0% found this document useful (0 votes)
23 views15 pages

Three Level Authentication System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views15 pages

Three Level Authentication System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Department of Computer Science and Engineering

Industry Oriented Mini Project (Review-1) on Three-Level Authentication


System
Under the Presented By:(Batch-11)
Guidance of: A. Akhila 21271A6605
K.Kalyan S. Sindhuja 21271A6643
(Asst.Professer) V. Tarun 21271A6651
Dept of CSE P.Arjun 21271A6611
Title
Three-Level
Authentication
System
ABSTRACT
 The project aims to develop a robust three-level authentication system to enhance security for accessing sensitive
information or systems.

 This multi-factor approach uses a password, facial recognition, and pattern-based verification.

 Users first input a strong alphanumeric password. Upon successful entry, the system activates facial recognition
using machine learning algorithms with liveness detection. Lastly, users draw a pre-defined pattern on a grid for
final verification.

 During registration, users create a password, register facial data, and set a pattern, all stored securely with
encryption.

 The authentication process sequentially prompts users for each step, denying access and triggering security
protocols upon failure.
INTRODUCTION
 In today's digital world, protecting user accounts from unauthorized access is crucial.
Traditional passwords alone are often not enough to stop advanced cyber threats.
 To enhance security, our project introduces a three-level authentication system. This system
uses a combination of text-based passwords, facial recognition, and graphical pattern locks.
 By integrating these three methods, we ensure that even if one layer is compromised, the other
layers provide additional security.
 This makes user accounts much harder to breach and helps build trust in digital platforms. Our
goal is to make digital security stronger and more reliable for everyone
Literature Survey
Securing Smartphones with User- Face Recognition for Authentication
Drawn Patterns Challenges and Trends
Authors: Adam J. Aviv, Katherine Gibson, Evan Authors: Rama Chellappa, Pavan Sinha, Kevin
Mossop, Matt Blaze, Jonathan M. Smith W. Bowyer
Summary: This paper discusses the security Summary: This paper reviews the evolution of
implications of using user-drawn patterns for facial recognition systems and their application
authentication, such as those commonly seen on in authentication systems. The authors discuss
Android devices. The research highlights the challenges of implementing face
potential vulnerabilities like smudge attacks, recognition in the real world, including issues
where attackers use residual oil from finger related to varying lighting conditions, facial
touches to deduce patterns, and brute-force expressions, aging, and spoofing attacks.
pattern guessing. However, the authors suggest Liveness detection is proposed as a solution to
that introducing more complexity in pattern prevent spoofing, ensuring that the system can
selection and combining patterns with other distinguish between a live user and a
authentication factors (like passwords and photograph or mask. This research is essential
biometric verification) can significantly enhance for three-level authentication system, focusing
security. on image recognition (face recognition).
PROBLEM STATEMENT

 Many online accounts only use passwords for security, which can be easily hacked.
 This project wants to make these accounts safer by adding more security measures.
 It plans to combine passwords with things like Facial recognition and graphical password for extra
protection. By doing this, we can better keep user accounts safe and prevent hackers from getting
personal information.
EXISTING SYSTEM

 Some systems use more than just passwords to keep accounts safe.
 They might ask for something you know (like a password), something you have (like a code sent to
your phone), or something you are (like your fingerprint).
 This extra security is called multi-factor authentication (MFA).
 For example, Google's Two-Step Verification asks for both a password and a code sent to your
phone to log in.
 While this makes it harder for hackers to get in, it can still have some problems, like needing your
phone every time you log in.
PROPOSED SYSTEM

 The proposed system is a three-level authentication framework designed to significantly bolster


security measures for online accounts. It integrates three distinct authentication methods:
 Text-based Passwords: Users create traditional text passwords during registration, serving as the
first level of authentication.
 Facial Recognition: Utilizing advanced biometric technology, users associate their facial features
with their accounts. During login, the system captures and analyzes facial features to authenticate
users, providing an additional layer of security.
 Graphical Pattern Locks: Users define unique patterns, such as drawing on a grid, which serve as
the final level of authentication. Successful pattern matching completes the authentication
process.
SYSTEM REQUIREMENTS
Software Requirements: Hardware Requirements
Frontend: •Processor: Intel i5 (or equivalent)
• Framework: React + Vite
•RAM: 8 GB (minimum)
• Styling: Tailwind CSS
•Webcam: HD camera (for facial
• Camera API: Browser-based (for facial recognition)
recognition)
• Pattern Verification: HTML5 Canvas
•Storage : 50GB
Backend:
• FastAPI (Python) for API endpoints
• Node.js for additional services
Database:
• Primary: MongoDB
• Alternative: PostgreSQL
Development Tools:
• Version Control: GitHub
• IDE: Visual Studio Code
SYSTEM ARCHITECTURE

No

Facial Image
Facial Capture

YES
USECASE DIAGRAM
CLASS DIAGRAM
DATA FLOW DIAGRAM
CONCLUSION

 our three-level authentication system combining text-based passwords, facial recognition, and
graphical pattern locks offers a robust and user-friendly solution to enhance online security.
 By integrating these advanced methods, we significantly reduce the risk of unauthorized access
and better protect user data, ensuring a safer digital environment for all users

You might also like