Documentos de Académico
Documentos de Profesional
Documentos de Cultura
After uploading ,he has to select the five locations in that image as the
password.
In this module user has to upload image at the time of registration and
same image at the time of authentication, image will be split in to the
number of coordinate blocks and store in the application ,if the user selects
the location, that location specific block hash code will be stored in the
database.
After successful selection of locations of the image ,those details will be
stored in the database, concatenating all the images locations ,generate
hash code for that and store in the database with respect to the user.
Registered user will be login to the application by using his userid and
password. After successful login , user has to upload the image which he
has uploaded at the time of password setting , the uploaded image he has to
select the locations , concatenating all the images locations ,generate hash
code for that .
If the hash code is matched with the existing hash code user can successful
enter in to the home page , else, process ends and login page will display.
Admin has to login to his account by the authenticated user name and password.
Admin can able to view all the users details, who are successfully registered.
Login
Image
Database
Authentication
System
PassBYOP
User
Registration
Upload Image
Valid
Image
Upload
User
DB Matching
Hash
Code
Wrong
Login
failed
MD5 (Message Digest 5)
Image Segmentation
Texture Feature Extraction
Feature Comparison and Decision Making.
Processor : Pentium IV 2.4 GHz.
RAM : 1 GB
Operating system : Windows XP Professional / Windows7
Coding Language : Java (Jdk 1.7),
Database : My-SQL 5.0
Database GUI : SQLYog
Elipse tool : Eclipse Indigo
It improving the security of graphical password systems by integrating live
video of a physical token that a user carries with them.
It first demonstrates the feasibility of the concept by building and testing a
fully functional prototype.
While this approach was simple and effective, greater speed and efficiency
would be attained with an active application.
F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile
phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644.
R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learn-
ing from the first twelve years,” ACM Comput. Surveys vol. 44, no. 4, p. 19,
2012.