SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013), PP 39-46
www.iosrjournals.org
www.iosrjournals.org 39 | Page
Implementation of Knowledge Based Authentication System
Using Persuasive Cued Click Points
Devi Srinivas1
, M.L.Prasanthi2
1
(M.Tech, Computer Science and Engineering, Vardhaman College of Engineering/ JNTU Hyderabad, India)
2
(Associate Professor, Computer Science and Engineering, Vardhaman College of Engineering/ JNTU
Hyderabad, India)
Abstract : In this project, a graphical password system with a supportive sound signature to increase the
remembrance of the password is discussed. In proposed work a click-based graphical password scheme called
Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which
user can select one click-point per image. In addition user is asked to select a sound signature corresponding to
each click point this sound signature will be used to help the user in recalling the click point on an image.
System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to
Pass Points, saying that selecting and remembering only one point per image was easier and sound signature
helps considerably in recalling the click points.
Keywords - Security, Graphical password, Persuasive Cued Click Points.
I. Introduction
The Users often create memorable passwords that are easy for attackers to guess, but strong system-
assigned passwords are difficult for users to remember. A password authentication system should encourage
strong passwords while maintaining memo ability. We propose that authentication schemes allow user choice
while influencing users toward stronger passwords. We applied this approach to create the first persuasive click-
based graphical password system, Persuasive Cued Click-Points (PCCP), and conducted user studies evaluating
usability and security.
It is now beyond any doubt that USER AUTHENTICATION is the most critical element in the field of
Information Security. To date, Text Based Password Authentication (TBPA) has shown some difficulties that
users have tended to write passwords down manually or save them on hard disc. This tendency is caused by
passwords being strong and thus difficult to memorize in most cases. This has inadvertently given rise to
security issues pertaining to attack. Graphical User Authentication (GUA) has two symbiotic pillars as its
foundation: USABILITY &SECURITY. The macro-concept of GUA is based on the human psychological
factor that is images are more readily committed to memory than would TBPA’s.
Undoubtedly, there is currently the phenomenon of threats at the threshold of the internet, internal
networks and secure environments. Although security researchers have made great strides in fighting these
threats by protecting systems, individual users and digital assets, unfortunately the threats continue to cause
problems. The principle area of attack is AUTHENTICATION, which is of course the process of determining
the accessibility of a user to a particular resource or system.
Today, passive or active users are the key consideration of security mechanisms. The passive user is only
interested in understanding the system. The active user, on the other hand, will consider and reflect on ease of
use, efficiency.
Memorability, effectiveness and satisfaction of the system. Generally authentication methods are
classified into three categories:
1.1 Inherit Based Authentication
The Inherent Based Authentication category which is also known as Biometric Authentication, as the
name suggests, is the automated method/s of identity verification or identification based on measurable
physiological or behavioral characteristics such as fingerprints, palm prints, hand geometry, face recognition,
voice recognition and such other similar methods. Biometric characteristics are neither duplicable nor
transferable. They are constant and immutable. Thus it is near impossible to alter such characteristics or fake
them. Furthermore such characteristics cannot be transferred to other users nor be stolen as happens with tokens,
keys and cards. Unlike the security of a user’s password, biometric characteristics, for instance the user’s
fingerprint or iris pattern, are no secret. Hence there is no danger of a break in security.
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 40 | Page
1.2 Token Based Authentication
The Token Based Method category is again as the name suggests authentication based on a TOKEN
such as: a key, a magnetic card, a smart card, a badge and a passport. Just as when a person loses a key, he
would not be able to open the lock, a user who loses his token would not be able to login, as such the token
based authentication category is quite vulnerable to fraud, theft or loss of the token itself.
1.3 Knowledge Based Authentication
The concept of Knowledge Based Authentication is simply the use of conventional passwords, pins or
images to gain access into most computer systems and networks. Textual (alphabetical) and graphical user
authentications are two methods which are currently used.
1.4 Existing system
In the existing system, Brostoff and sasse carried out an empirical study of pass faces, which illustrates
well how a graphical password recognition system typically operates. Blonder-style passwords are based on
cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by
Pass logix Corporation, the user chooses several predefined regions in an image as his or her password. To log
in the user has to click on the same regions in effect, cued click points (ccp) is a proposed alternative to pass
points. In ccp, users click one point on each of 5 images rather than on five points on one image. It offers cued-
recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their
latest click-point (at which point they can cancel their attempt and retry from the beginning).It also makes
attacks based on hotspot analysis more challenging. Each click results in showing a next-image, in Effect
leading users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect
path, with an explicit indication of authentication failure only after the final click. Users can choose their images
only to the extent that their click-point dictates the next image. While the predictability problem can be solved
by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users
cannot easily remember such random passwords. Number of graphical password systems have been developed,
Study shows that text-based passwords suffers with both security and usability problems
Disadvantage: The problem with this scheme is that the number of predefined regions is small, perhaps a few
dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the
user. Another problem of this system is the need for the predefined regions to be readily identifiable.
The objective is to provide the security for any websites by using graphical passwords with view port and
persuasive cued click-points.
1.5 Proposed system:
In the proposed work we have integrated sound signature to help in recalling the password. No system
has been devolved so far which uses sound signature in graphical password authentication. Study says that
sound signature or tone can be used to recall facts like images, text etc. In daily life we see various examples of
recalling an object by the sound related to that object enters User ID and select one sound frequency which he
want to be played at login time, a tolerance value is also selected with will decide that the user is legitimate or
an imposter. To create detailed vector user has to select sequence of images and clicks on each image at click
points of his choice. Profile vector is created.
1.6 Levels:
figure 1: level 0
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 41 | Page
figure 2: level 1
figure 3: level 2
figure 4: level 3
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 42 | Page
1.7 System flow chart:
II. Algorithms
Algorithm Details
1. MD 5(Message-Digest)
2. DES(Data Encryption Standard)
MD5 Algorithm Description
• We begin by supposing that we have a b-bit message as input, and that we wish to find its
• Message digest, Here b is an arbitrary nonnegative integer; b may be zero, it need not be a
• Multiple of eight, and it may be arbitrarily large. We imagine the bits of the message written
• down as follows:
• m_0 m_1 ... m_{b-1}
• The following five steps are performed to compute the message digest of the message.
Login trail
Read User ID
Fetch User profile vector
Show Image from user
profile
Detect mouse position on
Image
If mouse
position=u
ser profile
Play sound signature
Play random sound
Get click points and
prepare login vector
Compare login and user
Vector
Log on Imposter
If d<D
Registration
Process
Get unique user ID from
user
Select sound signature
Select tolerance level
Select image
Select & click on pass point
Want more
images
No. of
image<5
Create User Profile
vector
User Profile Vector
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 43 | Page
DES (Data Encryption Standard)
• The choice of the primitive functions KS, S1, ..., S8 and P is critical to the strength of an encipherment
resulting from the algorithm
• The recommended set of functions are described as S1, ..., S8 and P in the algorithm.
• The first part of the table determines how the bits of C() are chosen, and
• the second part determines how the bits of D() are chosen.
• The bits of KEY are numbered 1 through 64.
III. Images
figuure 5: home page
figure 6: sign up
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 44 | Page
figure 7: upload images
figure 8: get click points
figure 9: login page
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 45 | Page
Figure 10: get image
figure 11: mail service
IV. Conclusion
A common security goal in password-based authentication systems is to maximize the effective
password space. This impacts usability when user choice is involved. We have shown that it is possible to allow
user choice while still increasing the effective password space. Furthermore, tools such as PCCP’s viewport
(used during password creation) cannot be exploited during an attack. Users could be further deterred (at some
cost in usability) from selecting obvious click-points by limiting the number of shuffles allowed during
password creation or by progressively slowing system response in repositioning the viewport with every shuffle
past a certain threshold. The approaches discussed in this paper present a middle ground between insecure but
memorable user-chosen passwords and secure system generated random passwords that are difficult to
remember.
Providing instructions on creating secure passwords, using password managers, or providing tools such
as strength meters for passwords have had only limited success. The problem with such tools is that they require
additional effort on the part of users creating passwords and often provide little useful feedback to guide users’
actions. In PCCP, creating a less guessable password (by selecting a click-point within the first few system-
suggested viewport positions) is the easiest course of action. Users still make a choice but are constrained in
their selection. Another often cited goal of usable security is helping users from accurate mental models of
security. Through our questionnaires and conversations with participants in authentication usability studies, it is
apparent that in general, users have little understanding of what makes a good password and how to best protect
themselves online. Furthermore, even those who are more knowledgeable usually admit to behaving insecurely
Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points
www.iosrjournals.org 46 | Page
(such as reusing passwords or providing personal information online even when unsure about the security of a
website) because it is more convenient and because they do not fully understand the possible consequences of
their actions. Guiding users in making more secure choices, such as using the viewport during password
creation, can help foster more accurate mental models of security rather than vague instructions such as “pick a
password that is hard for others to guess.” This persuasive strategy has also been used with some success to
increase the randomness of text passwords [40].Better user interface design can influence users to select
stronger passwords. A key feature in PCCP is that creating harder to guess password is the path of least
resistance, likely making it more effective than schemes where secure behaviour adds an extra burden on users.
The approach has proven effective at reducing the formation of hotspots and patterns, thus increasing the
effective password space.
To create detailed vector user has to select sequence of images and clicks on each image at click points
of his choice. Profile vector is created. Users preferred CCP to Pass Points, saying that selecting and
remembering only one point per image was easier and sound signature helps considerably in recalling the click
points. System showed very good Performance in terms of speed, accuracy, and ease of use.
Acknowledgements
We would like to thank Prof.L.V.N.Prasad and Prof.H.Venkateshwara Reddy, Vardhaman College of
Engineering for their help in web based techniques and Ms.M.L.Prasanthi Associate Professor CSE Department
for her guidance throughout this paper.
REFERENCES
Journal Papers:
[1] Sonia Chiasson, Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication
Mechanism VOL. 9, NO. 2, MARCH/APRIL 2012
Books:
[2] A. Salehi-Abari, J. Thorpe, and P. van Oorschot, “on purely automated attacks and click-based graphical passwords” (Proc.Ann.
Computer Security Applications Conf. (ACSAC), 2008).
Chapters in Books:
[3] Image Pointers: A. Baddeley and R. Turner, “Spatstat: An R Package for Analyzing Spatial Point Patterns,” (J. Statistical Software
vol. 12, no. 6, pp. 142, 2005).
[4] Graphical Password Security :” Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,” (E.
Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle“Proc. Ann. Computer Security Applications Conf. (ACSAC),
2010).
Theses:
[5] Implementation of Knowledge based Authentication System Using Persuasive Cued Click Points, JNTU Hyderabad, India.
Proceedings Papers:
[6] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM
Symp.Usable Privacy and Security (SOUPS), July 2007.

Contenu connexe

Tendances

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsIJMER
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemIJNSA Journal
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordIOSR Journals
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...IOSR Journals
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishnabanda5630
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Alexander Decker
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 

Tendances (18)

Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Passblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password SystemPassblot: A Highly Scalable Graphical One Time Password System
Passblot: A Highly Scalable Graphical One Time Password System
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
3 d password
3 d password3 d password
3 d password
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Two Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical PasswordTwo Step Endorsement: Text Password and Graphical Password
Two Step Endorsement: Text Password and Graphical Password
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 

En vedette

Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...
Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...
Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...IOSR Journals
 
Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...IOSR Journals
 
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...IOSR Journals
 
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...IOSR Journals
 
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesImplementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesIOSR Journals
 
Determination of load transfer in reinforced concrete solid slabs by finite e...
Determination of load transfer in reinforced concrete solid slabs by finite e...Determination of load transfer in reinforced concrete solid slabs by finite e...
Determination of load transfer in reinforced concrete solid slabs by finite e...IOSR Journals
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesIOSR Journals
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisIOSR Journals
 
On The Origin of Electromagnetic Waves from Lightning Discharges
On The Origin of Electromagnetic Waves from Lightning DischargesOn The Origin of Electromagnetic Waves from Lightning Discharges
On The Origin of Electromagnetic Waves from Lightning DischargesIOSR Journals
 
Convolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesConvolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesIOSR Journals
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...IOSR Journals
 
Advancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile DevicesAdvancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile DevicesIOSR Journals
 
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...IOSR Journals
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersIOSR Journals
 
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...IOSR Journals
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
 

En vedette (20)

Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...
Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...
Comparison and Supply Chain Optimization of Poultry Firm Using Mixed Integer ...
 
E010512730
E010512730E010512730
E010512730
 
Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...
 
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
 
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...
Peak to Average Power Ratio Performance of a 16-QAM/OFDM System with Partial ...
 
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesImplementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
 
Determination of load transfer in reinforced concrete solid slabs by finite e...
Determination of load transfer in reinforced concrete solid slabs by finite e...Determination of load transfer in reinforced concrete solid slabs by finite e...
Determination of load transfer in reinforced concrete solid slabs by finite e...
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing Performances
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
 
On The Origin of Electromagnetic Waves from Lightning Discharges
On The Origin of Electromagnetic Waves from Lightning DischargesOn The Origin of Electromagnetic Waves from Lightning Discharges
On The Origin of Electromagnetic Waves from Lightning Discharges
 
B0541218
B0541218B0541218
B0541218
 
Convolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesConvolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their Properties
 
B0961015
B0961015B0961015
B0961015
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
 
Advancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile DevicesAdvancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile Devices
 
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...
A comparison between M/M/1 and M/D/1 queuing models to vehicular traffic atKa...
 
G010523539
G010523539G010523539
G010523539
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice Coolers
 
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 

Similaire à Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points

Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1Shaibi Varkey
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONcscpconf
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique cscpconf
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 

Similaire à Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points (20)

Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1A graphical password authentication system (ieee 2011) 1
A graphical password authentication system (ieee 2011) 1
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique A Well Known Tool Based Graphical Authentication Technique
A Well Known Tool Based Graphical Authentication Technique
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
3 d
3 d3 d
3 d
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 

Dernier (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013), PP 39-46 www.iosrjournals.org www.iosrjournals.org 39 | Page Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points Devi Srinivas1 , M.L.Prasanthi2 1 (M.Tech, Computer Science and Engineering, Vardhaman College of Engineering/ JNTU Hyderabad, India) 2 (Associate Professor, Computer Science and Engineering, Vardhaman College of Engineering/ JNTU Hyderabad, India) Abstract : In this project, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. Keywords - Security, Graphical password, Persuasive Cued Click Points. I. Introduction The Users often create memorable passwords that are easy for attackers to guess, but strong system- assigned passwords are difficult for users to remember. A password authentication system should encourage strong passwords while maintaining memo ability. We propose that authentication schemes allow user choice while influencing users toward stronger passwords. We applied this approach to create the first persuasive click- based graphical password system, Persuasive Cued Click-Points (PCCP), and conducted user studies evaluating usability and security. It is now beyond any doubt that USER AUTHENTICATION is the most critical element in the field of Information Security. To date, Text Based Password Authentication (TBPA) has shown some difficulties that users have tended to write passwords down manually or save them on hard disc. This tendency is caused by passwords being strong and thus difficult to memorize in most cases. This has inadvertently given rise to security issues pertaining to attack. Graphical User Authentication (GUA) has two symbiotic pillars as its foundation: USABILITY &SECURITY. The macro-concept of GUA is based on the human psychological factor that is images are more readily committed to memory than would TBPA’s. Undoubtedly, there is currently the phenomenon of threats at the threshold of the internet, internal networks and secure environments. Although security researchers have made great strides in fighting these threats by protecting systems, individual users and digital assets, unfortunately the threats continue to cause problems. The principle area of attack is AUTHENTICATION, which is of course the process of determining the accessibility of a user to a particular resource or system. Today, passive or active users are the key consideration of security mechanisms. The passive user is only interested in understanding the system. The active user, on the other hand, will consider and reflect on ease of use, efficiency. Memorability, effectiveness and satisfaction of the system. Generally authentication methods are classified into three categories: 1.1 Inherit Based Authentication The Inherent Based Authentication category which is also known as Biometric Authentication, as the name suggests, is the automated method/s of identity verification or identification based on measurable physiological or behavioral characteristics such as fingerprints, palm prints, hand geometry, face recognition, voice recognition and such other similar methods. Biometric characteristics are neither duplicable nor transferable. They are constant and immutable. Thus it is near impossible to alter such characteristics or fake them. Furthermore such characteristics cannot be transferred to other users nor be stolen as happens with tokens, keys and cards. Unlike the security of a user’s password, biometric characteristics, for instance the user’s fingerprint or iris pattern, are no secret. Hence there is no danger of a break in security.
  • 2. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 40 | Page 1.2 Token Based Authentication The Token Based Method category is again as the name suggests authentication based on a TOKEN such as: a key, a magnetic card, a smart card, a badge and a passport. Just as when a person loses a key, he would not be able to open the lock, a user who loses his token would not be able to login, as such the token based authentication category is quite vulnerable to fraud, theft or loss of the token itself. 1.3 Knowledge Based Authentication The concept of Knowledge Based Authentication is simply the use of conventional passwords, pins or images to gain access into most computer systems and networks. Textual (alphabetical) and graphical user authentications are two methods which are currently used. 1.4 Existing system In the existing system, Brostoff and sasse carried out an empirical study of pass faces, which illustrates well how a graphical password recognition system typically operates. Blonder-style passwords are based on cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by Pass logix Corporation, the user chooses several predefined regions in an image as his or her password. To log in the user has to click on the same regions in effect, cued click points (ccp) is a proposed alternative to pass points. In ccp, users click one point on each of 5 images rather than on five points on one image. It offers cued- recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning).It also makes attacks based on hotspot analysis more challenging. Each click results in showing a next-image, in Effect leading users down a “path” as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Number of graphical password systems have been developed, Study shows that text-based passwords suffers with both security and usability problems Disadvantage: The problem with this scheme is that the number of predefined regions is small, perhaps a few dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the user. Another problem of this system is the need for the predefined regions to be readily identifiable. The objective is to provide the security for any websites by using graphical passwords with view port and persuasive cued click-points. 1.5 Proposed system: In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. Study says that sound signature or tone can be used to recall facts like images, text etc. In daily life we see various examples of recalling an object by the sound related to that object enters User ID and select one sound frequency which he want to be played at login time, a tolerance value is also selected with will decide that the user is legitimate or an imposter. To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created. 1.6 Levels: figure 1: level 0
  • 3. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 41 | Page figure 2: level 1 figure 3: level 2 figure 4: level 3
  • 4. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 42 | Page 1.7 System flow chart: II. Algorithms Algorithm Details 1. MD 5(Message-Digest) 2. DES(Data Encryption Standard) MD5 Algorithm Description • We begin by supposing that we have a b-bit message as input, and that we wish to find its • Message digest, Here b is an arbitrary nonnegative integer; b may be zero, it need not be a • Multiple of eight, and it may be arbitrarily large. We imagine the bits of the message written • down as follows: • m_0 m_1 ... m_{b-1} • The following five steps are performed to compute the message digest of the message. Login trail Read User ID Fetch User profile vector Show Image from user profile Detect mouse position on Image If mouse position=u ser profile Play sound signature Play random sound Get click points and prepare login vector Compare login and user Vector Log on Imposter If d<D Registration Process Get unique user ID from user Select sound signature Select tolerance level Select image Select & click on pass point Want more images No. of image<5 Create User Profile vector User Profile Vector
  • 5. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 43 | Page DES (Data Encryption Standard) • The choice of the primitive functions KS, S1, ..., S8 and P is critical to the strength of an encipherment resulting from the algorithm • The recommended set of functions are described as S1, ..., S8 and P in the algorithm. • The first part of the table determines how the bits of C() are chosen, and • the second part determines how the bits of D() are chosen. • The bits of KEY are numbered 1 through 64. III. Images figuure 5: home page figure 6: sign up
  • 6. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 44 | Page figure 7: upload images figure 8: get click points figure 9: login page
  • 7. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 45 | Page Figure 10: get image figure 11: mail service IV. Conclusion A common security goal in password-based authentication systems is to maximize the effective password space. This impacts usability when user choice is involved. We have shown that it is possible to allow user choice while still increasing the effective password space. Furthermore, tools such as PCCP’s viewport (used during password creation) cannot be exploited during an attack. Users could be further deterred (at some cost in usability) from selecting obvious click-points by limiting the number of shuffles allowed during password creation or by progressively slowing system response in repositioning the viewport with every shuffle past a certain threshold. The approaches discussed in this paper present a middle ground between insecure but memorable user-chosen passwords and secure system generated random passwords that are difficult to remember. Providing instructions on creating secure passwords, using password managers, or providing tools such as strength meters for passwords have had only limited success. The problem with such tools is that they require additional effort on the part of users creating passwords and often provide little useful feedback to guide users’ actions. In PCCP, creating a less guessable password (by selecting a click-point within the first few system- suggested viewport positions) is the easiest course of action. Users still make a choice but are constrained in their selection. Another often cited goal of usable security is helping users from accurate mental models of security. Through our questionnaires and conversations with participants in authentication usability studies, it is apparent that in general, users have little understanding of what makes a good password and how to best protect themselves online. Furthermore, even those who are more knowledgeable usually admit to behaving insecurely
  • 8. Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points www.iosrjournals.org 46 | Page (such as reusing passwords or providing personal information online even when unsure about the security of a website) because it is more convenient and because they do not fully understand the possible consequences of their actions. Guiding users in making more secure choices, such as using the viewport during password creation, can help foster more accurate mental models of security rather than vague instructions such as “pick a password that is hard for others to guess.” This persuasive strategy has also been used with some success to increase the randomness of text passwords [40].Better user interface design can influence users to select stronger passwords. A key feature in PCCP is that creating harder to guess password is the path of least resistance, likely making it more effective than schemes where secure behaviour adds an extra burden on users. The approach has proven effective at reducing the formation of hotspots and patterns, thus increasing the effective password space. To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. System showed very good Performance in terms of speed, accuracy, and ease of use. Acknowledgements We would like to thank Prof.L.V.N.Prasad and Prof.H.Venkateshwara Reddy, Vardhaman College of Engineering for their help in web based techniques and Ms.M.L.Prasanthi Associate Professor CSE Department for her guidance throughout this paper. REFERENCES Journal Papers: [1] Sonia Chiasson, Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism VOL. 9, NO. 2, MARCH/APRIL 2012 Books: [2] A. Salehi-Abari, J. Thorpe, and P. van Oorschot, “on purely automated attacks and click-based graphical passwords” (Proc.Ann. Computer Security Applications Conf. (ACSAC), 2008). Chapters in Books: [3] Image Pointers: A. Baddeley and R. Turner, “Spatstat: An R Package for Analyzing Spatial Point Patterns,” (J. Statistical Software vol. 12, no. 6, pp. 142, 2005). [4] Graphical Password Security :” Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,” (E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle“Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010). Theses: [5] Implementation of Knowledge based Authentication System Using Persuasive Cued Click Points, JNTU Hyderabad, India. Proceedings Papers: [6] S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp.Usable Privacy and Security (SOUPS), July 2007.