0% found this document useful (0 votes)
562 views

Shri Ramswaroop Memorial University: Topic - Three Level Image Password Authentication System

This document describes a three-level image password authentication system. The system uses three levels of passwords for authentication - a text password at level one, an image-based password at level two, and a graphical password at level three. This makes the system more secure than single-factor text passwords by requiring users to correctly enter progressively more complex passwords at each level to gain access. The system was developed using PHP, CSS, and JavaScript to enhance security for user and administrator logins and help prevent bot, brute force, and hacker attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
562 views

Shri Ramswaroop Memorial University: Topic - Three Level Image Password Authentication System

This document describes a three-level image password authentication system. The system uses three levels of passwords for authentication - a text password at level one, an image-based password at level two, and a graphical password at level three. This makes the system more secure than single-factor text passwords by requiring users to correctly enter progressively more complex passwords at each level to gain access. The system was developed using PHP, CSS, and JavaScript to enhance security for user and administrator logins and help prevent bot, brute force, and hacker attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Shri Ramswaroop Memorial University

Topic -Three Level Image Password Authentication System


Submitted To- Submitted By-
Mr. Anupam Singh Aditya Mishra-
201810101110046
Shashwat Agnihotri
-201810101110026
Arjita Sharma
-201810101110060
Agam Srivastava-
201810101110051
INDEX-
• INTRODUCTION
1. Background
2. Working of project
3. Advantages
• FLOW CHART
• SOURCE CODE IMAGES
• OUTPUT IMAGES
• CONCLUSION
• FUTURE SCOPE
• INTRODUCTION
• Texts Passwords are the most commonly used technique
for authentication and have several drawbacks.

• Graphical passwords provide a promising


alternative to traditional alphanumeric
passwords due to the fact that humans can
remember pictures better than the text.
1) Background/ Problem Statement

A security breach can be a threat to national confidential data


or the private data of an organization or a person. The most popular
kind of password used for security purposes is text-based. However,
these passwords can be easily breached and one may lose his/her
private data to the wrong hands. With the rise in cyber-crime, security
threats related to logins & accesses have become a major concern.
Also, the use of single security authentication is not sufficient enough
to keep you protected from cyber threats.
Hence to increase the security level we have developed a Three-
Level Password Authentication system that will make sure that only the
authorized person will have access to the system or data. This system
contains three-level logins having three different kinds of password
systems. The project comprises a passphrase, image-based segmentation
password, and graphical password. The password difficulty increases
with each level making the access more secured. In this way, this PHP-
based Three Level Authentication System will help the users to keep
their data safe from any hackers & cyber threats.
2) Working of the Project

In this System, while user registration, user will be asked to setup three level
password for security purpose first level is the conventional password system
i.e. texted password, second level is image-based password and third level is
graphical password method. For Login User need to Login to check the security by
entering three level password-authentication. As user start entering password, the
first level will authenticate the user by matching the data store in the database
while registration & similarly, second & third level will authenticate the entered
password by user.
3-Advantages
• This system uses only security purpose, it uses to all security place.
• Provides strong security against bot attacks or hackers.
• Hackers are not very easily to hack the security, because their levels are more useful this
concept.
• Any hacker if in the extreme case, suppose (although difficult) will cross through the above two
mentioned security levels, will definitely not be able to cross the third security level.
• Users can set or upload their own images.
• The user will be authenticated as an authentic user, and will be awarded access to the stored
information, only after crossing the three security levels.
• Protects systems vulnerable to attacks.
• The system is user-friendly and has simple interface.
4-System Description
This system is having 4 modules
Registration
• User first need to register by filling up all the details to access the system.
2. Password Set-up
• While registration, user will be asked to set-up three level password for security purpose.
• Following are the three levels for password set-up.

- First Level: The first level is a conventional password system i.e. text-based password
- or a passphrase.
- Second Level: The second level is an image-based password.
- Third Level: The third level is a graphical password method.

3. Login
• After registrations, user need to login to check the security of the system by entering three level
password-authentication.
5-Authentication-

• As user start entering the password, the first level will


authenticate the user by matching the data store in the database
while registration.
• Similarly, second & third level will authenticate the entered
password by user.
6-Project Life Cycle

The waterfall model is a classical model used in system development life cycle to create a
system with a linear and sequential approach. It is termed as waterfall because the model
develops systematically from one phase to another in downward fashion. The waterfall
approach does not define the process to go back to the previous phase to handle changes in
requirement. The waterfall approach is the earliest approach that was used for software
development
Flow
Chart-
Source Code-
OUTPUT IMAGES-
• PROGRAMMING LANGUAGES -

• PHP
• CSS
• JAVASCRIPT
• CONCLUSION

This Application is used to enhance security in the login process for the user
as well as for the Administrator. This application prevents any bot attacks,
brute force attacks, and even from unethical hackers. The Level three
registering technique is nearly impossible to hack thus making it a safer
method for login activity.
• FUTURE SCOPE

This enhances the security at a high level by strenthning the


security of a webpage
In the upcoming time it can
be the mandatory login method for instead of the text or password
login system
it can replace the authentication we use as of now.

You might also like