0% found this document useful (0 votes)
54 views

Bharat Ratn Indira Gandhi College of Engineering, Kegaon, Solapur Bharat Ratn Indira Gandhi College of Engineering, Kegaon, Solapur

This document summarizes a seminar presentation on an authentication scheme for session passwords using color and images. The presentation introduces the issues with textual passwords, such as vulnerability to eavesdropping, dictionary attacks, and shoulder surfing. It then outlines the objectives, requirements, architecture, and modules of a new system that uses color ratings and image point selection for authentication. This aims to provide more secure authentication that avoids the weaknesses of textual passwords. The presentation concludes by discussing installation/maintenance and potential future applications of the scheme.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

Bharat Ratn Indira Gandhi College of Engineering, Kegaon, Solapur Bharat Ratn Indira Gandhi College of Engineering, Kegaon, Solapur

This document summarizes a seminar presentation on an authentication scheme for session passwords using color and images. The presentation introduces the issues with textual passwords, such as vulnerability to eavesdropping, dictionary attacks, and shoulder surfing. It then outlines the objectives, requirements, architecture, and modules of a new system that uses color ratings and image point selection for authentication. This aims to provide more secure authentication that avoids the weaknesses of textual passwords. The presentation concludes by discussing installation/maintenance and potential future applications of the scheme.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Kai.

Sushilatai Gaikwad Bahuuddeshiya Sansthas

BHARAT
RATN
INDIRA
GANDHI
COLLEGE
OF
BHARAT RATN INDIRA GANDHI COLLEGE OF
ENGINEERING,KEGAON,SOLAPUR
ENGINEERING,KEGAON,SOLAPUR

SEMINAR
ON

Authentication scheme for session password


using color and images
Presented By
Nitesh Kumar sah
Mayur Bulbule
Vasim Inamdar
Manoj Kamshetti

Under the Guidance Of


Prof. Sneha Tirth

Contents

Introduction

Project Objective

Requirement Analysis

System Architecture

Modules

Installation & Maintenance

Conclusion

Future Scope

Introduction

Textual password, the most common method used

for

authentication.

Textual password are vulnerable to eves dropping,

dictionary attacks, social engineering & shoulder

Graphical password, an alternative technique.

surfing.

Projective Objective

To develop secure system

To avoid eves dropping.

To avoid shoulder surfing.

To avoid dictionary attack.

To avoid brute force attack.

Requirement Analysis
Software Requirement

Operating System: Windows XP, Window 7, Windows Vista

Jdk 1.6

Net bean IDE 7.1

MySqlServer 5.5.28

MySqlGuiTools 5.0

Programming Language : Java

Hardware Requirement

Processor : Pentium 4

Hard Disk : 1 GB

Ram

: 512 MB

System Architecture

User

Color Chart

Table1

Point Selection on
Image

Table2

Registration

Figure :- Registration Diagram

System Architecture

SMS Authentication

User

Color Authentication

Table1

Image Pont Authentication

Table2

Figure :- Authentication Diagram

Modules

Figure :- Registration Page

Modules

Figure :- Image Selection

Modules

Figure :- Selected Image

Modules

Figure :- Rating of colors

Modules

Figure :- Login Page

Modules

Figure :- Login for Color Rating

Figure :- User Data

Installation and Maintenance


Installation to be done

Install the JDK 1.7

Install Net Beans IDE 7.1

MySQL server 5.5.0

MysqlGuiTool 5.0.5

Maintenance

Connectivity

Database

Conclusion
More sites
More passwords
More forgetting
More repeated credentials
Increased exposure to hacking
and cloning

It is more securable as
compared to the
existing system.

It is not vulnerable to
shoulder surfing, eves
dropping, brute force
attack.

Future Scope

It can be used in PDAs.

Folder locker or an external gateway authentication to


connect the application to a database or an external
embedded device.

THANKS

You might also like