authentication scheme for session password using images and color

19
Kai. Sushilatai Gaikwad Bahuuddeshiya Sanstha’s BHARAT RATN INDIRA GANDHI COLLEGE OF ENGINEERING,KEGAON,SOLAPUR SEMINAR ON Under the Guidance Of Prof. Sneha Tirth Presented By Nitesh Kumar sah Mayur Bulbule Vasim Inamdar Manoj Kamshetti “Authentication scheme for session password using color and images”

Upload: nitesh-kumar

Post on 19-Jun-2015

8.444 views

Category:

Technology


1 download

TRANSCRIPT

  • 1. Kai. Sushilatai Gaikwad Bahuuddeshiya SansthasBHARAT RATN INDIRA GANDHI COLLEGE OFENGINEERING,KEGAON,SOLAPURSEMINARONUnder the Guidance OfProf. Sneha TirthPresented ByNitesh Kumar sahMayur BulbuleVasim InamdarManoj Kamshetti

2. Contents Introduction Project Objective Requirement Analysis System Architecture Modules Installation & Maintenance Conclusion Future Scope 3. Introduction Textual password, the most common method usedfor authentication. Textual password are vulnerable to eves dropping,dictionary attacks, social engineering & shouldersurfing. Graphical password, an alternative technique. 4. Projective Objective To develop secure system To avoid eves dropping. To avoid shoulder surfing. To avoid dictionary attack. To avoid brute force attack. 5. Requirement AnalysisSoftware Requirement Operating System: Windows XP, Window 7, Windows Vista Jdk 1.6 Net bean IDE 7.1 MySqlServer 5.5.28 MySqlGuiTools 5.0 Programming Language : JavaHardware Requirement Processor : Pentium 4 Hard Disk : 1 GB Ram : 512 MB 6. System ArchitectureUser RegistrationPoint Selection onImageColor Chart Table1Table2Figure :- Registration Diagram 7. User Color AuthenticationImage Pont AuthenticationSMS AuthenticationTable1Table2Figure :- Authentication DiagramSystem Architecture 8. ModulesFigure :- Registration Page 9. ModulesFigure :- Image Selection 10. Figure :- Selected ImageModules 11. ModulesFigure :- Rating of colors 12. Figure :- Login PageModules 13. ModulesFigure :- Login for Color Rating 14. Figure :- User Data 15. Installation and MaintenanceInstallation to be done Install the JDK 1.7 Install Net Beans IDE 7.1 MySQL server 5.5.0 MysqlGuiTool 5.0.5Maintenance Connectivity Database 16. Conclusion It is more securable ascompared to theexisting system. It is not vulnerable toshoulder surfing, evesdropping, brute forceattack.More sites More passwords More forgetting More repeated credentialsIncreased exposure to hackingand cloning 17. Future Scope It can be used in PDAs. Folder locker or an external gateway authentication toconnect the application to a database or an externalembedded device.