Sei sulla pagina 1di 8

GRAPHICAL SONAR AUTHENTICATION USING CCP

Problem Definition

To maintain confidentiality, certain security measures are to be provided which can be passwords. Passwords are to be in such a way that it must not be hacked or guessed easily and at the same time it must be easy for the user to keep in memory. Passwords can be characters, numbers, alpha numeric and 3D(characters, numbers and symbols) and sometimes encrypted ones. The more security the password offers, the harder it is to keep in mind. So there has to be a perfect trade-off to achieve both security and convenience. If the security is offered in different levels, it considerably reduces the users convenience and flexibility.

Existing System

Passwords or authentication is based on keywords, texts, cryptography, biometrics, etc. Graphical or visual passwords are chosen as an alternative to it. Eg: capcha images

Graphical authentication includes identification of the image, comparison of the image, holograms, etc. Pass-points is a recently developed technique in which the user clicks over various points in an image in a predefined sequential manner to authenticate or identify themselves.

Existing System Disadvantages

Text based passwords lag in terms of both security and convenience. Pass-points suffer from the drawback that any wrong attempt gets identified only at the end of the process. Since the clicks are to be located on a single image it is easier to crack. If the number of clicks is increased it becomes more tedious for the user.

Proposed System

Graphical authentication is done using CCP in the proposed system. CCP Cued Click Points. The user defines a series of images based on his interest defining a pixel/point in each image. To assist the user cues are given to the user in the form of audio which easily helps the user to identify the point. So irrespective of the number of images the user is easily able to identify the click points in each image. The security level offered by this technique is considerably high. It is impossible for the intruder to relate the image and the clip since the image and the sound clip is assigned by the user itself.

Modules

Creation of User Profile Vector


(User ID, Sound signature, Tolerance)

Creation of Detailed Vector


(Image, Click Points)

Comparison of Login Vector User space (Upload / Download)

User is given his own space to upload and download files

Timeline Chart
TIMELINE ACTIVITIES W1

DECEMBER
W2 W3 W4 W1

JANUARY
W2 W3 W4 W1

FEBRUARY
W2 W3 W4 W1

MARCH
W2 W3 W4

Project Requirement and Analysis

User Interface Design

User Profiles and Vector Creation and Authentication

Java Application Development and Integration Documentation and Testing

Work Planned

Work Done

Work in Progress

References

Saurabh Singh, Gaurav Agarwal, Integration of Sound Signature in Graphical Password Authentication System, International Journal of Computer Applications (0975 - 8887) Vol. 12, No. 9, January 2011. Sonia Chiasson, P.C. Van Oorschot, Robert Biddle, Graphical Password Authentication Using Cued Click Points, IEEE 13th International Conference on Advanced Security Mechanisms, pp. 574-590, 2011. Jayakumar Srinivasan, Centered Discretization with Application to Graphical Passwords, Symposium on Usable Privacy and Security (SOUPS) 2007.

Potrebbero piacerti anche