30
loading

Three Level Security System Using Image Based Aunthentication

Embed Size (px)

Citation preview

Page 1: Three Level Security System Using Image Based Aunthentication

loading

Page 2: Three Level Security System Using Image Based Aunthentication

WELCOME

Page 3: Three Level Security System Using Image Based Aunthentication

THREE LEVEL SECURITY SYSTEM USING IMAGE BASED AUTHENTICATION

PRESENTED BY: K. JAYARAM B. SASIKARAN K. VADIVEL S. MOHAN BABU G. SATHISH

Page 4: Three Level Security System Using Image Based Aunthentication

What is Security

Page 5: Three Level Security System Using Image Based Aunthentication

CONTENTS Introduction Existing System Propose System Hardware Specification Software Specification SECURITY LEVEL 1 SECURITY LEVEL 2 SECURITY LEVEL 3 FLOW CHART

Page 6: Three Level Security System Using Image Based Aunthentication

INTRODUCTION

Page 7: Three Level Security System Using Image Based Aunthentication

Texts passwords are the most commonly used technique for authentication and have several drawbacks.

Graphical passwords provide a promising alternative to traditional alphanumeric passwords due to the fact that humans can remember pictures better than text.

Page 8: Three Level Security System Using Image Based Aunthentication

In this paper, we propose a simple graphical password authentication system that consists of a sequence of ‘n’ images and the user have to select the click points associated with one of the ‘n’ image in correct sequence for successful login.

This authentication system employs the user’s personal handheld device as the second factor of authentication.

Page 9: Three Level Security System Using Image Based Aunthentication

With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations to overcome threats such as key-loggers, shoulder surfing, weak passwords. Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique. Users Click on one point per image for a sequence of images.

Page 10: Three Level Security System Using Image Based Aunthentication

Existing System

Page 11: Three Level Security System Using Image Based Aunthentication

Security-sensitive environments protect their access

control mechanisms. resources against unauthorized access by enforcing

Text based passwords are not secure enough for such applications.

User authentication can be improved by using both

text passwords and structured images.

Page 12: Three Level Security System Using Image Based Aunthentication

The existing system is Pass Points.

It proposed Passwords which could be composed of several points anywhere on an Image.

They also proposed a scheme with three overlapping grids, allowing for login attempts that were approximately correct to be accepted

Page 13: Three Level Security System Using Image Based Aunthentication

Propose System

Page 14: Three Level Security System Using Image Based Aunthentication

A password authentication system should encourage strong

passwords while maintaining memo ability.

We propose that authentication schemes allow user choice while influencing users toward stronger passwords

In our system, the task of selecting weak passwords (which are easy for attackers to predict) is more tedious, discouraging users from making such choices. In effect, this approach

Page 15: Three Level Security System Using Image Based Aunthentication

HARDWARE SPECIFICATION

Page 16: Three Level Security System Using Image Based Aunthentication

PROCESSOR : Dual CoreHARD DISK : 256 GBRAM : 1 GBKEYBOARD : 104 keys Standard KeyboardMONITOR : 15” Color Monitor MOUSE : Standard 3 Button Mouse

Page 17: Three Level Security System Using Image Based Aunthentication

SOFTWARE SPECIFICATION

Page 18: Three Level Security System Using Image Based Aunthentication

Operating System : Windows XP, -Windows8Front end : JAVA SwingBack end : MYSQL

Page 19: Three Level Security System Using Image Based Aunthentication

SECURITY LEVEL 1

Page 20: Three Level Security System Using Image Based Aunthentication

Username Password & Color PattenSECURITY LEVEL 1

Page 21: Three Level Security System Using Image Based Aunthentication

SECURITY LEVEL 2

Page 22: Three Level Security System Using Image Based Aunthentication

Axis identifying the image SECURITY LEVEL 2

Page 23: Three Level Security System Using Image Based Aunthentication

SECURITY LEVEL 3

Page 24: Three Level Security System Using Image Based Aunthentication

Opt code & Character button SECURITY LEVEL 3

Page 25: Three Level Security System Using Image Based Aunthentication

FLOW CHART

Page 26: Three Level Security System Using Image Based Aunthentication
Page 27: Three Level Security System Using Image Based Aunthentication
Page 28: Three Level Security System Using Image Based Aunthentication

ANY QUERIES…..

?????

Page 29: Three Level Security System Using Image Based Aunthentication

THANK U

Page 30: Three Level Security System Using Image Based Aunthentication

by TEAM MEMBERS

END