Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Appendix - 4

CONFIDENTIAL PROGRESS REPORT

Six-Monthly Progress Report of the Research work done for the period from 01-01-2019 to 30-06-2019
of the research scholar.

1. Name of the Research Scholar: Devidas Sonyabapu Thosar

2. Subject: Computer Science & Engineering (Faculty of Engineering & Technology)

3. Topic Registered for Ph.D Degree: PASSIMAGE: A Secured Graphical Authentication


Algorithm Using Image Discrimination and Fusion to
Resist Crowd Surfing Attack

4. Name of the Supervisor: Dr. Nisarg Gandhewar

5. Name of Co-supervisor (if any)................None...............................................

6. Description of the guidance on the topic

Period with dates the Candidates


has been with the guide for
research work (It may also
indicate the date of leave availed
by the candidate during the
above period).

Remarks of the Supervisor on the work done by the Candidate on Topic.

Fees paid vide receipt No ................ :............................Date ................................................................

Date:……………………… ……………………… Place:

…………………….. (Signature of Head of Institution wherethe

Candidate was registered for Ph.D. degree)

Signature oftheSupervisor Address: .........................................................

………………..…………………………….

Place:: …………………. …………….………………………………..


Work Done by the Candidates in this Six Months Period

In this period of six months, the Graphical Authentication System has been understood in terms
of different image operations and techniquespresents a security scheme with the help of
Graphical Password which uses images for authentication purpose. I also Studied& learn
review on Advanced Graphical Authentication that adopted inmyresearch topic to resists
shoulder surfing attacks available while using Textual passwords& their related issues. I also
studied about different Textual passwords are widely used in authentication methods and
Textual passwords related shoulder surfing attacks .etcMost of the system user prefer textual
password in the application of security and privacy for their computer system. However there
will always be a risk of human’s selecting a bad or small password or either in putting them in
the insecure manner are said to be “the weakest process” in the authentication chain.In today’s
world of quick growing technologies, Security play’s a prominent role in the protection of
people’s vital information from varied system attacks. So I found that, provide solution to these
problems there should be some form of authentication protection is required.
After recognising the different security issues its found that rather than selecting a powerful
character set, user tend to select the password which is easier, less complicated, short, or a type
of password which is easy for memorization.So, to resist from different shoulder Surfing
attacks I think to providea proposed idea which uses session password technique through
graphical authentication. In session password user will use new image at every login attempt.
The added image is valid for only single login session.to overcome the problem of shoulder
surfing attack resistant technique is proposed. This technique contains pass-matrixand pass-
point clickingin which more than one images are used to set the password.For every image it
defines the click points as a pass-square.
After studying these operations written paper for National Level Conference on
“Advanced Computing & Data Processing (ACDP-2k19)”
Title of Paper: Review on Decentralized Access Control with Anonymous Authentication
Abstract :Images that can operate on digital cameras or smartphones. Proposes a method for
fusing multiexposedThe proposed method consists of an automatic exposure bracketing
algorithm that determines which exposures to capture and a newly proposed multi-exposure
image fusion algorithm. This fusion algorithm attempts to improve the fusion performance on
the basis of the recently proposed no-reference image quality metrics,and also change the
affects the change noting that the exposure change affects the change in the local luminance
details, contrast, and colourfulness of a pixel. The poor lighting condition and limited dynamic
range of digital imaging device in smartphones and cameras, the recorded images are often
under-/overexposed and with low contrast. we build a largescale multi-exposure image data set,
which contains 589 elaborately selected high-resolution multiexposure sequences with 4,413
images. subjective experiments are conducted to screen the best quality one as the reference
image of each scene. Thirteen representative multi-exposure image fusion in smartphone and
stack-based high dynamic range imaging algorithms are employed to generate the contrast
enhanced images for each sequence for multiexposure images, and. Most of previous single
image contrast enhancement (SICE) methods in smartphones to adjust the tone curve to correct
the contrast of an input image to capture the snap. Those methods, however, often fail in
revealing image details because of the limited information in a single image

Signature of the Candidate

Remark of the supervisor on the work done by the candidate on topic:

Signature of the Supervisor

You might also like