Sei sulla pagina 1di 6

IMAGE BASED AUTOMATED ATTACKS ON GRAPHICAL

MULTIFACTOR AUTHENTICATION

ABSTRACT

In this paper, we present a series of methods to authenticate a user with a


graphical password. To that end, we employ the user’s personal handheld device as the
password decoder and the second factor of authentication. In our methods, a service
provider challenges the user with an image password. To determine the appropriate click
points and their order, the user needs some hint information transmitted only to her
handheld device. We show that our method can overcome threats such as key-loggers,
weak password, and shoulder surfing. With the increasing popularity of handheld devices
such as cell phones, our approach can be leveraged by many organizations without
forcing the user to memorize different passwords or carrying around different tokens.
In addition staff is wanted to download a university question paper the
corresponding department HOD and Staffs recalling the click point on an image. System
showed very good Performance in terms of speed, accuracy, and ease of use. Users
preferred click points, saying that selecting and remembering image points was easier and
mobile helps considerably in recalling the click points. The University Questions can be
downloaded between the corresponding time periods. So it becomes more security for all
and it overcomes the screen recording because each time click points generated
randomly.

TECHNOLOGIES USED

Front End : VB.Net


Back End : SQL Server
PROJECT DESCRIPTION
In this project contains 3 modules such as,

 Admin
 Upload Questions
 Exam Time Table Scheduling

 Registration or User Vector Profile

 Graphical Authentication

 HOD AND Staffs Login


 Authentication
 Download Questions

Admin
Upload Questions
This module is only accessed by admin. Administrators have
separate username and password for upload university questions. This
module contains Department Name, Question Uploaded Date and Time,
Question code, Subject Name, Regulation etc.,

Exam Time Table Scheduling


Exam Scheduling is an important module for question paper
uploading and downloading. Question paper only downloaded by staffs
with help of HOD within time period of the corresponding date else the
question paper can’t be download by users.
Registration Or user Profile Vector
Registration is an enrollment of all department staff and
corresponding HOD’s. The User vector points are mentioned only in this
module. It contains User ID, User Name, Address, Designation, Mail ID,
Mobile No, Vector Points etc.,

Graphical Authentication

HOD Login & Staffs Login

When the users want to access or download a protected University


Question paper, the admin activates the HOD login security. The staffs
only access after the corresponding department HOD login. It contains
username and mail id for authentication.

Authentication
Two authentication securities are maintained. The First one is
HOD. The HOD gives the correct username and mailed the vector points
are send to handheld device. It is click-based graphical password scheme
called Graphical password authentication. It can be viewed as a
combination of click Points. A password consists of ten click points per
image.
An important usability goal for authentication systems is to support
users in selecting better passwords, thus increasing security by expanding
the effective password space. We use persuasion to influence user choice
in click-based graphical passwords, encouraging users to select more
random, and hence more secure, click-points. Our resulting scheme
significantly reduces hotspots while still maintaining its usability.
The users forgot the password points the secret question will be
asked by admin. The user can get the click points through handheld
device.
Download Questions

The word or PDF representation is very useful for staff for easy

reference and take printouts. After authentication section the

corresponding question paper downloaded by staff.

SYSTEM STUDY

EXISTING SYSTEM
In the existing system, Brostoff and sasse carried out an empirical study of passfaces,
which illustrates well how a graphical password recognition system typically operates.
Blonder-style passwords are based on cued recall. A user clicks on several previously
chosen locations in a single image to log in. As implemented by Passlogix Corporation,
the user chooses several predefined regions in an image as his or her password. To log in
the user has to click on the same regions in effect, cued click points (ccp) is a proposed
alternative to passpoints.

Screen Recording can be used to capture or clip any area of your desktop screen.
Once launched, you simply drag the window to the area you want to capture, set the size
of the area to clip and then click the check-mark to take the screenshot. It captures the
passwords that pass through your network adapter, and display them on the screen
instantly.
Disadvantage:

The problem with this scheme is that the number of predefined regions is small,
perhaps a few dozens in a picture. The password may have to be up to 12 clicks for
adequate security, again tedious for the user. Another problem of this system is it secretly
records computer screen while silently running in the background.
Proposed System:
In the proposed work we have integrated mobile key signature to help in recalling the
password. No system has been devolved so far which uses signature in graphical
password authentication. Study says that signature can be used to recall facts like images,
text etc. To create detailed vector user has to select images and clicks on image at click
points of his choice. Profile vector is created for both HOD and Staffs for secure
downloading.

Profile Vectors-

The proposed system creates user profile as follows-


Master vector - (User ID, Username, Mail ID, Contact Number etc)
Detailed Vector - (Click Points)
As an example of vectors -
Master vector (1,Smith etc.,)
Detailed Vector
Click points
1(123,678), 2(176,134),3(450,297),4(761,164) etc.,
System Requirements:
Hardware Requirements:

• System : Pentium IV 2.4 GHz.


• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.

• Ram : 512 Mb.

Software Requirements:

• Operating system : Windows XP.


• Coding Language : VB.Net
• Data Base : SQL Server

Potrebbero piacerti anche