of letters and digits. Third, the user must pass an image-
based authentication process where they can select the likelihood of a password and this strategy working against one other is
greater. You should select a password based on your registration. Password must match when logging in. You need upload an
image of your choice, then the image is divided into four parts. Multiple images should be selected in graphical
password authentication, and You must remember the password sequence. Like three-factor authentication, too. So, this
is proposed a new graphical password secure authentication system that is resistant to shoulder surfing as well as other forms
of attacks probable assaults.
Key Words: Computer Authentication, Graphical Password, Computer security.
review of Multi-Factor Authentication
• The protocol to better fit our research needs. Methods
I. INTRODUCTION 1 utilized in our research involve the following steps:
(1) Data Collection through database search,
Graphical password secure authentication system is the (2) Data Screening involving: Title screening
name for an authentication method that relies on more
than one factor when determining whether to grant access • During our systematic literature review, we
to a computer user. It has become an increasingly investigated the existing set of literature based around
important means of proving identity and securing user studies in multifactor authentication for paving the
information. From the moment the first treasure was path for future studies by underlining existing gaps in
amassed, limiting access to it became a priority. If buried research
in the ground, knowledge of the location was critical. If a • Risk perception analysis is extremely helpful in
locked chest or storage room were involved, a key was understanding the risk in security challenges. We
required. If guards were posted, recognition of the rightful identified majority research on risk perception are
owner was vital. Today data is the great treasure that must focused on usability and password memorability. Table 2
be secured, but the means of protecting it still often shows the different types of risk analysis the studies
involve these elemental factors: knowledge, possession, performed; tool risk trade-off understanding was studied
and inherence. In other words, access is granted or denied for 5% of the paper which was an interesting finding
depending on what someone knows, what someone has or since many research claims that there is a misalignment
what someone uniquely is. of user risk perception with tool’s utility. Nudging was
considered as a primary method to interject into the risk
II. OBJECTIVE mental models of the users.
The goal Graphical password secure authentication • While MFA is gradually gaining popularity, password
authentication still dominates the area of single-factor
system of is to create a layered defense that makes it more
authentication, as well as the first factor in MFA
difficult for an unauthorized person to access a target, such
authentication. We saw that 16% of the user studies
as a physical location, computing device, network, or
focused on understanding the password security
database. If one factor is compromised or broken, the
understanding of the users. We found that security
attacker still has at least one or more barriers to breach
researchers are particularly interested in the password
before successfully breaking into the target. Protection of
creation and management.
access to identity data with strong authentication
mechanisms. Provides adaption and improvement of
cryptographic methods to securely store and share identity
data in the cloud.
IV. METHODOLOGY
III. LITERATURE REVIEW
In this project when any user tries to access the
We adapted the study methodology for the literature Homepage, they will be provided with three options
register, login and about developer. If you have not
1
registered yet, then you must click register option. 1)
Then register page will appear, you must provide first
text base password and necessary information like first
name, last name, email, password, security question etc.
2) After clicking next Image base password page will
appear, you have to select multiple images as a password
and save it. 3) After clicking to proceed next Google
authentication page will appear, you have to register by
scanning the barcode from your mobile. 4) Then you
have to come back to home page, then you have to click
on login. After that you have to provide the username
and correct password. If text base username and
password are correct, then you have successfully login in
text base password. 5) Then Image base password page
will appear, after that you have to select image base on
password. If it is correct, then you have successfully
login in image base password. 6). Then you have to
authenticate by using Google authenticator. 7) Then
main page will come.
V. FLOW CHART
attractive Attractive