Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
181 views

Graphical User Authentication Using Steganography and Random Codes

Graphical User Authentication Using Steganography and Random Codes is a proposed system that uses images for password authentication. It aims to provide stronger security than text passwords while maintaining usability. In the system, users select images during registration, and are later shown those images with random codes during login. By entering the codes, users can access associated web accounts. The system uses various techniques like account lockouts after failed attempts and image steganography to make passwords secure against common attacks like brute force, dictionary, and shoulder surfing. It was designed with modules for registration, login, account recovery, and monitoring unauthorized access.

Uploaded by

ruchita chauhan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
181 views

Graphical User Authentication Using Steganography and Random Codes

Graphical User Authentication Using Steganography and Random Codes is a proposed system that uses images for password authentication. It aims to provide stronger security than text passwords while maintaining usability. In the system, users select images during registration, and are later shown those images with random codes during login. By entering the codes, users can access associated web accounts. The system uses various techniques like account lockouts after failed attempts and image steganography to make passwords secure against common attacks like brute force, dictionary, and shoulder surfing. It was designed with modules for registration, login, account recovery, and monitoring unauthorized access.

Uploaded by

ruchita chauhan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Graphical User Authentication Using

Steganography and Random Codes

Introduction

Knowledge-based authentication.
Text-Based Passwords
Graphical Password Authentication

Simple Text-Based Passwords are easy for attackers to guess


or Hack.
Complex & Lengthy Passwords are difficult for users to
remember.
A password authentication system should encourage strong
passwords while maintaining memorability.
Graphical Password authentication schemes allow user choice
while influencing users toward stronger passwords.

Attacks On Passwords

Brute Force Attack

Dictionary Attack

This attack uses words found in the dictionary. Usually we use weak passwords, easier for attackers to
guess the password.

Spyware Attack

Attack uses a small application installed (accidentally or secretly) on a users computer.

Records sensitive data during mouse movement or key press. This form of malware secretly store these
information and then reports back to the attackers system.

Shoulder Surfing Attack

Attack uses an algorithm that produces every possible combination of words to break the password.
Always proven successful against text-based password.

Passwords can be identified by looking over a persons shoulder. This kind of attack is more common in
crowded areas.

Social Engineering Attack (Description Attack)


When a non-authorized personal manages to Manipulate authorized person and access confidential

information (i.e.) passwords and codes.


The attacker interacts with unsuspecting person and gathers as much information they can to gain access

to the protected data.

Proposed System
Picture

Superiority Effect-a solution to conventional


password techniques.

Graphical passwords provide a promising alternative to traditional alphanumeric


passwords.
People usually remember pictures better than words.
Here user will select some images from the given matrix of image.
The Selected Image will be stored as a password and submit to the system.
In the login phase, few random characters for each image in the matrix will be generated.
The user needs to enter the code corresponding to his Images, as a password to get the
Login.
It makes the login process more Secure from shoulder surfing attack while keeping it
simple for users without having to memorise complex passwords.
We applied this approach to create the system for accessing the web account with image
based password authentication system.

Modules

User Registration
Image Selection Procedure.
Account Lock-Out.
Monitoring Unauthorized User.
Account Recovery.
Accessing Web accounts.

Working Methodology

In registration page the user have to fill out the form by selecting the
username and his graphical password images.

The user has the chance to choose different number of images.

On the login section, the user first enters his username and then press tab.

The page will be refreshed and the password images will be displayed
with some random images.

The user should find his password images and then enter the text below of
his password image in the password textbox.

Cont

Working Methodology

If the Code entered belongs to correct password images, User gets login
access.

After the successful user authentication, user will directly get login into
there web accounts without entering authentication Credentials manually.

In case of invalid login attempt for 5 times, the system gets locked-out.

In case of lockout if the computer is enabled with the web cam, it will
capture the snap of the unauthorised user.

If the account is locked out or if the user forgot his password, then he needs
to recover his account.

System Architecture

Advantages

Graphical Password Schemes provide a way of making more


human-friendly passwords.

Here the security of the system is very high.

Every time user need to enter different set of code for


authentication i.e. every time new password gets generated.

Dictionary attacks, Brute Force attack, and other attacks are


infeasible.

System Requirement
SOFTWARE SPECIFICATION
Language
: C#net
Technology
: .NET
Database
: MS SQL Server
Operating System
:
Windows 7/Win 8
HARDWARE SPECIFICATION
Processor
: Intel P-IV Based system
Processor Speed
: 250 MHz to 833MHz
RAM
:
512 MB to 2 GB
Hard Disk
: 10GB to 180GB

Thank You!!!

You might also like