You are on page 1of 9

SINGLE PIXEL GRAPHICAL AUTHENTICATION WITH SOUND SIGNATURE SYSTEM

BATCH NUMBER : A8 BATCH MEMBERS: JAGAN.M MOHAN.G -42308104033 -42308104049 LINKESH.C -42308104044 INTERNAL GUIDE Mrs. PREETHI WILSON B.E., (M.E).,

DATE

: 18-01-12

REVIEW: FIRST REVIEW

ABSTRACT:
In this project, a single pixel authentication of graphical system with sound signature for ease remembrance of the password is discussed. Authentication to a system uses a click-based graphical password scheme called Cued Click Points (CCP) is presented in the proposed work. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred Cued Click Points rather than pass points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. A more reliable and secured password authentication system is provided using sound signature.

OBJECTIVE:
The main purpose of our single point Authentication System is to simplify and secure the system with high reliability using sound signature concept with password recovery system.

Existing System:
The existing system illustrates well about how a graphical password recognition system typically operates. Here the user clicks on several previously chosen locations in a single image to log in. The user chooses several predefined regions in an image as his or her password. To log in the user has to click on the same regions in effect, cued click points (ccp) is a proposed alternative to passpoints. In Cued Click Points, users click one point on each of 5 images rather than five points on one image. Existing system has some difficulties on hotspot analysis more challenging. Users can choose their images only to the extent that their click-point dictates the clustered system authentication. Number of graphical password systems has been developed; Study shows that textbased passwords suffer with both security and usability problems. Hence a graphical password system is used for more security.

Disadvantage:
o The problem with this scheme is that the number of predefined regions is small in one picture. Since we dont use the tolerance value in the existing system. It need the accurate point to be clicked for authentication. o The password may have to be up to 12 clicks for adequate security, again tedious for the user. o Another problem of this system is the need for more than one predefined region should be remembered. This may have the complexity in the remembrance of the sequence of pass points. o Also that when more than one point in a picture is set as password it may result in a clustered form.

Proposed System:
In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. Study says that sound signature or tone can be used to recall facts like images, text etc. In proposed system we create two vectors for the user usage. Master Vector Detailed Vector To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Master vector is created by giving userid, sound signature frequency and tolerance value. Password recovery system has been included which will contain user login parameters.

Profile Vectors:
The proposed system creates user profile as followsMaster vector - (User ID, Sound Signature frequency, Tolerance) Detailed Vector - (Image, Click Points) As an example of vectors Master vector (Smith, 2689, 50) Detailed Vector Image I1 I2 I3 I4 Click points (123,678) (176,134) (450,297) (761,164)

Literature Review: A Graphical Password Authentication System: Author : Ahmad Almulhem Year : 2008
User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. Graphical passwords provide a promising alternative to traditional alphanumeric passwords. They are attractive since people usually remember pictures better than words. Alphanumerical passwords are required to satisfy two Contradictory requirements. They have to be easily remembered by a user, while they have to be hard to guess by impostor. Users are known to choose easily guessable and/or short text passwords, which are an easy target of dictionary. In the literature, several techniques have been proposed to reduce the limitations of alphanumerical password. One proposed solution is to use an easy to remember long phrases (passphrase) rather than a single word. Another proposed solution is to use graphical passwords, in which graphics (images) are used instead of alphanumerical passwords. This can be achieved by asking the user to select regions from an image rather than typing characters as in alphanumeric password approaches.

Integration of Sound Signature in Graphical Password Authentication System: Author : Saurabh Singh, Gaurav Agarwal Year : 2011
Here a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. A click-based graphical password scheme called Cued Click Points (CCP) is presented. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image.

Hash Visualization in User Authentication: Author : Rachna Dhamija Year : 2000


Rachna dhamija, proposed security systems suffer from the fact that they fail to account for human factors. This paper considers two human limitations: First, people are slow and unreliable when comparing meaningless strings; and second, people have difficulties in remembering secure passwords or PINs. We identify two applications where these human factors negatively affect security: Our approach to improve the security of these systems is to use hash visualization, a technique which replaces meaningless strings with structured images. We examine the requirements of such a system. We also show how to apply hash visualization to improve the real-world security of root key validation and user authentication.

Picture Memory: Recognizing Added and Deleted Details: Author : Kathy pezdek, Ruth maki Year : 1988
Our ability to recognize pictures that we have seen before

When people are presented simple and complex pictures and then tested in a same-changed recognition test with a simple or complex form. The results of three experiments confirm the robustness of this "asymmetric confusability effect" and test a model of the processes underlying this effect. According to the model, pictures are schematically encoded such that the memory representation of both simple and complex pictures is similar to the simple form of each. In Experiment 1, a sentence was presented that described the central schema in the picture prior to subjects' viewing each picture. This manipulation exaggerated the asymmetric confusability effect; schematic processing thus underlies the effect. Results of Experiment 2 refute the hypothesis that the effect results from subjects erroneously anticipating a recall test rather than a recognition test.Furthermore Result of Experiment 3 tells some of the nonschematic elaborative information in complex pictures is stored in memory, it is difficult to retrieve to verify that something is missing when complex presentation pictures are changed to simple test pictures. High levels of accuracy

Authentication Using Graphical Passwords Effects of Tolerance and Image Choice: Author : Susan Wiedenbeck, Jean-Camille Birget, Alex Brodskiy Year : 2007
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called PassPoints, and evaluated it with human users. The results of the evaluation were promising with respect to memorability of the graphical password. In this study we expand our human factors testing by studying two issues: the effect of tolerance, or margin of error, in clicking on the password points and the effect of the image used in the password system. In our tolerance study, results show that accurate memory for the password is strongly reduced when using a small tolerance (10 10 pixels) around the users password points. This may occur because users fail to encode the password points in memory in the precise manner that is necessary to remember the password over a lapse of time.

MODULES:
Master Vector Detailed Vector Image Selection Login Vector Password Recovery

MODULES DESCRIPTION:

Creation of Master Vector:


While registration of user information, the user id, sound frequency or time and tolerance are getting for creating master vector.

Master vector - (User ID, Sound Signature frequency, Tolerance)

Creation of Detailed Vector:


To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created. Detailed Vector - (Image, Click Points)

Image Selection:
In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image.

Creation of Login Vector:


Enters User ID and select one sound frequency or time which he want to be played at login time, a tolerance value is also selected with will decide that the user is legitimate or an imposter. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image and sound signature helps considerably for login.

Password Recovery:
Password recovery system has been included which will contain user login parameters. The user will be asked to answer few predefined questions during registration process. Which will be asked when user forget the password and if the answer matches the user will be intimated about his password to his mailed.

ARCHITECTURE:

System Requirements: Hardware Requirements:


System Hard Disk Monitor Mouse Ram : Pentium IV 2.4 GHz. : 40 GB. : 15 VGA Colour. : Logitech. : 512 Mb.

Floppy Drive : 1.44 Mb.

Software Requirements:
Operating system Coding Language Data Base : Windows XP. : ASP.Net with C#. : SQL Server 2005.

Conclusion:
We have proposed a novel approach which uses sound signature to recall graphical password click points. No previously developed system used this approach. And this system is helpful when user is logging after a long time. Also that a password recovery system has been proposed. Thus the single pixel authentication system ease the working of system with more reliability and security by sound signature.

REFERENCES:
[1] 1. Perrig, A. and Song, D. Hash Visualization: A New Technique to Improve Real-World Security, in Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce. [2] Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, and Nasir Memon. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63:102127, July 2005. [3] Birget, J.C., D. Hong, and N. Memon. Graphical Passwords Based on Robust Discretization. IEEE Trans. Info. Forensics and Security, 1(3), September 2006. [4] E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, Exploring usability effects of increasing security in click-based graphical passwords, in Annual Computer Security Applications Conference (ACSAC), 2010. [5] S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, Multiple password interference in text and click-basedgraphical passwords. in ACM Computer and Communications Security (CCS), November 2009.

You might also like