Sunteți pe pagina 1din 5

Graphical Password Authentication System using

Intuitive Approach

In this modern age of increasing interconnectivity, information security has come


to occupy a pivotal position in recent research works. Traditional methods of
authentication have been text-based password schemes. However, the major
drawback with them, has been the fact that their strength varies inversely with
user convenience. Users generally tend to select passwords that are easier to
recall and shorter in length. This, gives rise to password cracking attempts. A
graphical password is a confirmation framework that works by having the client
selected pictures, in a particular order. Graphical passwords authentication
system has inherent advantages over conventional textual password schemes. In
this system there are 3 authentication levels after registering the basic
information, User login’s and after implementing id password system ask to
authenticate in 3 different levels.
 Modules:

The system comprises of 1 major module with their sub-modules as follows:

1. User

 Registration: User need to fill the basic details. And make the setup of
3 stage of Authentication.
 Login: ID & Password Authentication
 Stage 1 (System Generated 2 Random Parameters)
 Stage 2 (3rd Parameters depending on Stage 1 Parameter)
 Stage 3 (Image Selection not depending on Stage 1
Parameter)
 Profile: User can view profile.
Project Lifecycle:

Description
The waterfall Model is a linear sequential flow. In which progress is seen as
flowing steadily downwards (like a waterfall) through the phases of software
implementation. This means that any phase in the development process begins
only if the previous phase is complete. The waterfall approach does not define the
process to go back to the previous phase to handle changes in requirement. The
waterfall approach is the earliest approach that was used for software
development.
.Net

 Hardware Requirement:

 i3 Processor Based Computer or higher


 Memory: 1 GB
 Hard Drive: 50 GB
 Monitor
 Internet Connection

 Software Requirement:

 Windows 7 or higher
 Visual Studio
 SQL Server
 Google Chrome Browser
 Advantages

 Easy to remember and hard to guess for others.


 Here the security of the system is very high.

 Limitation
 Graphical password can be easily recorded as these schemes take a
long time

 Application
 This system can be used by the multiple peoples to get the
counselling sessions online.

 Reference
 https://shsu-ir.tdl.org/shsu-
ir/bitstream/handle/20.500.11875/1164/0781.pdf?sequence=1
 https://ieeexplore.ieee.org/document/6208293/
 https://ieeexplore.ieee.org/document/4679917/

S-ar putea să vă placă și