Graphical User Authentication
Graphical User Authentication
Project Report
On
BACHELOR OF TECHNOLOGY
IN
1
CERTIFICATE
Major Project-1.
2
ACKNOWLEDGEMENT
3
CONTENT PAGE
1. ABSTRACT
2. INTRODUCTION
3. PUROPOSE
4. SCOPE
4.1 DESIGN AND IMPLEMENTATION
4.2 USABILITY ACROSS WEB PLATFORMS
4.3 SCALABILITY
4.5 SECURITY ENHANCEMENT
4.5 INTEGRATION WITH EMERGING
TEACHNOLOGIES
5. FEATURES
6. SOFTWARE AND SOFTWARE REQUIREMENT
(Specifications)
7. USER QUESTIONNARIE
8. ADVANTAGES AND DISADVANTAGES
8.1 Advantages
8.2 Disadvantages
8.3 Limitations
9. METHOLOGY
4
10. COMPARISION OF PASSWORD TECHNOLOGIES
11. ANALYSIS AND RESULT
11.1 USER FRIENDLY INTERFACE OF
GRAPHICAL PASSWORD
11.2 APPLICATION
5
Graphical passwords provide a
promising alternative to
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
with some examples, and highlight
important aspects of the
system
Graphical passwords provide a
promising alternative to
6
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
8
with some examples, and highlight
important aspects of the
system
Graphical passwords provide a
promising alternative to
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
with some examples, and highlight
important aspects of the
system
Graphical passwords provide a
promising alternative to
9
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
with some examples, and highlight
important aspects of the
system.
Graphical passwords provide a
promising alternative to
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
10
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
with some examples, and highlight
important aspects of the
system.
Graphical passwords provide a
promising alternative to
traditional alphanumeric passwords.
They are attractive
since people usually remember
pictures better than words.
In this extended abstract, we propose a
simple graphical
password authentication system. We
describe its operation
11
with some examples, and highlight
important aspects of the
system.
1. Abstraction
12
2. Introduction
In the dynamic landscape of the digital age, the security of online platforms and the
protection of user data have become paramount concerns. As the frequency and
sophistication of Cyber threats continue to escalate, traditional methods of user
authentication, such as alphanumeric passwords, are increasingly vulnerable to
breaches. To address this vulnerability, there is a growing demand for innovative and
secure authentication mechanisms. One such avenue of exploration is the integration of
graphical elements into the authentication process, ushering in a new era of security
and user experience for websites.
The primary objective of graphical user authentication is to enhance the security posture
of websites while simultaneously improving the user experience. By tapping into the
human ability to recognize and recall visual patterns, this approach aims to create
authentication mechanisms that are both robust and user-friendly. The incorporation of
13
graphical elements in the authentication process not only adds an extra layer of security
but also addresses the human factor in security – a critical consideration given that user
behavior significantly influences the effectiveness of any security system.
As we delve into the realm of graphical user authentication for websites, it is essential to
consider the diverse range of graphical elements that can be employed. From image-
based authentication to pattern recognition, the possibilities are vast, providing an
opportunity for customization based on the specific requirements of a website and the
preferences of its user base. Moreover, the integration of graphical authentication aligns
with the broader trend of Human-centric design, where technology adapts to human
behavior, making the digital experience more intuitive and secure.
This exploration into graphical user authentication is not merely a theoretical endeavor
but a practical response to the evolving demands of the digital landscape. As we
navigate this landscape, it becomes evident that a multifaceted approach to security,
combining technological innovation with User-centric design, is crucial. The subsequent
sections of this documentation will delve into the intricate details of implementing
graphical user authentication for websites, examining the technological foundations,
design considerations, and the potential impact on user security and experience.
Through this exploration, we aim to contribute to the ongoing dialogue on advancing the
security landscape of the digital realm
14
3. Purpose –
In the realm of Cyber Security, the traditional paradigm of password-based
authentication is facing escalating challenges. The ubiquity of alphanumeric passwords
has led to a proliferation of security breaches, with users grappling with issues like weak
password choices, password reuse across multiple platforms, and vulnerability to
increasingly sophisticated Cyber threats. The purpose of the project titled "Graphical
User Authentication for Websites" is to revolutionize the conventional methods of user
authentication by introducing an innovative, visually-oriented approach that not only
bolsters security but also enhances the user experience.
The primary impetus behind this project is to counteract the limitations and
vulnerabilities inherent in alphanumeric password systems. Graphical User
Authentication (GUA) recognizes that humans possess an innate inclination towards
visual memory and recognition. Leveraging this aspect of human cognition, the project
seeks to replace or augment traditional passwords with graphical elements such as
images, patterns, or symbols. This shift in authentication methodology is underpinned
by the purpose of creating a more intuitive, memorable, and inherently secure user
authentication process.
A pivotal aspect of the project's purpose is to foster a Human-centric approach to
Cybersecurity. By acknowledging the cognitive strengths of users, GUA aims to create
an authentication experience that is not only more secure but also aligns with the
natural inclinations of human memory and perception. The purpose extends beyond
technological innovation to address the psychological and behavioral aspects of user
interaction with authentication systems.
The scope of the project is vast, encompassing the design, implementation, and
evaluation of a Graphical User Authentication system tailored explicitly for websites.
The purpose includes ensuring the adaptability and compatibility of the system with
diverse web-based platforms, ranging from personal blogs to enterprise-level
applications. Moreover, the project's purpose extends to examining the scalability of the
solution, anticipating its efficacy across various scales and types of websites.
As technology evolves, so does the scope of GUA. The purpose embraces the
exploration of potential integration s with emerging technologies such as mobile
applications and the Internet of Things (IOT). This forward-looking approach ensures
that the project remains relevant and adaptive to the future landscape of digital security.
15
In summary, the purpose of the "Graphical User Authentication for Websites" project is
to usher in a new era of cybersecurity by redefining user authentication through
innovative graphical elements. By addressing the shortcomings of traditional password
systems, the project aims to enhance security, usability, and user satisfaction in the
digital realm.
4. Scope -
The scope of the "Graphical User Authentication for Website" project is comprehensive,
encompassing multiple dimensions to ensure its relevance, effectiveness, and
adaptability in the dynamic realm of web security. The project's scope extends across
design, implementation, evaluation, and potential integration into emerging
technologies, with a keen focus on addressing the shortcomings of traditional
authentication methods.
4.1 Design and Implementation: The project's core scope involves the meticulous
design and implementation of a robust Graphical User Authentication (GUA) system
tailored explicitly for websites. This includes the creation of a diverse set of graphical
elements, symbols, or patterns that users can employ to authenticate their identity.
The design will prioritize User-Centric principles to ensure that the authentication
process is not only secure but also user-friendly and memorable.
4.2 Usability across Web Platforms: Recognizing the diversity of web platforms,
from personal blogs to enterprise-level applications, the project's scope extends to
ensuring the compatibility and seamless integration of GUA into various web-based
systems. This adaptability is crucial to accommodate the different scales, purposes,
and technical architectures of websites.
4.3 Scalability: The solution's scalability is a critical aspect of the project's scope,
aiming to provide a flexible authentication method that can be implemented across a
wide range of websites. Whether a small-scale personal blog or a large-scale
enterprise application, the GUA system should scale effectively without
compromising its security or usability.
4.4 Security Enhancement: The primary objective of the project is to enhance the
security landscape of website authentication. The scope includes addressing
vulnerabilities associated with traditional password systems, providing a more
secure alternative that mitigates risks such as password reuse, brute force attacks,
and phishing.
4.5 Integration with Emerging Technologies: To ensure the project's longevity
and relevance, the scope extends to exploring potential integration with emerging
technologies. This includes investigating how GUA can be seamlessly integrated
into mobile applications and Internet of Things (IOT) devices. This forward-looking
approach aligns the project with the ongoing evolution of digital technologies.
16
In conclusion, the scope of the "Graphical User Authentication for Website" project is
multifaceted, covering design, implementation, compatibility, scalability, security
enhancement, integration with emerging technologies, and continuous improvement
through user feedback. This comprehensive scope positions the project as a holistic
solution to the contemporary challenges of website authentication, with a vision for
future adaptability and innovation.
5. Features –
5.2 User-Centric Design: A distinguishing feature of the project lies in its user-centric
design. Recognizing the natural inclination of human cognition towards visual elements,
the graphical user authentication system is crafted to align with users' cognitive
strengths. By incorporating familiar visual cues, the system aims to create an
authentication process that is not only secure but also seamlessly integrates with users'
cognitive processes, promoting a positive and memorable user experience.
5.5 Scalability: The scalability of the solution is a key feature, allowing it to cater to
websites of varying scales and complexities. From small-scale personal websites to
17
large-scale enterprise applications, the graphical user authentication system is
engineered to scale effectively. This adaptability ensures that the benefits of enhanced
security and user-centric design are accessible to websites irrespective of their size or
purpose.
HTML
JAVASCRIPT
CSS
Web Browser
A builtin website
18
7. USER QUESTIONNAIRE
19
or she wants. The user then takes several point-of-interest (POI) areas in the picture.
Each POI is defined by a circle (center and radius). For every POI, the user types a
word or phrase that would be connected with that POI.
8.2 DISADVANTAGES:
8.3 LIMITATION
Graphical password can be easily recorded as these schemes take a long time
20
9. METHODOLOGY-
In this project when any user tries to access the Homepage, they will be provided with
three options register, login and about developer. If you have not registered yet, then
you have to click register option.
9.1 Then register page will appear, you have to provide first text base password and
necessary information like first name, last name, email, password, security question
etc.
9.2 After clicking next Second colour base graphical password security page will
appear, then u have to select password sequentially . And you have to remember
sequentially base on colour.
9.3 After clicking next Image base password page will appear, you have to select
multiple images as a password and save it.
9.4 Then you have to come back to home page, then you have to click on login.
After that you have to provide the username and correct password. If text base
username and password are correct, then you have successfully login in text base
password.
9.5 Then colour base password page will appear, after that you have to give colour
base password. If it is correct, then you have successfully login in colour base
password.
9.6 Then Image base password page will appear, after that you have to select image
base on password. If it is correct, then you have successfully login in image base
password.
9.7 Then main page will come.
21
Comparison Text Based Colour Based Image Based
11.2 Application- We are using digital devices everyday where we have to come cross
an authentication process every time. graphical password is a user-friendly
authentication system. So, we are approaching to use everywhere like on web
development, desktop level and any other application level. Some applications which
are presently using graphical password authentication systems.
• Web application. • Mobile system.
• File locks system. • Desktop security level.
22
For step1: Authentication of text base password.
For step2: Color Base Authentication.
For step3: Image Base Authentication
1. Brute Force Attack: Brute force is a digital attack where the attacker tries to
guess the correct password. So, to defend against brute force attacks they
system should have a large combination of password which is very difficult to
remember for human. Instants of large text password we create a graphical
password interface. It is very difficult to guess the correct password.
2. Spyware: Spyware is another possible attack mechanism for graphical
passwords. There are several types of spyware including keyloggers, hijackers
and spy bots. Spyware collects information entered by the user. With graphical
passwords, it is more difficult to conduct spyware-based attacks because it is
harder to copy mouse motions exactly. Combinations of pass images and
CAPTCHA may be especially resistant to spyware
23
24
Login Failure Notification
25
Password Reset Notification
26
27
13. Working –
Our website is suitable for real-time websites which just runs in a real-time environment
in a real-time operating system. At first when we start the website it will ask for
authentication. If you have your account details saved in your session data then you can
just directly login using your email id and the password. Remember here your password
is the series of photos in a order which you have selected while creating the account.
If you don’t have any account previously signed in then you have to click sign up where
you will be directly creating an account by giving your mail id and selecting the
password by selecting the series of images in an order. Then your data will be stored in
a session data in an encrypted format. But here all the data will be lost once you close
the window. Now, you can go to the sign in and do the same. Enter your mail id and
then select the series of images as selected before while signing up. Select all the
images in an order. Then the series of images consists of a code which will directly
match that password present in the session data. If the password is not matched then it
will show error dialog box and it will show the forget password options where you will
get the option to change the password.
Then after selecting the right password, you will be redirected to the desired website.
28
14. Modules:
Registration: User need to fill the basic details. And make the setup of 3
stage of Authentication.
Login: ID & Password Authentication
Stage 1 (System Generated 2 Random Parameters)
Stage 2 (3rd Parameters depending on Stage 1 Parameter)
Stage 3 (Image Selection not depending on Stage 1 Parameter)
Profile: User can view profile.
29
15. Future Scope
30
16. REFERENCES-
[1] William Stallings and Lawrie Brown. Computer Security: Principle and Practices.
Pearson Education, 2008.
[2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir
Memon. Passpoints: design and longitudinal evaluation of a graphical password system.
International Journal of Human-Computer Studies, 63:102–127, July 2005.
[3] Robert Morris and Ken Thompson. Password security: a case history.
Communications of the ACM, 22:594– 597, November 1979.
[4] Daniel V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password
Security. In Proceedings of the 2nd USENIX UNIX Security Workshop, 1990.
[5] Graphical Password Authentication. ShraddhaM. Gurav Computer Department
Mumbai University RMCET Ratnagiri, India. Leena S. Gawade Computer Department
Mumbai University RMCET Ratnagiri, India, 2014 IEEE.
[6] Enhancement of Password Authentication System Using Graphical Images. Amol
Bhand,Vaibhav desale Savitrybai Phule Pune University, Swati Shirke Dept.of
Computer Engineering NBN Sinhgad School of Engineering, Pune, Dec 16-19, 2015.
[7] The Shoulder Surfing Resistant Graphical Password Authentication Technique.
Mrs.Aakansha S. Gokhalea , Prof. Vijaya S.Waghmareb.
[8] A New Graphical Password Scheme Resistant to Shoulder-Surfing. Uwe Aickelin
School of Computer Science the University of Nottingham Nottingham, NG8 1BB, U.K.
[9] Minimizing Shoulder Surfing Attack using Text and Colour Based Graphical
Password Scheme. Prof. S. K. Sonkar, Prof. R. L. Paikrao , Prof. Awadesh Kumar, Mr.
S. B. Deshmukh, Computer Engineering Dept. Computer Engineering Dept. Amrutvahini
College of engineering, February - 2014.
[10] https://shsu-ir.tdl.org/shsu-ir/bitstream/handle/
20.500.11875/1164/0781.pdf?sequence=1
[11] https://ieeexplore.ieee.org/document/6208293/
[12] https://ieeexplore.ieee.org/document/4679917/
31
17. CONCLUSION:
32