shoulder surfing resistant graphical and image based login system
DESCRIPTION
projectTRANSCRIPT
![Page 1: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/1.jpg)
Group Members
Tanavi Dalavi
Vishakha More
Sonali Jadhav
GuideMrs. Vijaya Chavan
![Page 2: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/2.jpg)
Existing System Contains User_Name and Password Based Method.
Threats To The Existing
System are :
Shoulder Keylogger Bots
Surfing
![Page 3: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/3.jpg)
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation.
![Page 4: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/4.jpg)
Key stroke are recorded
Threat to login system as
the username and
password recorded
BotsPerform simple and repetitive tasks
![Page 5: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/5.jpg)
Text Based Password are subject to attacked by following ways
In shoulder surfing attacker can capture a password by direct observation
In key logger attacker record the individual’s authentication session.
In bots attack the automated or semi-automated robots do the same
![Page 6: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/6.jpg)
Sensitive Information requires high security
Authentication processes to keep information secure
Authentication Methods
Graphical Image Based
Password Based Password
![Page 7: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/7.jpg)
If password is “deokar”
![Page 8: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/8.jpg)
![Page 9: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/9.jpg)
A grid of image is displayed, where the user will select a particular images from the grid.
The aim of this authentication is to avoid attack from a script or another machine.
A keylogger or bot attack can be avoided.
![Page 10: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/10.jpg)
![Page 11: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/11.jpg)
![Page 12: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/12.jpg)
HARDWARE:
Processor: Pentium-IV 1.5 GHz and above
Ram: 256 MB minimum
512 MB preferred
Monitor: 15 inch
CD-ROM: 52x speed
SOFTWARE:
Operating System: Microsoft Windows XP and above.
Software: JDK 1.5 and higher.
![Page 13: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/13.jpg)
Websites:
www.ieeexplore.ieee.org
www.wikipedia.com
Book:
“Network Security-Overcome Password Hacking Through Graphical Password Authentication’’
M.ArunPrakash ,T.R.Gokul
Department of Information Technology, Tamil Nadu, India
“DHAMIJA, R. AND PERRIG, A. 2000. Déjà Vu:” A User Study Using Images for Authentication
![Page 14: Shoulder surfing resistant graphical and image based login system](https://reader034.vdocuments.mx/reader034/viewer/2022052413/55984f411a28ab812f8b45f2/html5/thumbnails/14.jpg)