Graphical Password Authentication Using Image Segmentation For Web Based Applications
Graphical Password Authentication Using Image Segmentation For Web Based Applications
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1461
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
servers support server-side scripting using Active Server C. Compute the width and height of segment. Width of
Pages (ASP), PHP or other scripting languages. Web servers segment= width/ Horizontal segment and High of
are not only used for serving the World Wide Web but also segment= height/ Vertical segment.
found embedded in devices such as printers, routers, and
webcam. No additional software has to be installed on the D. Hash Function
client computer because only a web browser is required. The segmented image is encrypted by using Hash function in
the system and it is stored into database. Firstly, the image is
There are three main parts in this technology. They are compared whether it is jpg or png format. If it is compact
hypertext document, web server and web browser. with the image format type, the format type is changed into
the standard type again. The image is resized into (8*8)
The communication between client and server takes place pixels which are converted into gray scale format. The
using the Hypertext Transfer Protocol (HTTP). Pages system computes the mean value of the gray scale image and
delivered are most frequently Hypertext Mark-up Language it also computes the bits which are based on whether the
(HTML) documents, which may include images, style sheets color value is above or below the mean value. The mean
and scripts in addition to text content. Hypertext document value will take out the bit value in 0, 1. If a gray value is
also called web document is a text document including higher than the mean value, it will be 1. Otherwise, it will be
HTML element. 0. In constructing Hash function, it sets the 64bits binary
from left to right, top to bottom using big endian.
Web server is a system collecting the web document by
using computer and can retrieve when it is required. The III. System FLOW
heart of the web is Uniform Resource Locater (URL). The This figure below explains the flow of the system i.e. how
address consisting of domain name and Uniform Resource data is being transferred from one module to another.
Identifier (URI) is called URL. A URL will have the following
format such as protocol name, domain name, path and
parameter.
C. Image Segmentation
The system segments the uploaded image. The initiations Figure 1: Flowchart of Graphical Password
steps are (1) upload a photo, (2) ask user about the segments Authentication Using Image Segmentation for Web
they want and (3) take upload photo width and height. The Based Applications
basis methods for segmenting the image are as follows:
A. Assign the width and height of image. width=width of IV. System Implementation
image and height=height of image. The proposed system is aimed to provide a system which
B. Compute the horizontal and vertical segment of image. gives strong authentication to the user and protects user
Horizontal segment= square root (fragment) and data from unauthorized access. The proposed system
Vertical segment=square root (fragment). consists of four parts:
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1462
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
A. Registration Process: Fig.5 shows how each segment and their position number
Input module: The user will be asked to upload a are saved represented by imghash and position. System is
unique image to the system and enter username implemented by encryption and decryption of data for the
password and email address as shown in fig.2. authentic user’s data. Further the data cannot be retrieved
by any hacker as it will be in encrypted form.
Image divides into segments: Then the system will
divide the uploaded image into 2x2 grid segments as
shown in fig.3. Each segment will be associated with a
unique number.
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1463
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
as a password and the system is designed to provide strong
security to computer systems. Although the images are
easier to remember or to recognize than texts, it is necessary
more storage space to store the image. In the system, MYSQL
database management system is used to store the image data
and also use the data encryption methods that make the user
data more secure and the data cannot be easily attacked by
the hackers. The graphical passwords are used in web log-in
application, ATM machines and also mobile devices and the
proposed system is aimed to the authentication process of
web based application.
ACKNOWLEDGEMENT
The authors would like to thank Dr.Ohnmar Win, Professor,
Department of Electronic and Communication Engineering
for kindly permitting to prepare for this paper, for her
fruitful advice, close supervision, encouragement and
Figure6. Learning Management System User numerous invaluable guidance. The author would also thank
Homepage to all teachers and friends who willingly helped the author
throughout the preparation of the paper.
D. Forget Password
If the uploaded photo is damaged or lost then the user can REFERENCES
click forget password as shown in fig.5. After clicking forget [1] Mayur H Patel, Nimit S Modind “Authentication Using
password user will be redirected to a page wherein the Text and Graphical Password” International Journal of
recovery email and password will be entered. If the recovery Science and Research (IJSR) Volume 4, Issue 5, May
email and password is correct then the uploaded photo will 2015
be given to him.
[2] Wazir Zada Khan, Mohammed Y Aalsalemand Yang
Xiang “A Graphical Password Based System for Small
Mobile Devices ” IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 5, No 2,
September 2011
[3] Patric Elftmann, Diploma Thesis, “Secure Alternatives
to Password- Based Authentication Mechanisms”
Aachen, Germany October 2006
[4] G. E. Blonder. Graphical password, U.S. Patent 5559961,
Lucent Technologies, Inc. (Murray Hill, NJ), August
1995.
[5] Krishan Chand, Ashish Anand “Graphical Password
System Using Image Segmentation” Volume 2, Issue 5,
May 2016
[6] Rohitkumar Kolay, Animesh Vora, Vinaykumar Yadav
Figure 7. Forget password Form “Graphical Password System Using Image
Segmentation” International Research Journal of
V. CONCLUSION Engineering and Technology (IRJET) Volume 04, Issue
The proposed graphical password authentication system is 03, Mar -2017
based on exclusive segmentation methods and Hash [7] Rupali Deshmukh; Smita Rukhande “Authentication by
Visualization technique. The graphical password is the Image Segmentation and Shuffling”IJCAT-
alternative approach of the current text passwords. Text International Journal of Computing and Technology,
passwords are the most common computer authentication Volume 4, Issue 12, December 2017
methods using alphanumerical usernames and passwords
but the methods have some significant drawbacks such as it [8] Rashika Koul, Tanya Kumar, Ashwini Dhongade,
is hard to remember the type passwords for users. The main Radhika Malpani, Rupali Deshmukh “Graphical
advantage of graphical password authenticated systems is Password by Segmentation of Image” International
that users are better at memorizing graphical passwords Journal of Research and Scientific Innovation (IJRSI)/
than text-based passwords and it is more difficult to break Volume III, Issue XI, November 2016
graphical passwords using the traditional attack methods [9] Sana Ansari, Prof. Avinash Shrivas “Implementation of
such as brute force search, dictionary attack, or spyware. The Authentication Mechanism Using Image Segmentation
proposed graphical password authentication use the image for Web Based Applications”
@ IJTSRD | Unique Paper ID – IJTSRD25184 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1464