Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Kai.

Sushilatai Gaikwad Bahuuddeshiya Sansthas

BHARAT
RATN
INDIRA
GANDHI
COLLEGE
OF
BHARAT RATN INDIRA GANDHI COLLEGE OF
ENGINEERING,KEGAON,SOLAPUR
ENGINEERING,KEGAON,SOLAPUR

SEMINAR
ON

Authentication scheme for session password


using color and images
Presented By
Nitesh Kumar sah
Mayur Bulbule
Vasim Inamdar
Manoj Kamshetti

Under the Guidance Of


Prof. Sneha Tirth

Contents

Introduction

Project Objective

Requirement Analysis

System Architecture

Modules

Installation & Maintenance

Conclusion

Future Scope

Introduction

Textual password, the most common method used

for

authentication.

Textual password are vulnerable to eves dropping,

dictionary attacks, social engineering & shoulder

Graphical password, an alternative technique.

surfing.

Projective Objective

To develop secure system

To avoid eves dropping.

To avoid shoulder surfing.

To avoid dictionary attack.

To avoid brute force attack.

Requirement Analysis
Software Requirement

Operating System: Windows XP, Window 7, Windows Vista

Jdk 1.6

Net bean IDE 7.1

MySqlServer 5.5.28

MySqlGuiTools 5.0

Programming Language : Java

Hardware Requirement

Processor : Pentium 4

Hard Disk : 1 GB

Ram

: 512 MB

System Architecture

User

Color Chart

Table1

Point Selection on
Image

Table2

Registration

Figure :- Registration Diagram

System Architecture

SMS Authentication

User

Color Authentication

Table1

Image Pont Authentication

Table2

Figure :- Authentication Diagram

Modules

Figure :- Registration Page

Modules

Figure :- Image Selection

Modules

Figure :- Selected Image

Modules

Figure :- Rating of colors

Modules

Figure :- Login Page

Modules

Figure :- Login for Color Rating

Figure :- User Data

Installation and Maintenance


Installation to be done

Install the JDK 1.7

Install Net Beans IDE 7.1

MySQL server 5.5.0

MysqlGuiTool 5.0.5

Maintenance

Connectivity

Database

Conclusion
More sites
More passwords
More forgetting
More repeated credentials
Increased exposure to hacking
and cloning

It is more securable as
compared to the
existing system.

It is not vulnerable to
shoulder surfing, eves
dropping, brute force
attack.

Future Scope

It can be used in PDAs.

Folder locker or an external gateway authentication to


connect the application to a database or an external
embedded device.

THANKS

You might also like