Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Problem Definition
To maintain confidentiality, certain security measures are to be provided which can be passwords. Passwords are to be in such a way that it must not be hacked or guessed easily and at the same time it must be easy for the user to keep in memory. Passwords can be characters, numbers, alpha numeric and 3D(characters, numbers and symbols) and sometimes encrypted ones. The more security the password offers, the harder it is to keep in mind. So there has to be a perfect trade-off to achieve both security and convenience. If the security is offered in different levels, it considerably reduces the users convenience and flexibility.
Existing System
Passwords or authentication is based on keywords, texts, cryptography, biometrics, etc. Graphical or visual passwords are chosen as an alternative to it. Eg: capcha images
Graphical authentication includes identification of the image, comparison of the image, holograms, etc. Pass-points is a recently developed technique in which the user clicks over various points in an image in a predefined sequential manner to authenticate or identify themselves.
Text based passwords lag in terms of both security and convenience. Pass-points suffer from the drawback that any wrong attempt gets identified only at the end of the process. Since the clicks are to be located on a single image it is easier to crack. If the number of clicks is increased it becomes more tedious for the user.
Proposed System
Graphical authentication is done using CCP in the proposed system. CCP Cued Click Points. The user defines a series of images based on his interest defining a pixel/point in each image. To assist the user cues are given to the user in the form of audio which easily helps the user to identify the point. So irrespective of the number of images the user is easily able to identify the click points in each image. The security level offered by this technique is considerably high. It is impossible for the intruder to relate the image and the clip since the image and the sound clip is assigned by the user itself.
Modules
Timeline Chart
TIMELINE ACTIVITIES W1
DECEMBER
W2 W3 W4 W1
JANUARY
W2 W3 W4 W1
FEBRUARY
W2 W3 W4 W1
MARCH
W2 W3 W4
Work Planned
Work Done
Work in Progress
References
Saurabh Singh, Gaurav Agarwal, Integration of Sound Signature in Graphical Password Authentication System, International Journal of Computer Applications (0975 - 8887) Vol. 12, No. 9, January 2011. Sonia Chiasson, P.C. Van Oorschot, Robert Biddle, Graphical Password Authentication Using Cued Click Points, IEEE 13th International Conference on Advanced Security Mechanisms, pp. 574-590, 2011. Jayakumar Srinivasan, Centered Discretization with Application to Graphical Passwords, Symposium on Usable Privacy and Security (SOUPS) 2007.