0% found this document useful (0 votes)
655 views

Graphical Password Authentication System Using Intuitive Approach

This document describes a graphical password authentication system that uses an intuitive approach. The system has 3 levels of authentication after a user registers basic information. It comprises one main module with sub-modules for user registration, login, and profile viewing. The login module has 3 stages of authentication, with the first two stages using system-generated random parameters and the third involving image selection. The system was developed using the waterfall model and the .NET framework. It has advantages like being easy to remember but hard to guess, and providing high security. Its main limitation is that graphical passwords can be easily recorded as they take long to complete. The system could be used for online counseling sessions.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
655 views

Graphical Password Authentication System Using Intuitive Approach

This document describes a graphical password authentication system that uses an intuitive approach. The system has 3 levels of authentication after a user registers basic information. It comprises one main module with sub-modules for user registration, login, and profile viewing. The login module has 3 stages of authentication, with the first two stages using system-generated random parameters and the third involving image selection. The system was developed using the waterfall model and the .NET framework. It has advantages like being easy to remember but hard to guess, and providing high security. Its main limitation is that graphical passwords can be easily recorded as they take long to complete. The system could be used for online counseling sessions.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Graphical Password Authentication System using

Intuitive Approach

In this modern age of increasing interconnectivity, information security has come


to occupy a pivotal position in recent research works. Traditional methods of
authentication have been text-based password schemes. However, the major
drawback with them, has been the fact that their strength varies inversely with
user convenience. Users generally tend to select passwords that are easier to
recall and shorter in length. This, gives rise to password cracking attempts. A
graphical password is a confirmation framework that works by having the client
selected pictures, in a particular order. Graphical passwords authentication
system has inherent advantages over conventional textual password schemes. In
this system there are 3 authentication levels after registering the basic
information, User login’s and after implementing id password system ask to
authenticate in 3 different levels.
 Modules:

The system comprises of 1 major module with their sub-modules as follows:

1. User

 Registration: User need to fill the basic details. And make the setup of
3 stage of Authentication.
 Login: ID & Password Authentication
 Stage 1 (System Generated 2 Random Parameters)
 Stage 2 (3rd Parameters depending on Stage 1 Parameter)
 Stage 3 (Image Selection not depending on Stage 1
Parameter)
 Profile: User can view profile.
Project Lifecycle:

Description
The waterfall Model is a linear sequential flow. In which progress is seen as
flowing steadily downwards (like a waterfall) through the phases of software
implementation. This means that any phase in the development process begins
only if the previous phase is complete. The waterfall approach does not define the
process to go back to the previous phase to handle changes in requirement. The
waterfall approach is the earliest approach that was used for software
development.
.Net

 Hardware Requirement:

 i3 Processor Based Computer or higher


 Memory: 1 GB
 Hard Drive: 50 GB
 Monitor
 Internet Connection

 Software Requirement:

 Windows 7 or higher
 Visual Studio
 SQL Server
 Google Chrome Browser
 Advantages

 Easy to remember and hard to guess for others.


 Here the security of the system is very high.

 Limitation
 Graphical password can be easily recorded as these schemes take a
long time

 Application
 This system can be used by the multiple peoples to get the
counselling sessions online.

 Reference
 https://shsu-ir.tdl.org/shsu-
ir/bitstream/handle/20.500.11875/1164/0781.pdf?sequence=1
 https://ieeexplore.ieee.org/document/6208293/
 https://ieeexplore.ieee.org/document/4679917/

You might also like