You are on page 1of 18

Abstract

 The problem of shoulder-surfing attacks on authentication schemes by


proposing Random PIN (RPIN) .
 A new security primitive based on AI problems, namely, a novel family of
graphical password systems built on top of Random Pin technology.
 In this method is used to protect the shoulder- surfing attackes application to
avoid misuse of the sensitive information.
 After authenticating the RPIN uses the technique of hybrid images to bring
together to keypads with different digit random ordering.
 In such a way, that the user who is close to the device is seeing one random
keypad to enter her PIN the authorized users will be allowed to access the
transaction.
Review of Literature
Title

Network security-overcome password hacking through graphical password authentication

Author

Arun Prakash

Description

• A graphical password is an authentication system that works by having the user select from
images, in a specific order, presented in a graphical user interface(GUI).

• The most common computer authentication method is to use alphanumerical usernames


and passwords.

Disadvantage

 Sequenced Based Graphical Password


Review of Literature
Title

Usability and Security of the Recall-Based Graphical Password Schemes

Author

Haichang Gao

Description

• Computer security depends on the user authentication method, and alphanumeric password is
the most widely used method to protect users' privacy.

• However, users tend to choose short and simple passwords which will be broken easily, while
secure passwords are difficult to remember.

Disadvantage

 Only alphanumeric password


Review of Literature
Title

Towards a metric for recognition-based graphical password security

Author

Ron Poet

Description

• Recognition-based graphical password (RBGP) schemes are not easily compared in terms
of security.

• In this method uses many different measures which results in confusion as to whether RBGP
schemes are secure against guessing and capture attacks.

Disadvantage

 Lack of Memorable security week on the time of input.


Review of Literature
Title

The Security Analysis of Graphical Passwords

Author

Wei Hu

Description

• Graphical password has not been widely used in practical. Most of the graphical password
authentication schemes are only discussed in laboratory.

• In some typical graphical password authentication schemes are introduced, and the security of
them are analyzed according to its estimate criterions.

Disadvantage

 General image based Graphical password.


Review of Literature
Title

Graphical password: Existing recognition base graphical password usability

Author

Ali Mohamed Eljetlawi

Description

• Graphical passwords are an alternative authentication method to alphanumeric passwords in


which users click on images to authenticate themselves rather than type alphanumeric strings.

• This aims to study the usability features of the recognition base graphical password methods
available and extract the usability features of the existing methods.

Disadvantage

 Alphanumeric based Graphical password.


Review of Literature
Title

A New Password Authentication Mechanism Using 2D Shapes

Author

Bilal Eid Fayyadh

Description

• Security and privacy of both institutions and individuals have always been a major concern.
Authentication systems received significant attention from both researchers and practitioners.

• The most common authentication mechanisms used nowadays are the alphanumeric-based
schemes.

Disadvantage

 Alphanumeric based Graphical password.


Review of Literature
Title

Password Security system with 2-way authentication

Author

Subhradeep Biswas

Description

• This proposes a password security system that allows the host not to store the passwords of its
users at its end.

• Instead it creates and stores a derivative of the password with the help of a bitmap image
uploaded by the user during the user creation process.

• Disadvantage

 Only User Image based password.


Review of Literature
Title

Pass-Matrix authentication

Author

Shums Tabrez

Description

• Security play’s a prominent role in the protection of people’s vital information from varied
system attacks. So as a solution to these problems there should be some form of authentication
protection.

• Most of the system user prefer textual password in the application of security and privacy for
their computer system.

• Disadvantage
 Text based password.
Review of Literature
Title

PassBYOP: Bring Your Own Picture for Securing Graphical Passwords

Author

Andrea Bianchi

Description

• PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical tokens,
herein in the form of digital pictures displayed on a physical user-owned device such as a
mobile phone

Disadvantage

 user-owned device based on own photo complicated password for recognition .


Review of Literature
Title

Graphical Password Scheme using Persuasive Cued Click Points

Author

Sachin Kaja

Description

• a security scheme with the help of Graphical Password which uses images. The main goal of
this project is to support the users in selecting better and safe passwords. The user will click on
a particular part of the image to confirm authentication.

• The persuasive cued clicked points will provide a series of images so that security increases as
it will give a workload for the intruders.

Disadvantage
 persuasive cued clicked points Failed Sometimes .
Existing System

In the existing system, information related to all transactions is stored in

different registers.

Since all the transactions are stored in different registers it takes for transaction

using One time Pin password method and Single Transaction passwords.

The information is stored in the particular Format, it can only be retrieved in

the same format. But if it is to be retrieve in different format, it is not possible.


Proposed System

The security for the user accounts by protecting with the user choice Random Pin
with the Random Dialer keypad based passwords anti shoulder - surfing attack
concept.

Attack is a trick to trap a user to give his/her personal information.

Select individual Rpin in the collection of database and give input as the count by
the customer and using this Rkeypad and password PIN for transaction.

User Rpin is not recognized in the Shoulder surfer attackers customer database
Rdialer keypad based count cannot monitor by the attacker is considered as one of
the best solutions.
:

Architecture
HARDWARE & SPECIFICATION
SOFTWARE SPECIFICATION

Processor : Dual core

RAM : 1 GB

Hard disk : 160 GB

Operating System : Windows XP/2007


Front End : C#.NET
Coding languages : C#.NET
Backend : SQL server 2005
References
 [1] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical
passwords:Learning from the first twelve years,” ACM Comput. Surveys, vol.
44,no. 4, 2012.
 [2] (2012, Feb.). The Science Behind Passfaces [Online].
Available:http://www.realuser.com/published/ScienceBehindPassfaces.pdf
 [3] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The designand
analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999,
pp. 1–15.
 [4] H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability
ofgraphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292,2008.
 [5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N.
Memon,“PassPoints: Design and longitudinal evaluation of a graphical
password system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.

You might also like