Graphical Authentication System

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

Graphical Password

SYED MOHAMMED FURQAN ISHAQUI


*1
*1
SecureJAMEEL
, Dr. MOHAMMED Authentication
HASHMI
*2

ME Student, Dept. of Computer Science Engineering, ISL Engineering College


*2 System
Associate Professor, Dept. of Computer Science Engineering, ISL Engineering College

Abstract: Graphical password secure authentication system is one of technic for authentication of computer security. Today,
computer science's most crucial component for protecting user or client data is digital/computer security. And one of the
hazards is shoulder-surfing, in which a thief might obtain a password by keeping watch on the authentication process or
filming it. There are several approaches for this authentication, with the Graphical Password Technique being the most
popular and straightforward. So, we provide a fresh approach to solve this issue. To defend against shoulder surfing attacks,
we have created two ideas. To start, if there is no registration, the user must create one. Second, you need to sign in using a
legitimate user ID and password. It is the password an assortment of letters and digits. Third, the user must pass an image-
based authentication process where they can select the likelihood of a password and this strategy working against one other is
greater. You should select a password based on your registration. Password must match when logging in. You need upload an
image of your choice, then the image is divided into four parts. Multiple images should be selected in graphical
password authentication, and You must remember the password sequence. Like three-factor authentication, too. So, this
is proposed a new graphical password secure authentication system that is resistant to shoulder surfing as well as other forms
of attacks probable assaults.
Key Words: Computer Authentication, Graphical Password, Computer security.
review of Multi-Factor Authentication
• The protocol to better fit our research needs. Methods
I. INTRODUCTION 1 utilized in our research involve the following steps:
(1) Data Collection through database search,
Graphical password secure authentication system is the (2) Data Screening involving: Title screening
name for an authentication method that relies on more
than one factor when determining whether to grant access • During our systematic literature review, we
to a computer user. It has become an increasingly investigated the existing set of literature based around
important means of proving identity and securing user studies in multifactor authentication for paving the
information. From the moment the first treasure was path for future studies by underlining existing gaps in
amassed, limiting access to it became a priority. If buried research
in the ground, knowledge of the location was critical. If a • Risk perception analysis is extremely helpful in
locked chest or storage room were involved, a key was understanding the risk in security challenges. We
required. If guards were posted, recognition of the rightful identified majority research on risk perception are
owner was vital. Today data is the great treasure that must focused on usability and password memorability. Table 2
be secured, but the means of protecting it still often shows the different types of risk analysis the studies
involve these elemental factors: knowledge, possession, performed; tool risk trade-off understanding was studied
and inherence. In other words, access is granted or denied for 5% of the paper which was an interesting finding
depending on what someone knows, what someone has or since many research claims that there is a misalignment
what someone uniquely is. of user risk perception with tool’s utility. Nudging was
considered as a primary method to interject into the risk
II. OBJECTIVE mental models of the users.
The goal Graphical password secure authentication • While MFA is gradually gaining popularity, password
authentication still dominates the area of single-factor
system of is to create a layered defense that makes it more
authentication, as well as the first factor in MFA
difficult for an unauthorized person to access a target, such
authentication. We saw that 16% of the user studies
as a physical location, computing device, network, or
focused on understanding the password security
database. If one factor is compromised or broken, the
understanding of the users. We found that security
attacker still has at least one or more barriers to breach
researchers are particularly interested in the password
before successfully breaking into the target. Protection of
creation and management.
access to identity data with strong authentication
mechanisms. Provides adaption and improvement of
cryptographic methods to securely store and share identity
data in the cloud.
IV. METHODOLOGY
III. LITERATURE REVIEW
In this project when any user tries to access the
We adapted the study methodology for the literature Homepage, they will be provided with three options
register, login and about developer. If you have not
1
registered yet, then you must click register option. 1)
Then register page will appear, you must provide first
text base password and necessary information like first
name, last name, email, password, security question etc.
2) After clicking next Image base password page will
appear, you have to select multiple images as a password
and save it. 3) After clicking to proceed next Google
authentication page will appear, you have to register by
scanning the barcode from your mobile. 4) Then you
have to come back to home page, then you have to click
on login. After that you have to provide the username
and correct password. If text base username and
password are correct, then you have successfully login in
text base password. 5) Then Image base password page
will appear, after that you have to select image base on
password. If it is correct, then you have successfully
login in image base password. 6). Then you have to
authenticate by using Google authenticator. 7) Then
main page will come.

V. FLOW CHART

VI. ANALYSIS AND RESULT


COMPARISON OF TECHNOLOGIES

Comparison Text Based Colour Based Image Based

Security Less Highest Highest

Required Cost Nothing Less Less

Usability Easy Easy Easiest

Availability Always Always Always

GUI User user friendly / User Friendly /

Friendly / Not Attractive more

attractive Attractive

The screenshots of the results of the designed VII. CONCLUSION


system are shown in above figure.
Digital devices are becoming part of our life day by day.
1) Then register page will appear, you must
By using digital devices, we have abled to know about
provide first text base password and necessary
information like first name, last name, email, authentication process. Validation is an integral part of
password, security question etc. security. Authentication will give the customer greater
2) After clicking next Image base password page security. Specific review articles research in the same field
will appear, you have to select multiple images as about the specific assaults found during validation. Printed
a password and save it. hidden term authentication is an excellent testing device. It
3) After clicking to proceed next Google is more useful and secure compared to previous old base
authentication page will appear, you have to graphical password authentication systems. Since the
register by scanning the barcode from your password space is very large, it offers security against
mobile. 4) Then you have to come back to home
brute force attacks. It’s easy to use. Passwords can be
page, then you have to click on login. After that
easily created and recall. The randomization in both the
you have to provide the username and correct
password. If text base username and password are authentication system provides strong security against
correct, then you have successfully login in text shoulder surfing. To have a good system, you need high
base password. security and good usability, and can’t be separated them.
5) Then Image base password page will appear, Shoulder navigation attack is subject to safety precaution.
after that you have to select image base on However, proposed methods for the shoulder surfing
password. If it is correct, then you have problem still need to be improved. This system can also be
successfully login in image base password. used to add a higher level of security to the text-based
6). Then you have to authenticate by using password system. This system is very cheap as compared
Google authenticator. to a biometrics system.
7) Then main page will come.
VIII. REFERENCES Engineering, College of e-learning Shiraz University,
[1] Graphical Password Authentication. Shraddha M. Gh. Dastghaiby fard Department of Computer science
Gurav Computer Department Mumbai University & Engineering, College of Electrical and Computer &
RMCET Ratnagiri, India. Leena S. Gawade Computer Engineering Shiraz University,jun- 2015.
Department Mumbai University RMCET Ratnagiri, [7] Text based Graphical Password System to Obscure
India, 2014 IEEE. Shoulder Surfing. Khazima Irfan, Agha Anas, Sidra
[2] Enhancement of Password Authentication System Malik, Saneeha Amir Department of Computer
Using Graphical Images. Amol Bhand,Vaibhav desale Science COMSATS Institute of
Savitrybai Phule Pune University, Swati Shirke InformationTechnology Islamabad Pakistan, 13th
Dept.of Computer Engineering NBN Sinhgad School January,2018
of Engineering, Pune, Dec 16-19, 2015 [8] A Shoulder-Surfing Proof Graphical Password
[3] The Shoulder Surfing Resistant Graphical Authentication Model for Mobile Devices. Teoh joo
Password Authentication Technique. Mrs.Aakansha S. Fong, Azween Abdullah , NZ Jhanjhi School of
Gokhalea , Prof. Vijaya S.Waghmareb. Computing & IT, Taylor?s University, Subang Jaya,
[4] A New Graphical Password Scheme Resistant to Selangor, Malaysia, 2019
Shoulder-Surfing. Uwe Aickelin School of Computer [9] Security in Graphical Authentication. Robert G.
Science the University of Nottingham Nottingham, Rittenhouse, Junaid Ahsenali Chaudry and Malrey
NG8 1BB, U.K. Lee Department of Computer Science and
[5] Minimizing Shoulder Surfing Attack using Text Engineering, Qatar University, Doha, Qatar, May,
and Colour Based Graphical Password Scheme. Prof. 2013.
S. K. Sonkar, Prof. R. L. Paikrao , Prof. Awadesh
Kumar, Mr. S. B. Deshmukh, Computer Engineering
Dept. Computer Engineering Dept. Amrutvahini
College of engineering, February - 2014

[6] A Graphical Password Against Spyware and


Shoulder-surfing Attacks. Elham Darbanian Master of

You might also like