Audio To Sign Language Tool
Audio To Sign Language Tool
PASSWORD
AUTHENTICATION
1
A Shashidhar Reddy, 2B Vinuthna, 3A Mounika, 4K Sri Gowtami
Computer Science and Engineering (AI &ML) Department, Malla Reddy Engineering
College, Maisammaguda, Secundrabad, Telangana, India-500100
1
[email protected]
2
[email protected]
3
[email protected]
4
[email protected]
Abstract: Humans tend to recall pictures more graphical password system, which operates through a
effectively than text. This observation suggests that Graphical Password Interface (GUI), allowing users to
graphical authentication passwords could serve as select specific images in a predetermined sequence
viable alternatives to text-based passwords. The instead of relying on alphanumeric characters. This
primary aim of this research is to assess the usability approach aims to mitigate the common weaknesses and
characteristics of recognition-based graphical vulnerabilities inherent in traditional alphanumeric
passwords, taking into account both ISO standards techniques while also enhancing password security and
and general usability attributes. Subsequently, these memorability.
usability attributes and their sub-features were
compared to identify potential enhancements, which The underlying premise behind graphical passwords
were then incorporated into a novel graphical is twofold: firstly, users tend to find it easier to
password scheme. A prototype of the proposed memorize images compared to alphanumeric characters,
scheme was developed, and a usability evaluation and secondly, these images can serve as effective
was conducted to gauge its effectiveness and substitutions for traditional passwords. Despite the
practicality as an alternative user authentication emergence of alternative authentication methods like
method. According to the results of the biometrics and smart cards, passwords remain the
questionnaire survey and user feedback regarding primary mode of authentication. However, traditional
the entire system and the usability attributes of the passwords are not without their flaws, as insecure
proposed scheme, all percentages of findings were password choices can compromise security and provide
reported to be very positive. This suggests that from avenues for attackers.
a usability standpoint, the new graphical password In the realm of graphical password research, usability
scheme is highly acceptable. plays a pivotal role. Usability, as defined by the ISO
9241-11 standard, is essential for ensuring that a product
Index Terms: Graphical authentication passwords, enables users to achieve their objectives efficiently,
ISO standards, General usability attributes effectively, and satisfactorily within a given context.
Usability evaluation, Novel graphical password Despite the emphasis on security enhancements in
scheme graphical user authentication, usability features have
often been overlooked. Many researchers have
I. INTRODUCTION concentrated their efforts on proposing new algorithms
or improving existing ones to enhance security,
Security requirements are increasingly crucial for
neglecting the critical aspect of user satisfaction and
computer systems due to the expanding threat landscape,
usability.
necessitating robust solutions. One such solution is a
Consequently, this study seeks to address this gap by 86.This survey explores the landscape of graphical
developing a novel graphical password scheme that authentication technologies, including graphical
prioritizes usability features. By focusing on aspects such passwords, gesture-based authentication, and other
as password memorization ease, user satisfaction, and visual authentication methods, providing insights into
happiness, this scheme aims to provide a more user- their usability and security aspects.
friendly and secure authentication solution. Through
rigorous evaluation and testing, the proposed scheme III. PROPOSED MODEL
aims to demonstrate its effectiveness in meeting users' The design incorporates various strategies and
needs while enhancing overall security. technologies to improve user engagement and
II. LITERATURE SURVEY functionality.
[1]Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & A. Interface Design:
Rubin, A. D. (1999). The Design and Analysis of The graphical user interface (GUI) plays a crucial
Graphical Passwords. In Proceedings of the 8th role in facilitating user-system interaction. In this model,
USENIX Security Symposium (pp. 1-14). USENIX the GUI is situated on the client-side, directly engaging
Association.This seminal paper introduces the concept users and facilitating communication with the server and
of graphical passwords and presents an analysis of their database management system. HTML/CSS is employed
design and security implications, laying the groundwork for static elements, while JavaScript enables dynamic
for subsequent research in the field. features like drag and drop functionality.
The "Registration" page serves as the entry point for
[2]Wiedenbeck, S., Waters, J., Birget, J. C., Brodskiy, users. Here, users input general information and select a
A., & Memon, N. (2005). PassPoints: Design and username. A 4x8 table displays images of well-known
longitudinal evaluation of a graphical password system. personalities, allowing users to select at least six images
International Journal of Human-Computer Studies, to form their graphical password. The drag and drop
63(1-2), 102-127.This study presents PassPoints, a feature enables users to arrange these images in any
graphical password system, and provides a longitudinal order within a designated string. To enhance usability
evaluation of its usability and security, highlighting the and security, selected images during login sessions are
importance of considering both aspects in password displayed with reduced opacity to mitigate shoulder-
authentication systems. surfing attacks.
[3]Dunphy, P., Yan, J., & Vargas, L. (2010). A
B. Registration and Log-in Interface:
comparative study of usability in graphical and textual
passwords. In Proceedings of the 6th Symposium on
Usable Privacy and Security (SOUPS 2010) (pp. 5:1– The proposed scheme comprises two stages: registration
5:12). ACM.This research compares the usability of and authentication.
graphical and textual passwords, shedding light on user Registration Interface (New User):
preferences and challenges associated with each
authentication method. Users select images to create their graphical password,
which can be a combination of images and spaces without
[4]Biddle, R., Chiasson, S., & van Oorschot, P. C. any specific order. Error messages prompt users to complete
(2012). Graphical passwords: Learning from the first required fields or select a sufficient number of images. Upon
twelve years. ACM Computing Surveys (CSUR), 44(4), successful registration, a confirmation message allows users
19.This survey paper provides an overview of graphical to proceed to the "Signing-In" page.
password research, including usability studies, security Log-In Interface (Existing User):
analyses, and design considerations, offering insights
into the evolution of graphical password systems. The "Signing-In" page enables registered users to log in
using their username and graphical password. Error
[5]Alsulaiman, M., & Saddik, A. E. (2017). A survey of messages are displayed for incorrect credentials. Successful
graphical password schemes. Journal of Network and login redirects users to the main page, while incorrect
Computer Applications, 79, 1-26.This comprehensive credentials prompt an error message.
survey reviews various graphical password schemes
proposed in the literature, discussing their strengths, In summary, the proposed model enhances user
weaknesses, and applicability in different contexts. interaction and usability through intuitive interface design
and streamlined registration and login processes.
[6]Renaud, K., & Thorpe, J. (2017). A Survey of
Graphical Authentication Technology. Information
Security Journal: A Global Perspective, 26(2), 66-
[Figure 2: Registration Error Messages]
(link_to_registration_error_screenshot)
III. IMPLEMENTATION
This project aims to enhance usability and security in
graphical password authentication systems. The
implementation employs the following components and
methodologies:
a) Graphical User Interface (GUI):
The graphical user interface (GUI) is pivotal for user-
system interaction. Implemented on the client-side, it
facilitates communication with users and the server,
particularly the database management system. The GUI
is developed using HTML/CSS for static elements and
JavaScript for dynamic features like drag and drop
functionality.
3. Efficient Registration and Log-in Processes: [4]. Thorpe, J., & van Oorschot, P. C. (2005).
- Successful completion of registration and log-in processes Human-seeded attacks and exploiting hot spots in
by users demonstrates the effectiveness of the implemented graphical passwords. In International Conference
interfaces and functionalities. on Financial Cryptography and Data Security (pp.
- Minimal instances of registration errors and failed log-in 127-141). Springer, Berlin, Heidelberg.
attempts indicate smooth and efficient user interactions with
the system. [5]. Wiedenbeck, S., Waters, J., Birget, J. C.,
Brodskiy, A., & Memon, N. (2005). PassPoints:
Discussion: Design and longitudinal evaluation of a graphical
password system. International Journal of
The results obtained from the implementation highlight the Human-Computer Studies, 63(1-2), 102-127.
effectiveness of the proposed graphical password
authentication system in achieving the project objectives of [6]. Dunphy, P., Yan, J., Zhang, Q., & Weng, S.
enhancing usability and security. By leveraging innovative UI F. (2015). Investigating the memorability of
design and features such as drag and drop functionality, the graphical passwords: A case study with Chinese
system provides users with a straightforward and efficient users. International Journal of Human-Computer
Interaction, 31(12), 899-913.