SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Journal for Research | Volume 02 | Issue 02 | April 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 48
Colour Lock System for User Authentication
Junida George Manju Elizabeth Mathew
Amal Jyothi College of Engineering Amal Jyothi College of Engineering
Smila Mathew Sandra Elsa Thomas
Amal Jyothi College of Engineering Amal Jyothi College of Engineering
Abstract
Passwords are the most commonly used form of user authentication. But they are the weakest links of computer security systems.
Passwords are of different types. They can be of textual, graphical and so on. People often create weak passwords which make
them easy to guess and even strong passwords may be stolen, accidentally revealed or forgotten. So it is important to have a
more intelligent authentication process that is neither complicated nor expensive. Shoulder surfing is one of the main problems.
In the proposed system a special color coding is used so that the original pin will not be revealed. This will be easy to use and
less complicated.
Keywords: Color Table, Pin, Shoulder Surfing
_______________________________________________________________________________________________________
I. INTRODUCTION
The use of the Internet and smart devices are constantly increasing and many new ways of using it are constantly appearing. A
lot of personal data are exposed on millions of websites and mobile phones. Because the Internet is so easily accessible to
anyone, it can be a dangerous place. Cyber criminals will try to take advantage of the user by getting their information’s. The
shoulder surfing is a way through which intruder obtain the user’s password by watching over the user’s shoulder as he enters his
password[3].Conventional password schemes are vulnerable to shoulder surfing. The number of security risks to user’s
information is increasing highly.
Authentication is the process where system identifies the genuine user. Password based authentication is one of the widely
accepted methods. Most users are more familiar with textual passwords than graphical passwords. There are different login
methods, basically fully and partial observable.
The proposed scheme is simple and easy to learn for users and can efficiently login to the system. It can reduce the problem of
shoulder surfing up to a limit. In this system user will have four color pins as password. User will get four challenges each time
he tries to login to the system. Then the user has to enter four corresponding responses and this will be verified.
The main aim of this system is to prevent shoulder surfing attack. Since the challenges are generated randomly each time
the pins will be different each time and the intruder or the person looking during password entering will not be able to
identify the actual pin.
II. RELATED WORKS
In 2013 Yi-Lun Chen et.al [3] proposed A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme using
colors and text. During the registration phase user has to set a textual password and one color has its pass color. When the user
requests to login the system, the system displays a circle composed of 8 equally sized sectors. All the displayed characters can be
simultaneously rotated by clicking the “clockwise” button or by clicking the “counterclockwise” button. In 2014 Wei-Chi Ku
et.al [4] proposed An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme, user password include pass
string and pass color shape. When the user request to login it displays an onscreen keyboard. If the background color of the
running passes string is not same as the pass color shape, then user is requested to press any of the responding button that having
the same shape as the pass color shape, it reassign the background color. In 2012 Yu-Chang Yeh, [6] proposed An Enhanced
Simple Secure Remote Password Authentication Scheme without Using Cryptography, user has to set a textual password and
choose one icon among six icons as his start icon. During the login on screen keyboard and 5 color buttons excluding the white
are randomly displayed in an invisible matrix. User has to find out the background color of the running pass character. If the
color is white, then user can click any button; otherwise user has to click the button with the same color as the background color
of the running pass string.
III. THE PROPOSED SCHEME
In this section, we will describe a simple and efficient shoulder surfing resistant password scheme based on pins and colors. The
Color Pass authentication is a partially observable model to reduce shoulder surfing.
The user will be giving responses to challenges generated by the system. Thus the attacker will not be aware of the actual pin,
since the challenges will be different during each login procedure. The challenge mode can selected by the user, it could be
Colour Lock System for User Authentication
(J4R/ Volume 02 / Issue 02 / 008)
All rights reserved by www.journalforresearch.org 49
through SMS or an audio which can only be heard through a headset. In the following section we will discuss about the user
password features, login and about COLOR tables and how authentication is done.
Characteristic of User Password:
The user has to set his password of length four during registration time. These colours are stored in the databsase and will be
used later for validation. User chooses four colors from the given ten colours during registration. Colors can be repeated. Since
we are using colors for password purpose it will be easier to remember and probability for someone to guess them will be more.
Login Phase:
The user requests to login the system, and the system displays ten tables of 10 equally sized cells with numbers from 0 to 9. The
colors of the cells are different, and there will be ten different colors. The tables will be different where the order of the numbers
will vary.
Steps of Login Procedure:
- User enters his username
- System checks that the username exists then it will generate color Tables using Algorithm I.
- User will be asked to select a mode to receive the challenges. (SMS or audio)
- System gives four random challenge values which range from 1 to 10 (color table numbers).
- User will have to give response to those challenge values .
- Response will be evaluated by system using Algorithm II.
- System will check whether the user is genuine or not using Algorithm III.
User interface for login and Algorithms used in the above procedure, have been described in below sections. In order to login
user has to give a unique username , his mobile number and chose four colors as password During login this username will be
checked and the challenge values are send to this corresponding mobile.
Characteristic of Feature Tables:
Login interface consists of 10 different Color Tables which are numbered from 1 to 10. Each cell of a table is represented by a
pair < Ci, Vi >. Here Ci denotes the color of the cell i and Vi indicates the digit corresponding to cell i.
Ci is unique to a Feature Table. Thus no color occupies in more than one cell. So for a particular table there will be ten
different color cells. The positions of color cells is shown in Table III and this is fixed for every table. So if first cell of a table is
filled with C1 then first cell of all other tables are also filled with C1.
Table – 1
Identifying Each Cells In Xth
Table
0
1 2 3
4 5 6
7 8 9
x
All cells in a table also contain a unique cell value from 0,1,...,9. Another important characteristics is that in each cell i, the
pair < Ci, Vi > is unique with respect respect to all the cells in all the ten tables. Thus if first cell of First Feature Table contains <
C1, 0 > then first cell of any other Feature Table will not contain < C1, 0 >. The orientation of these colors and digits in those
cells are also fixed for every session. All the ten Feature Tables are shown below. The numbers written in bold denotes the table
number of each Feature Table. The empty cells in the tables denote nothing.
C0(0) C0(1)
C1(1)C2(2)C3(3) C1(2) C2(3) C3(4)
C4(4)C5(5)C6(6) C4(5) C5(6) C6(7)
C7(7)C8(8)C9(9) C7(8) C8(9) C9(0)
1 2
C0(2) C0(3)
C1(3)C2(4) C3(5) C1(4) C2(5) C3(6)
C4(6)C5(7) C6(8) C4(7) C5(8) C6(9)
C7(9)C8(0) C9(1) C7(0) C8(1) C9(2)
3 4
C0(4) C0(5)
C1(5)C2(6) C3(7) C1(6) C2(7) C3(8)
C4(8)C5(9) C6(0) C4(9) C5(0) C6(1)
C7(1)C8(2) C9(3) C7(2) C8(3) C9(4)
5 6
Colour Lock System for User Authentication
(J4R/ Volume 02 / Issue 02 / 008)
All rights reserved by www.journalforresearch.org 50
C0(6) C0(7)
C1(7)C2(8) C3(9) C1(8) C2(9) C3(0)
C4(0)C5(1) C6(2) C4(1) C5(2) C6(3)
C7(3)C8(4) C9(5) C7(4) C8(5) C9(6)
7 8
C0(8) C0(9)
C1(9)C2(0) C3(1) C1(0) C2(1) C3(2)
C4(2)C5(3) C6(4) C4(3) C5(4) C6(5)
C7(5)C8(6) C9(7) C7(6) C8(7) C9(8)
9 10
Algorithm for Generating Tables:
Input to this algorithm is ten different colors {c0,c1,....c9} which is stored in an array Color[].There are ten COLOR tables and
each one is denoted as CT[m] where m varies from 0 to 9.In each COLOR table there are ten cells and each cell is represented
as Cell[n] where n varies from 0 to 9.For each cell there is a Value and a Color. The Value can range from 0 to 9.To access the
color of the first cell of the first COLOR table we use the representation
CT[0].Cell[0].Color;
To access the value of the first COLOR table of the first cell,we use the reperentation
CT[0].Cell[0].Value;
Algorithm I Generating tables in Color Lock System
Input: This algorithm will take array Color [0,1,...9] as
input.
Output: It will generate COLOR Tables CT(0) ・ ・ ・FT(9)
for m = 0 to 9 do
for n = 0 to 9 do
CT(m).CELL(n).Color ← Color[n];
CT(m).CELL(n).Value ← (m+n) mod 10;
end for
end for
Thus by using this algorithm ten different COLOR table will be generated with unique color and digit combination in each
cell.
PIN Entry Mechanism:
In our proposed model, user has to choose four colors as the pin in the registration phase. And also give username and
mobilenumber during the registration.During the login phase,user has to enter the username. If the username is valid, then the
user can choose two options. That is through headset or through SMS. User get the challenge only through the selected option.
The challenge can be access by the user only because it is send through a secured media.
Challenge value is generated by using the random function and its value ranges from 0 to 9. Based on the challenge value the
user has to select the corresponding COLOR table. For example, if the challenge value is 2 then the user has select the second
COLOR table. For each color of his pin the user will get the challenge.
User has to select the COLOR table correspond to the challenge he get. After that user has to locate the cell that have the color
of his pin. After locating that cell he has to enter the digit correspond to that cell as his response to the challenge. Similarly user
will get three more challenges and give respond to each challenge. Thus the login procedure will complete. User is authenticated
based on the response to each challenge. User authentication is done as below.
Table – 2
Used colors for implementing COLOR tables
Color index Assigned value Assigned colors
C0 0 pink
C1 1 Light gray
C2 2 magenta
C3 3 green
C4 4 orange
C5 5 Cyan
C6 6 Dark gray
C7 7 Red
C8 8 White
C9 9 Blue
Colour Lock System for User Authentication
(J4R/ Volume 02 / Issue 02 / 008)
All rights reserved by www.journalforresearch.org 51
User has to choose four color from nine colors has his pin. Each color has been assigned a number from 0 to 9 as shown in
TABLE. If user chooses four colors (say) C1C7C9C3, the system database stores user PIN as 1793.This PIN is stored in an array
PIN[i] where i varies from 0 to 3.Four challenges are generated and are stored in array CHAL[j],where j varies from 0 to 3.For
each challenge user has to give response which is stored in an array RESP[k] where k varies from 0 to 3.There is an array
RES[m] where m varies from 0 to3. . The array RES is initialized to zero. If the response to the challenge is valid then RES array
is set to one. The algorithm for validating the response is given below.
Algorithm II Evaluating User Response in Color Lock System
Input: This algorithm will take array PIN, array RESP and array CHAL as input.
Output: This algorithm will update value of array RES by 1 for each valid response.
for i = 0 to 3 do
K ← CHAL[i] − 1
Valid ← (PIN[i] + K) mod 10
if RESP[i] := Valid then
RES[i] ← 1
end if
end for
Algorithm III User Authentication
Input: This algorithm will take array RES as input after executing Algorithm 2.
Output: Decides whether user is allowed to Login.
Initialize R := 0
for i = 0 to 3 do
if RES[i] := 1 then
R ← 1
else
R ← 0
break
end if
end for
if R := 1 then
Allow user to Login
else
Disallow the user
end if
For example user pin is C1C7C9C3 and he get the challenge value 5260.The user go to the fifth COLOR table enter the digit
correspond to the color ie 5.For the second challenge he go to the seventh COLOR table and enter the digit correspond the color
ie 8. Valid response to each challenge is shown in the table.
Table – 3
User response table for a given challenge
User chosen color Challenge Response
C1 5 6
C7 2 9
C9 6 5
C3 0 3
IV. USER INTERFACE OF COLOR PASS
In our user interface we have assigned unique colors to each cell Ci where i varies from 0 to 9.. Ten colors are easily
distinguishable from each other. . The actual interface is shown in Fig. We number each COLOR table by using the blue font.
Color in each COLOR table is fixed only the number in each cell get changed.
As the color in each cell is fixed, user can locate the color easily. There is a keypad to enter the response to each challenge.
The user can choose the mode in which challenge has to generate. Challenge can be obtained through headset or through SMS.
During the registration phase user can choose the application to which this color lock system to be used. There is a setting option
in which user can change color password, MobileNumber and application.The interface is designed in a user friendly manner.
V. SECURITY ANALYSIS
In this paper, challenge is given through headset or through SMS. Based on the challenge user selects the color table. So the
intruder can see only the responses given by the user. The intruder can guess the pin based on the response only.The intruder
cannot find out the original color pin because the response given by the user is present in all the ten color tables. This makes
color lock system robust against shoulder surfing attack.
Colour Lock System for User Authentication
(J4R/ Volume 02 / Issue 02 / 008)
All rights reserved by www.journalforresearch.org 52
In terms of Brute force attack, there are 10 colors totally and a user is making use of 4 colors. For each color there are 10
possibilities. So the probability of guessing the color is 1/10^4. That is for each color there are 2^10 combinations. Thus it is
robust against brute force attack.
VI. Conclusion and future work
In this paper, we have proposed a simple color-based shoulder surfing resistant password, in which the user can easily and
efficiently complete the login process without worrying about shoulder surfing attacks. The operation of the proposed scheme is
simple and easy to learn for users. The user can easily and efficiently to login the system without any complicated pins or long
textual passwords. From security point of view this is strong against some attacks such as shoulder surfing, guessing
password,etc. And from usability point of view this is user friendly and takes very less time for login.
Fig. 1: User Interface of login and response screen
REFERENCES
[1] Nilesh Chakraborty, Samrat Mondal Color Pass: An Intelligent User Interface to Resist Shoulder Surfing Attack,2014.
[2] C. Y. Chen, C. Y. Gun A Fair and Dynamic Password Authentication System, 2011
[3] Yi-Lun Chen, Wei-Chi Ku*, Yu-Chang Yeh, and Dun-Min Liao ,A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme 2013
[4] Wei-Chi Ku, Dum-Min Liao, Chia-Ju Chang, and Pei-Jia Qiu An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme 2014.
[5] S. Pavithra Deepa, S. Kannimuthu, V. Keerthika Security Using Colors and Armstrong Numbers 2011.
[6] Yu-Chang Yeh, Wei-Chi Ku, Wei-Ping Chen, and Yi-Lun Chen An Enhanced Simple Secure Remote Password Authentication Scheme Without Using
Cryptography 2012.

Más contenido relacionado

Destacado

Amores de artigas marcia collazo entrevista
Amores de artigas marcia collazo entrevistaAmores de artigas marcia collazo entrevista
Amores de artigas marcia collazo entrevistabloghistoria5h7
 
ميتاديتا المجموعات المتحفية
ميتاديتا المجموعات المتحفيةميتاديتا المجموعات المتحفية
ميتاديتا المجموعات المتحفيةali mohamed elnagar
 
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESCOMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESJournal For Research
 
Thomas Cook:Marco da historiografia Dominante no Turismo
Thomas Cook:Marco da historiografia Dominante no TurismoThomas Cook:Marco da historiografia Dominante no Turismo
Thomas Cook:Marco da historiografia Dominante no TurismoPilale Isequiel
 
Logistics component Dark Chocolate butter
Logistics component Dark Chocolate butter   Logistics component Dark Chocolate butter
Logistics component Dark Chocolate butter MAX GALARZA HERNANDEZ
 
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...Journal For Research
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
8° festival progamme bd
8° festival progamme bd8° festival progamme bd
8° festival progamme bdBernard Sanjuan
 

Destacado (17)

Amores de artigas marcia collazo entrevista
Amores de artigas marcia collazo entrevistaAmores de artigas marcia collazo entrevista
Amores de artigas marcia collazo entrevista
 
ميتاديتا المجموعات المتحفية
ميتاديتا المجموعات المتحفيةميتاديتا المجموعات المتحفية
ميتاديتا المجموعات المتحفية
 
Is there a God?
Is there a God?Is there a God?
Is there a God?
 
Actividad industrial en españa
Actividad industrial en españaActividad industrial en españa
Actividad industrial en españa
 
Taller
TallerTaller
Taller
 
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUESCOMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
COMPARATIVE STUDY OF IP TRACEBACK TECHNIQUES
 
Thomas Cook:Marco da historiografia Dominante no Turismo
Thomas Cook:Marco da historiografia Dominante no TurismoThomas Cook:Marco da historiografia Dominante no Turismo
Thomas Cook:Marco da historiografia Dominante no Turismo
 
апостол правди і життя
апостол правди і життяапостол правди і життя
апостол правди і життя
 
1996 газета для женщин №16 17 1996
1996 газета для женщин №16 17 19961996 газета для женщин №16 17 1996
1996 газета для женщин №16 17 1996
 
1996 газета для женщин №14 1996
1996 газета для женщин №14 19961996 газета для женщин №14 1996
1996 газета для женщин №14 1996
 
Logistics component Dark Chocolate butter
Logistics component Dark Chocolate butter   Logistics component Dark Chocolate butter
Logistics component Dark Chocolate butter
 
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
VIDEO SUMMARIZATION: CORRELATION FOR SUMMARIZATION AND SUBTRACTION FOR RARE E...
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
8° festival progamme bd
8° festival progamme bd8° festival progamme bd
8° festival progamme bd
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a COLOUR LOCK SYSTEM FOR USER AUTHENTICATION

Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text IOSR Journals
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
ICT - Lecture Notes 4.pdf
ICT - Lecture Notes 4.pdfICT - Lecture Notes 4.pdf
ICT - Lecture Notes 4.pdfHonKencyTress
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A new color oriented cryptographic algorithm based on unicode and rgb color m...
A new color oriented cryptographic algorithm based on unicode and rgb color m...A new color oriented cryptographic algorithm based on unicode and rgb color m...
A new color oriented cryptographic algorithm based on unicode and rgb color m...eSAT Publishing House
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYijiert bestjournal
 
Paper id 25201447
Paper id 25201447Paper id 25201447
Paper id 25201447IJRAT
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationIRJET Journal
 
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022Bilingual Publishing Group
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsIRJET Journal
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET Journal
 

Similar a COLOUR LOCK SYSTEM FOR USER AUTHENTICATION (20)

COLOUR LOCK
COLOUR LOCKCOLOUR LOCK
COLOUR LOCK
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
zzzzzzzz
zzzzzzzzzzzzzzzz
zzzzzzzz
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
ICT - Lecture Notes 4.pdf
ICT - Lecture Notes 4.pdfICT - Lecture Notes 4.pdf
ICT - Lecture Notes 4.pdf
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
Number system
Number system Number system
Number system
 
Chapter 4 number system
Chapter 4 number systemChapter 4 number system
Chapter 4 number system
 
NUMBER SYSTEM.pptx
NUMBER  SYSTEM.pptxNUMBER  SYSTEM.pptx
NUMBER SYSTEM.pptx
 
A new color oriented cryptographic algorithm based on unicode and rgb color m...
A new color oriented cryptographic algorithm based on unicode and rgb color m...A new color oriented cryptographic algorithm based on unicode and rgb color m...
A new color oriented cryptographic algorithm based on unicode and rgb color m...
 
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITYMULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
 
Paper id 25201447
Paper id 25201447Paper id 25201447
Paper id 25201447
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022
Journal of Electronic & Information Systems | Vol.4, Iss.1 April 2022
 
Dld lecture notes
Dld lecture notesDld lecture notes
Dld lecture notes
 
An Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click PointsAn Effective Authentication Method using Improved Persuasive Cued Click Points
An Effective Authentication Method using Improved Persuasive Cued Click Points
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger Print
 

Más de Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

Más de Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Último

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Último (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

COLOUR LOCK SYSTEM FOR USER AUTHENTICATION

  • 1. Journal for Research | Volume 02 | Issue 02 | April 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 48 Colour Lock System for User Authentication Junida George Manju Elizabeth Mathew Amal Jyothi College of Engineering Amal Jyothi College of Engineering Smila Mathew Sandra Elsa Thomas Amal Jyothi College of Engineering Amal Jyothi College of Engineering Abstract Passwords are the most commonly used form of user authentication. But they are the weakest links of computer security systems. Passwords are of different types. They can be of textual, graphical and so on. People often create weak passwords which make them easy to guess and even strong passwords may be stolen, accidentally revealed or forgotten. So it is important to have a more intelligent authentication process that is neither complicated nor expensive. Shoulder surfing is one of the main problems. In the proposed system a special color coding is used so that the original pin will not be revealed. This will be easy to use and less complicated. Keywords: Color Table, Pin, Shoulder Surfing _______________________________________________________________________________________________________ I. INTRODUCTION The use of the Internet and smart devices are constantly increasing and many new ways of using it are constantly appearing. A lot of personal data are exposed on millions of websites and mobile phones. Because the Internet is so easily accessible to anyone, it can be a dangerous place. Cyber criminals will try to take advantage of the user by getting their information’s. The shoulder surfing is a way through which intruder obtain the user’s password by watching over the user’s shoulder as he enters his password[3].Conventional password schemes are vulnerable to shoulder surfing. The number of security risks to user’s information is increasing highly. Authentication is the process where system identifies the genuine user. Password based authentication is one of the widely accepted methods. Most users are more familiar with textual passwords than graphical passwords. There are different login methods, basically fully and partial observable. The proposed scheme is simple and easy to learn for users and can efficiently login to the system. It can reduce the problem of shoulder surfing up to a limit. In this system user will have four color pins as password. User will get four challenges each time he tries to login to the system. Then the user has to enter four corresponding responses and this will be verified. The main aim of this system is to prevent shoulder surfing attack. Since the challenges are generated randomly each time the pins will be different each time and the intruder or the person looking during password entering will not be able to identify the actual pin. II. RELATED WORKS In 2013 Yi-Lun Chen et.al [3] proposed A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme using colors and text. During the registration phase user has to set a textual password and one color has its pass color. When the user requests to login the system, the system displays a circle composed of 8 equally sized sectors. All the displayed characters can be simultaneously rotated by clicking the “clockwise” button or by clicking the “counterclockwise” button. In 2014 Wei-Chi Ku et.al [4] proposed An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme, user password include pass string and pass color shape. When the user request to login it displays an onscreen keyboard. If the background color of the running passes string is not same as the pass color shape, then user is requested to press any of the responding button that having the same shape as the pass color shape, it reassign the background color. In 2012 Yu-Chang Yeh, [6] proposed An Enhanced Simple Secure Remote Password Authentication Scheme without Using Cryptography, user has to set a textual password and choose one icon among six icons as his start icon. During the login on screen keyboard and 5 color buttons excluding the white are randomly displayed in an invisible matrix. User has to find out the background color of the running pass character. If the color is white, then user can click any button; otherwise user has to click the button with the same color as the background color of the running pass string. III. THE PROPOSED SCHEME In this section, we will describe a simple and efficient shoulder surfing resistant password scheme based on pins and colors. The Color Pass authentication is a partially observable model to reduce shoulder surfing. The user will be giving responses to challenges generated by the system. Thus the attacker will not be aware of the actual pin, since the challenges will be different during each login procedure. The challenge mode can selected by the user, it could be
  • 2. Colour Lock System for User Authentication (J4R/ Volume 02 / Issue 02 / 008) All rights reserved by www.journalforresearch.org 49 through SMS or an audio which can only be heard through a headset. In the following section we will discuss about the user password features, login and about COLOR tables and how authentication is done. Characteristic of User Password: The user has to set his password of length four during registration time. These colours are stored in the databsase and will be used later for validation. User chooses four colors from the given ten colours during registration. Colors can be repeated. Since we are using colors for password purpose it will be easier to remember and probability for someone to guess them will be more. Login Phase: The user requests to login the system, and the system displays ten tables of 10 equally sized cells with numbers from 0 to 9. The colors of the cells are different, and there will be ten different colors. The tables will be different where the order of the numbers will vary. Steps of Login Procedure: - User enters his username - System checks that the username exists then it will generate color Tables using Algorithm I. - User will be asked to select a mode to receive the challenges. (SMS or audio) - System gives four random challenge values which range from 1 to 10 (color table numbers). - User will have to give response to those challenge values . - Response will be evaluated by system using Algorithm II. - System will check whether the user is genuine or not using Algorithm III. User interface for login and Algorithms used in the above procedure, have been described in below sections. In order to login user has to give a unique username , his mobile number and chose four colors as password During login this username will be checked and the challenge values are send to this corresponding mobile. Characteristic of Feature Tables: Login interface consists of 10 different Color Tables which are numbered from 1 to 10. Each cell of a table is represented by a pair < Ci, Vi >. Here Ci denotes the color of the cell i and Vi indicates the digit corresponding to cell i. Ci is unique to a Feature Table. Thus no color occupies in more than one cell. So for a particular table there will be ten different color cells. The positions of color cells is shown in Table III and this is fixed for every table. So if first cell of a table is filled with C1 then first cell of all other tables are also filled with C1. Table – 1 Identifying Each Cells In Xth Table 0 1 2 3 4 5 6 7 8 9 x All cells in a table also contain a unique cell value from 0,1,...,9. Another important characteristics is that in each cell i, the pair < Ci, Vi > is unique with respect respect to all the cells in all the ten tables. Thus if first cell of First Feature Table contains < C1, 0 > then first cell of any other Feature Table will not contain < C1, 0 >. The orientation of these colors and digits in those cells are also fixed for every session. All the ten Feature Tables are shown below. The numbers written in bold denotes the table number of each Feature Table. The empty cells in the tables denote nothing. C0(0) C0(1) C1(1)C2(2)C3(3) C1(2) C2(3) C3(4) C4(4)C5(5)C6(6) C4(5) C5(6) C6(7) C7(7)C8(8)C9(9) C7(8) C8(9) C9(0) 1 2 C0(2) C0(3) C1(3)C2(4) C3(5) C1(4) C2(5) C3(6) C4(6)C5(7) C6(8) C4(7) C5(8) C6(9) C7(9)C8(0) C9(1) C7(0) C8(1) C9(2) 3 4 C0(4) C0(5) C1(5)C2(6) C3(7) C1(6) C2(7) C3(8) C4(8)C5(9) C6(0) C4(9) C5(0) C6(1) C7(1)C8(2) C9(3) C7(2) C8(3) C9(4) 5 6
  • 3. Colour Lock System for User Authentication (J4R/ Volume 02 / Issue 02 / 008) All rights reserved by www.journalforresearch.org 50 C0(6) C0(7) C1(7)C2(8) C3(9) C1(8) C2(9) C3(0) C4(0)C5(1) C6(2) C4(1) C5(2) C6(3) C7(3)C8(4) C9(5) C7(4) C8(5) C9(6) 7 8 C0(8) C0(9) C1(9)C2(0) C3(1) C1(0) C2(1) C3(2) C4(2)C5(3) C6(4) C4(3) C5(4) C6(5) C7(5)C8(6) C9(7) C7(6) C8(7) C9(8) 9 10 Algorithm for Generating Tables: Input to this algorithm is ten different colors {c0,c1,....c9} which is stored in an array Color[].There are ten COLOR tables and each one is denoted as CT[m] where m varies from 0 to 9.In each COLOR table there are ten cells and each cell is represented as Cell[n] where n varies from 0 to 9.For each cell there is a Value and a Color. The Value can range from 0 to 9.To access the color of the first cell of the first COLOR table we use the representation CT[0].Cell[0].Color; To access the value of the first COLOR table of the first cell,we use the reperentation CT[0].Cell[0].Value; Algorithm I Generating tables in Color Lock System Input: This algorithm will take array Color [0,1,...9] as input. Output: It will generate COLOR Tables CT(0) ・ ・ ・FT(9) for m = 0 to 9 do for n = 0 to 9 do CT(m).CELL(n).Color ← Color[n]; CT(m).CELL(n).Value ← (m+n) mod 10; end for end for Thus by using this algorithm ten different COLOR table will be generated with unique color and digit combination in each cell. PIN Entry Mechanism: In our proposed model, user has to choose four colors as the pin in the registration phase. And also give username and mobilenumber during the registration.During the login phase,user has to enter the username. If the username is valid, then the user can choose two options. That is through headset or through SMS. User get the challenge only through the selected option. The challenge can be access by the user only because it is send through a secured media. Challenge value is generated by using the random function and its value ranges from 0 to 9. Based on the challenge value the user has to select the corresponding COLOR table. For example, if the challenge value is 2 then the user has select the second COLOR table. For each color of his pin the user will get the challenge. User has to select the COLOR table correspond to the challenge he get. After that user has to locate the cell that have the color of his pin. After locating that cell he has to enter the digit correspond to that cell as his response to the challenge. Similarly user will get three more challenges and give respond to each challenge. Thus the login procedure will complete. User is authenticated based on the response to each challenge. User authentication is done as below. Table – 2 Used colors for implementing COLOR tables Color index Assigned value Assigned colors C0 0 pink C1 1 Light gray C2 2 magenta C3 3 green C4 4 orange C5 5 Cyan C6 6 Dark gray C7 7 Red C8 8 White C9 9 Blue
  • 4. Colour Lock System for User Authentication (J4R/ Volume 02 / Issue 02 / 008) All rights reserved by www.journalforresearch.org 51 User has to choose four color from nine colors has his pin. Each color has been assigned a number from 0 to 9 as shown in TABLE. If user chooses four colors (say) C1C7C9C3, the system database stores user PIN as 1793.This PIN is stored in an array PIN[i] where i varies from 0 to 3.Four challenges are generated and are stored in array CHAL[j],where j varies from 0 to 3.For each challenge user has to give response which is stored in an array RESP[k] where k varies from 0 to 3.There is an array RES[m] where m varies from 0 to3. . The array RES is initialized to zero. If the response to the challenge is valid then RES array is set to one. The algorithm for validating the response is given below. Algorithm II Evaluating User Response in Color Lock System Input: This algorithm will take array PIN, array RESP and array CHAL as input. Output: This algorithm will update value of array RES by 1 for each valid response. for i = 0 to 3 do K ← CHAL[i] − 1 Valid ← (PIN[i] + K) mod 10 if RESP[i] := Valid then RES[i] ← 1 end if end for Algorithm III User Authentication Input: This algorithm will take array RES as input after executing Algorithm 2. Output: Decides whether user is allowed to Login. Initialize R := 0 for i = 0 to 3 do if RES[i] := 1 then R ← 1 else R ← 0 break end if end for if R := 1 then Allow user to Login else Disallow the user end if For example user pin is C1C7C9C3 and he get the challenge value 5260.The user go to the fifth COLOR table enter the digit correspond to the color ie 5.For the second challenge he go to the seventh COLOR table and enter the digit correspond the color ie 8. Valid response to each challenge is shown in the table. Table – 3 User response table for a given challenge User chosen color Challenge Response C1 5 6 C7 2 9 C9 6 5 C3 0 3 IV. USER INTERFACE OF COLOR PASS In our user interface we have assigned unique colors to each cell Ci where i varies from 0 to 9.. Ten colors are easily distinguishable from each other. . The actual interface is shown in Fig. We number each COLOR table by using the blue font. Color in each COLOR table is fixed only the number in each cell get changed. As the color in each cell is fixed, user can locate the color easily. There is a keypad to enter the response to each challenge. The user can choose the mode in which challenge has to generate. Challenge can be obtained through headset or through SMS. During the registration phase user can choose the application to which this color lock system to be used. There is a setting option in which user can change color password, MobileNumber and application.The interface is designed in a user friendly manner. V. SECURITY ANALYSIS In this paper, challenge is given through headset or through SMS. Based on the challenge user selects the color table. So the intruder can see only the responses given by the user. The intruder can guess the pin based on the response only.The intruder cannot find out the original color pin because the response given by the user is present in all the ten color tables. This makes color lock system robust against shoulder surfing attack.
  • 5. Colour Lock System for User Authentication (J4R/ Volume 02 / Issue 02 / 008) All rights reserved by www.journalforresearch.org 52 In terms of Brute force attack, there are 10 colors totally and a user is making use of 4 colors. For each color there are 10 possibilities. So the probability of guessing the color is 1/10^4. That is for each color there are 2^10 combinations. Thus it is robust against brute force attack. VI. Conclusion and future work In this paper, we have proposed a simple color-based shoulder surfing resistant password, in which the user can easily and efficiently complete the login process without worrying about shoulder surfing attacks. The operation of the proposed scheme is simple and easy to learn for users. The user can easily and efficiently to login the system without any complicated pins or long textual passwords. From security point of view this is strong against some attacks such as shoulder surfing, guessing password,etc. And from usability point of view this is user friendly and takes very less time for login. Fig. 1: User Interface of login and response screen REFERENCES [1] Nilesh Chakraborty, Samrat Mondal Color Pass: An Intelligent User Interface to Resist Shoulder Surfing Attack,2014. [2] C. Y. Chen, C. Y. Gun A Fair and Dynamic Password Authentication System, 2011 [3] Yi-Lun Chen, Wei-Chi Ku*, Yu-Chang Yeh, and Dun-Min Liao ,A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme 2013 [4] Wei-Chi Ku, Dum-Min Liao, Chia-Ju Chang, and Pei-Jia Qiu An Enhanced Capture Attacks Resistant Text-Based Graphical Password Scheme 2014. [5] S. Pavithra Deepa, S. Kannimuthu, V. Keerthika Security Using Colors and Armstrong Numbers 2011. [6] Yu-Chang Yeh, Wei-Chi Ku, Wei-Ping Chen, and Yi-Lun Chen An Enhanced Simple Secure Remote Password Authentication Scheme Without Using Cryptography 2012.