Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Major Project Presentation-2

Phase 3
Real-time Eye Tracking For Password Authentication

Group No: F15 Group Members


Group Name:
Real-time Eye Tracking For Password
Vrinda Gopakumar (R16CS477)
Authentication
Zaveriya Roshan (R16CS484)
Project Guide:
Tasmiya Mairaj (R16CS529)
Prof. Priyanka Bharti
Assistant Professor
School of C & IT
Contents
• Abstract
• Introduction
• Literature survey
• Objectives
• Architecture diagram
• Methodology/Algorithm
• Result and Discussion
• Conclusion
• References
Abstract
• Personal identification numbers are widely used for user authentication and security. Password
authentication using PINs requires users to physically input the PIN, which could be vulnerable to
password cracking via shoulder surfing or thermal tracking.
• PIN authentication with hands-off eye blinks PIN entry techniques, on the other hand, leaves no
physical footprints behind and therefore offer a more secure password entry option.
• eye blinks based authentication refers to finding the eye blinks across sequential image frames,
and generating the PIN.
• This project presents a real-time application we combine eye blink-based PIN entry, and face
detection and OTP(One Time Password) to avoid shoulder surfing and thermal tracking attacks.
Introduction
• One of the security requirements for general terminal authentication systems is to be easy, fast and
secure as people face authentication mechanisms every day and must authenticate themselves
using conventional knowledge-based approaches like passwords. But these techniques are not safe
because they are viewed by malicious observers who use surveillance techniques such as shoulder-
surfing (observation user while typing the password through the keyboard) to capture user
authentication data.
• There are security problems due to poor interactions between systems and users. As a result, the
researchers proposed a three layered security framework to secure PIN numbers, where users can
enter the password by blinking the eye at the suitable symbols in the appropriate order and thus the
user is invulnerable to shoulder surfing.
• Eye blinking is a natural interaction method and security systems based on eye blink tracking
provide a promising solution to the system security and usability. The aim of this paper is to
review techniques or solutions to dealing with eye blink in security systems.  
Literature Survey

• Many methods had been used till date for password authentication, which has resulted to password
thefts.
• 1.Title: Advanced Secure PIN-Entry avoiding Shoulder-Surfing
• Author: Ms. R Revathy, Mrs.Bama
• Abstract: When users place their passwords in a common area, they might be at risk of attacker stealing
their password. The PIN is recognized by closing by the adversary, more effectually in a busy place. A new
technique has been accepted to cope up with this problem that is cryptography preventing techniques
• 2.Title: Characterization of the Efficiency of Thermal Camera attacks.
• Author: Keatonn Mower, Sarahh Meiklejon, Stifan Savag
• Abstract: during this paper, we inspect the probable of employing a thermal camera to recuperate code
entered on the keyboard during a sort of scenario. This attack has the benefits over employing a standard
camera that the codes don't need to be captured while they're being put and may instead be recovered
for a brief period afterwards. To urge the widely view of how effective such an attack could be, we
consider variety of variables: the fabric of the
• keypad, the user entering the code, the space from the camera to the
keypad.
• 3.Title: Gaze-Based Password Authentication through Automatic
Clustering of Gaze Points Author: Justin Weaver, Kenrick Mock, Bogdan
Hoanca.
• Abstract: Analysts have suggests systems during which user uses a fixed
eye tracker to enter passwords by truly watching the right cipher on the
pc so as. Instead, in Eye cavity details are mechanically gathered to work
out the user’s cipher; this proceeding has the advantage of allowing users
to validate at their likely speed, instead by a hard and fast stay time.
Objectives
• To resist the shoulder surfing attacks in the user authentication system.
• To resist the thermal tracking attacks in keyboards.
• To provide three layered security for user authentication.
• To enter and identify gaze-based PINs using a smart camera through real-time eye detection and
tracking.
• Used for eye tracking and for recording eye center location on board the camera real-time.
• The smart camera allows on-board data processing and collection.
• Non-contact PIN based authentication adds a layer of security to physical PIN entries and are
expected to reduce the vulnerability of the authentication process.
Architecture diagram
Methodology
1.Face Reorganization Using CNN:
• Face perceptions are very complex as the recognition of facial expressions involves extensive and
diverse areas in the brain.
• The main thing that a person pays attention to is the eyes, cheekbones, nose, mouth, and eyebrows,
as well as the texture and color of the skin. At the same time, our brain processes the face as a
whole and is able to identify a person even by half of the face. The brain compares the resulting
picture with the internal averaged pattern and finds characteristic differences.
2.Face Recognition:
It is actually a sequence of several related steps:
• First, you need to look at the image and find all the faces on it.
• Secondly, it is necessary to focus on each face and determine that, despite the unnatural turn of
the face or poor lighting, it is the same person.
• Thirdly, it is necessary to highlight the unique characteristics of the face, which can be used to
distinguish it from other people — for example, the size of the eyes, the elongation of the face, etc.
• In conclusion, it is necessary to compare these unique characteristics of the face with the
characteristics of other people you know to determine the name of the person.
Eye Blink Password Generation:
• This is the second layer authentication in our project we are displaying the digital keyboard on the
screen. One cursor will keep moving in the digital numeric keyboard when user blinks eye system
will generate the PIN number from collect the sequence of numbers which user blinks eye.
• To build our blink detector, we’ll be computing a metric called the eye aspect ratio (EAR). 
• Unlike traditional image processing methods for computing blinks which typically involve some
combination of: Eye localization, Thresholding to find the whites of the eyes,Determining if the
“white” region of the eyes disappears for a period of time (indicating a blink).
OTP Generation and Verification:
This is the third level of security we are using the random numbers to generate the otp and send
to users email/ mobile number using the otp we can secure our accounts.
Results and Discussions
• We have implemented the web based application which it contains
the three layer security to provide the security to avoid the illegal
access of our accounts.
HARDWARE REQUIREMENTS:
• System : Intel I3.
• Hard Disk : 120 GB.
• Monitor : 15’’ LED
• Input Devices : Keyboard, Mouse
• Ram : 4 GB

 SOFTWARE REQUIREMENTS:
• Operating system : Windows 7.
• Coding Language : PYTHON 3.6
• Tools : PythonIDLE
Conclusion
The conclusion of this project is that PIN authentication with hands-off gaze-based PIN entry
techniques, on the other hand, leaves no physical footprints behind and therefore offer a more
secure password entry option. Gazebased authentication refers to finding the eye location across
sequential image frames, and tracking eye center over time. This paper presents a real-time
application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a
smart camera.The stability of the user’s gaze will affect the accuracy of the detected pins, and
must be accounted for. Currently, the PIN identification is accomplished after real-time eye-
tracking and eye center computations and recording are completed.
References
• R. Revathy and R. Bama, “Advanced Safe PIN-Entry Against Human Shoulder-Surfing,” IOSR
Journal of Computer Engineering, vol 17, issue 4, ver. II, pp. 9-15, July-Aug. 2015. (Available:
http://www.iosrjournals.org/iosr-jce/papers/Vol17-issue4/Version2/B017420915.pdf)
• J. Weaver, K. Mock and B. Hoanca, “Gaze-Based Password Authentication through Automatic
Clustering of Gaze Points,” Proc. 2011 IEEE Conf. on Systems, Man and Cybernetics, Oct. 2011.
(DOI: 10.1109/ICSMC.2011.6084072)
• “ATM Fraud , ATM Black Box Attacks Spread Across Europe”, European ATM Security Team
(E.A.S.T.), online, posted 11 April 2017. (Available: https://www.european-atm-
security.eu/tag/atmfraud/)
• K. Mowery, S. Meiklejohn and S. Savage, “Heat of the Moment: Characterizing the Efficacy of
Thermal Camera-Based Attacks,” WOOT ’11, pp. 1-8, August 2011. (Available:
https://cseweb.ucsd.edu/~kmowery/papers/thermal.pdf )
• M. Mehrubeoglu, E. Ortlieb, L. McLauchlan, L. M. Pham, “Capturing reading patterns through a
real-time smart camera iris tracking system,” Proc. SPIE, vol. 8437, id. 843705, 2012. (DOI:
10.1117/12.922875)

You might also like