Survey Paper

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

3FA for user validation

Sandhya A Sandhya A
Dept. of Information Science and Engineering Dept. of Information Science and Engineering
Dayananda Sagar College of Engineering Dayananda Sagar College of Engineering
Bengaluru,Karnataka Bengaluru,Karnataka
Sandhyaseshan01@gmail.com Sandhyaseshan01@gmail.com

Tejashree R Tejashree R
Dept. of Information Science and Engineering Dept. of Information Science and Engineering
Dayananda Sagar College of Engineering Dayananda Sagar College of Engineering
Bengaluru,Karnataka Bengaluru,Karnataka
Sandhyaseshan01@gmail.com Sandhyaseshan01@gmail.com

Abstract- In the contemporary digital


landscape, ensuring robust security measures Introduction- In today's digitally
is essential to safeguard sensitive information interconnected world, ensuring robust
and transactions. This project presents an security while maintaining user-friendly
innovative Three-Level Authentication System authentication methods is paramount.
incorporating facial recognition, eye blink Conventional password-based systems are
password, and OTP (One-Time Password) increasingly vulnerable to sophisticated cyber
generation for enhanced security and user threats, demanding innovative solutions. This
experience. project introduces a cutting-edge Multi-Factor
Authentication (MFA) System that combines
The first level of authentication employs Haar Cascade Face Detection and Eye Aspect
advanced facial recognition technology. Ratio (EAR) Password for secure and efficient
Through sophisticated algorithms, unique user verification.
facial features are analyzed and verified, 1)Facial recognition stands out as a pivotal
providing a secure initial layer of user technology, revolutionizing the way we
identification. The second level introduces the confirm identities. Every human face is
novel concept of Eye Blink Password, utilizing unique, featuring distinct patterns and
distinct eye gestures and blinks for features. Unlike other biometric measures,
authentication. This biometric approach not such as fingerprints, faces are easily accessible
only enhances security but also offers a for identification without physical contact,
memorable and user-friendly authentication making facial recognition universally
method. The third level enhances security applicable. One of the fundamental
further by generating dynamic OTPs, adding a techniques in facial recognition is the use of
time-sensitive element that drastically HAAR Cascade classifiers. This method, rooted
reduces the risk of unauthorized access, in computer vision, offers an effective way to
especially during online transactions. Thermal detect faces in images or video frames.
attacks exploit heat signatures to capture Steps in face recognition
sensitive information, while shoulder surfing Face Detection: HAAR Cascade first detects
relies on visual observation. This System is faces within an image or video frame. It
beneficial in protecting against both types of identifies regions of interest (ROI) that are
attacks. likely to contain facial features.
Feature Extraction: Once the face is detected, combining multiple authentication factors,
various facial features, such as eyes, nose, and there are existing projects that rely on single-
mouth, can be extracted using additional Haar factor or dual-factor authentication methods,
Cascade classifiers specifically trained for making them comparatively inferior in terms
these features. of security. Some of existing projects that
Matching and Verification: The extracted utilize less secure authentication methods
features are compared with stored facial data are: [1]Traditional Username and Password
to verify the identity of the individual. Authentication Level:
Matching algorithms assess the similarity Knowledge-Based, Users authenticate by
between the detected features and the entering a username and password.
enrolled facial template, providing a Drawback: Traditional username and
verification result. password systems are vulnerable to brute-
2)Eye Blink Password introduces a novel force attacks, credential stuffing, and phishing
dimension to authentication by analysing schemes. They lack the robustness of multi-
distinctive eye gestures and blinks. factor authentication, making them inferior in
EAR serves as a unique biometric measure terms of security, especially in the face of
calculated from the proportions of an evolving cyber threats.
individual's eye features. The EAR Password [2]Biometric: Users authenticate solely
method analyses these ratios, transforming through biometric methods such as
them into secure and memorable passwords. fingerprint, facial recognition, or iris scan.
Users are authenticated based on their Drawback: While biometric authentication
distinct EAR patterns, ensuring a high level of offers a higher level of security than
security. passwords alone, it lacks the additional layer
3)OTP Generation adds a temporal layer to of security provided by possession-based
authentication. Time-based OTP algorithms, methods like OTPs. Biometric data, if
such as Time-based One-Time Passwords compromised, cannot be easily changed,
(TOTP), generate dynamic, time-sensitive making these systems susceptible to breaches
codes that users receive on their registered in case of a data leak or theft.
devices. These codes, valid for a short [3]Possession-Based: Users receive a one-time
duration, act as a third factor of OTP on their registered mobile devices for
authentication, ensuring that even if static authentication.
credentials are compromised, access remains Drawback: Single-factor OTP authentication,
secure within the defined timeframe. while providing a temporary code for
verification, lacks the added security of
The walk through of paper starts with section biometric or knowledge-based methods. If the
I, describing the Introduction of the system. In OTP is intercepted or the device is
section II, Literature survey is made to identify compromised, unauthorized access becomes
the already existing work with its drawback a significant risk.
and overcoming it. Section III depicts the [4]PIN-Based Systems: Users authenticate by
design part of the paper including flowchart. entering a Personal Identification Number
Section IV presents the implementation using (PIN).
algorithms. Results are displayed in section V. Drawback: PIN-based systems, similar to
Section VI presents performance analysis and traditional passwords, are susceptible to
the conclusion of the system and future work unauthorized access through techniques like
is shown in section VII. shoulder surfing or simple guesswork. They
lack the complexity and security provided by
Related works- Three-level authentication multi-factor authentication methods.
systems provide a high level of security by
These less secure methods are more
susceptible to various forms of attacks and
unauthorized access. As a result, organizations
and users are increasingly adopting multi-
factor authentication solutions, like the three-
level authentication system, to enhance their
digital security and protect sensitive
information from evolving cyber threats.

You might also like