SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 459
A Survey on “Pass sequence acting as OTP using Login
Indicator preventing Shoulder Surfing attacks”
Amit Kalamkar, Sweta Chaugule, Swati Lavate, Dinesh Dalvi
Student Computer Department, SKN SITS Lonavala, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Shoulder-Surfing is a recognized hazard where
an attacker can capture a password by means of direct
observation or by way of recording the authentication. There
were some graphical schemes resistant to SSAs; however they
have got substantial usabilitydrawbacks, generallyinthetime
and effort to log in. In this paper, we suggest and compare a
brand new shoulder-browsing resistant scheme which has a
proper usability for PDAs.The new scheme requires users to
attract throughout their password pix orderly inpreferenceto
click directly on them. Authentication based on passwords is
used in large part of programs for laptop securityandprivacy.
However, human efforts consisting of choosing badpasswords
and inputting passwords in an insecure manner are regarded
as the weakest link in authentication chain. While choosing
alphanumeric strings, customerstendtoselectpasswordsboth
quick and significant for easy memorization. This evolution
brings superb comfort however also increasestheopportunity
of disclosing passwords to SSAs. Attackers can take a look
directly or use outside recording gadgets to acquire users
credentials. To conquer this hassle, we proposed a novel
authentication device Pass Matrix, based totally on graphical
passwords to resist SSAs assaults. With a one-time login
indicator the pass sequence generated each time is different
which offers no trace for attackerstodetermine thepassword.
We additionally applied a Pass Matrix prototype on Android
and carried out actual user experiments. From the
experimental end result, the proposed system achieves higher
resistance to Shoulder browsing attacks even as retaining
usability.
Key Words: Pass images, Pass value, Login Indicator,
Shoulder Surfing Attacks (SSAs) and Authentication
1. INTRODUCTION
Nowadays with the rapid and unstoppable growth in the
development field of technology has created the scope of
becoming the use to of it. Where the authentication plays a
vital role for ensuring the users identity. And for ensuring
the identity username and password must be verified. But
the most importantly the attention is given to the password
which must be hide from the world to protect ones
repository.
Till now we used the textual passwords for the
authentication purpose which may be comprised of lower
case letters, upper case letters or the alphanumeric
combinationsofoneanother.Somehowthetextual password
is considered strong enough for resisting against the brute
force approach.
Sometimes the long and complicated textual passwords
become hard to memorize and collect. However by selecting
the simple textual passwords may increasesitsvulnerability
for attacks or intrusions. One of the most commonly and
easily happened attack is the Shoulder surfing attacks
(SSAs).
SSAs are the attacks which can be happened at any point of
time just by looking over someone’s shoulder while entering
the passwords. It may happen by direct observing or by
using video capturing technique to get passwords, PINs or
other sensitive personal information. In the whole
authentication process the human action such as choosing
the bad and weak password for a new account and putting
the passwords in an insecure way for later logins is
considered as the weakest link in the authentication chain.
To overcome all these drawbacks an alternative is available
for setting the password as Graphical images in a place of
textual passwords. Graphical passwords have the tendency
to bridge the gap of inputting the password and getting
attacked. As memorizing the images, for a long time with
Long Term Memory (LTM) is easier then verbal
representation. They also create a scope of vulnerable to
SSAs but the extent of getting attacked is reduced by various
means.
In this paper we present a novel and secure Graphical
Authentication System which providesanadvancedsecurity
to the passwords with combination of Pass images selected
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 460
from the collection of images or from our local data storage.
Security is provided by on click method on pass images
which generates the pass value for the corresponding click
and results in generation of pass sequence. Every time the
pass sequence is generated by the Login Indicator in the
background for single login session which acts as OTP i.e.
one time password which is sent to the user’s mail id
.Prevention from the SSAs is provided bygeneratingthePass
sequence for every login sessionandwhichgetsuselessafter
termination of that session.
2. Related Work
Both are not immune as expected to SSAs and other brute
force attacks More advancement in the security is provided
with the Graphical images in the way of generating the pass
sequence every time. So various aspects in graphical
passwords are as follows:
2.1: Pass Value System
The images selected from the collection of images are
divided into pass squares having associated pass value for
each pass square. On clicking, the corresponding pass value
or pixel value is traced and recorded. For every image the
pass values are generated on clicking on each image all the
time and the sequence formed by the pass values is only
resides till termination of that session.
2.2: Pass Matrix Algorithm
The algorithm used is Pass Matrix which divides each pass
image into a grid of matrix of 7 X 11 form having the
horizontal and vertical bar values. Those values are
randomly generated by the login indicator in each login
session which corresponds to different different passvalues
for the click.
Fig: (a) The primary page of bypass Matrix, consumer can
check in an account practice or start to login for experiment.
(b) Users can pick from a listing of 24 pictures as their Pass
images. (c) From the 7X11 squares in each photo, the users
pick one as the pass square on clicking
2.3: OTP generation/Pass Sequence
Here the OTP which is nothing but the sequence generated
by the login indicator in bag ground which is sent to the
user’s mail ID.After validating and verificationthatsequence
the user are allowed to authenticate.
3. Proposed System
The system which we are proposing is more prone to SSAs
attacks and increases the level of security.Gaphical images
are provided with advancements on the basis of ON CLICK
method instead of following the patterns on the images
which are used earlier. The whole system works in two
phases
1. Registration phase: creating a username and password
using the images for the very first time
2. Authentication Phase: authorized users then uses the One
time randomly generated sequence to login
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 461
3.1. System Architecture
4. Motivation
In 2006, Wiedenbeck et al. proposed Pass Points in which
the user picks up several points (3 to 5) in an image during
the password creation phase andre-enters eachofthese pre-
selected click-points in a correct order within its tolerant
square during the login phase. Comparingto traditional PIN
and textual passwords, the Pass-Pointsschemesubstantially
increases the password space and enhances password
memorizability.Unfortunately,thisgraphical au-thentication
scheme is vulnerable to shoulder surfing attacks. Hence,
based on the Pass Points, we add the idea of using one-time
session passwords and distracters to develop our Pass
Matrix authentication system that is resistant to shoulder
surfing attacks.
5. Acknowledgement
We would like to express our gratitude towards the guide of
our project Mrs. Bhavna Bahikar and all my group partners
and the anonymous references who contributed to improve
our paper in some way.
6. Conclusion
With the growing fashion of internet offerings and apps,
users are able to get right of entry to thosepackagesanytime
and everywhere with various devices and with a view to
guard customers’ digital property, authentication is needed
on every occasion they are attempting to get rightofentry to
their non-public account and statistics. However,
undertaking the authentication method in public would
possibly bring about potential shoulder browsing attacks.
Even a complicated password can be cracked without
difficulty thru shoulder surfing. using traditional textual
passwords or PIN technique, users need to type their
passwords to authenticate themselves andasa consequence
those passwords may be discovered without difficulty if a
person peeks over shoulder or uses video recording devices
which include cellular telephones. Outgrowing and
overcoming the issues related to security and to have a safe
data storage and transfer we have proposed a system where
the Pass sequence actingasOTPpreventingShoulder Surfing
attacks’ replaces the textual passwords in this manner.
Using this approach of passwords will greatly increases the
level of security and reduces the extent of various brute
force and SSAs attacks.
REFERENCES
[1] Hung-Min Sun,Shiunan-Tung Chen,Jyh-Haw Yeh and
Chia-Yun Cheng, A Shoulder Surfing Resistant Graphical
Authentication System,Citation Information DOI
10.1109/TDSC.2016.2539942,IEEE.
[2] Roshni Rajavat, Bhavna Gala,Asmita Redekar, Textual
and Graphical password Authentication scheme
Resistant to Shoulder Surfing, 2015. International
Journal of Computer Applications(0975-8887).
Proceeding of International Conference on, 19,march
2015.
[3] 1.S. Sood, A. Sarje, and K. Singh, Cryptanalysis of
password authentication schemes: Current status and
key issues, in Methods and Models in Computer Science,
2009. ICM2CS 2009. Proceeding of International
Conference on, Dec 2009, pp. 17.
[4] S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of
password authentication schemes: Current status and
key issues,” in Methods and Models in Computer
Science, 2009.ICM2CS2009. ProceedingofInternational
Conference on, Dec 2009, pp. 1–7.
[5] S. Gurav, L. Gawade, P. Rane, and N. Khochare,
“Graphical password authentication: Cloud securing
scheme,” in Electronic Systems, Signal Processing and
Computing Technologies (ICESC), 2014 International
Conference on, Jan 2014, pp. 479–483.
[6] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N.
Memon, “Passpoints: Design andlongitudinal evaluation
of a graphical password system,” International Journal
of Human-Computer Studies, vol. 63, no. 1-2, pp. 102–
127, 2005.

More Related Content

PDF
Generic Authentication System
PDF
Image authentication for secure login
PDF
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
DOCX
Engineering Project of Venkata Krishna
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PDF
IRJET - Image Authentication System using Passmatrix
PDF
IRJET- Password Management Kit for Secure Authentication
DOCX
Shoulder surfing resistant graphical
Generic Authentication System
Image authentication for secure login
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
Engineering Project of Venkata Krishna
Count based hybrid graphical password to prevent brute force attack and shoul...
IRJET - Image Authentication System using Passmatrix
IRJET- Password Management Kit for Secure Authentication
Shoulder surfing resistant graphical

What's hot (20)

PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
PDF
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
PDF
J0704055058
PDF
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
PDF
IRJET- Three Step Password Verification by using Random Key Order
PDF
Smart-Authentication: A secure web service for providing bus pass renewal system
PDF
An Enhanced Security System for Web Authentication
PDF
Ijsrdv8 i10355
PDF
Design and Implementation of Enhanced Single Sign on System for Education Sys...
PDF
Automated Detection of Session Fixation Vulnerabilities
PDF
Op2423922398
PDF
Continuous User Identity Verification through Secure Login Session
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PPTX
Image-Based Authentication from Confident Technologies
PDF
Android Based Total Security for System Authentication
PDF
Final Year Projects Computer Science (Information security) -2015
PDF
Effectiveness of various user authentication techniques
PPTX
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
J0704055058
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- Three Step Password Verification by using Random Key Order
Smart-Authentication: A secure web service for providing bus pass renewal system
An Enhanced Security System for Web Authentication
Ijsrdv8 i10355
Design and Implementation of Enhanced Single Sign on System for Education Sys...
Automated Detection of Session Fixation Vulnerabilities
Op2423922398
Continuous User Identity Verification through Secure Login Session
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Authentication Scheme for Session Password using matrix Colour and Text
Image-Based Authentication from Confident Technologies
Android Based Total Security for System Authentication
Final Year Projects Computer Science (Information security) -2015
Effectiveness of various user authentication techniques
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Inje...
Ad

Similar to A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks” (20)

PDF
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
PDF
IRJET - Graphical Password Authentication for Banking System
PDF
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
PPTX
Efficient Securing System Using Graphical Captcha
PDF
IRJET - TTL: Tap to Login
PDF
Graphical Password Authentication
PDF
A Review on Two Level Authentication Using Image Selection and Voice Recognition
PDF
Enhanced Security Through Token
PDF
Graphical Password Authentication using Image Segmentation
PDF
otp crid cards
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
PDF
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
PDF
Multilevel Security and Authentication System
PDF
IRJET- Multi sharing Data using OTP
PDF
IRJET- Data Security with Multifactor Authentication
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Persuasive Cued Click Point Password with OTP
PDF
SQl Injection Protector for Authentication in Distributed Applications
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET - Graphical Password Authentication for Banking System
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
Efficient Securing System Using Graphical Captcha
IRJET - TTL: Tap to Login
Graphical Password Authentication
A Review on Two Level Authentication Using Image Selection and Voice Recognition
Enhanced Security Through Token
Graphical Password Authentication using Image Segmentation
otp crid cards
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Multilevel Security and Authentication System
IRJET- Multi sharing Data using OTP
IRJET- Data Security with Multifactor Authentication
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Pass byo bring your own picture for securing graphical passwords
Persuasive Cued Click Point Password with OTP
SQl Injection Protector for Authentication in Distributed Applications
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Well-logging-methods_new................
PPTX
additive manufacturing of ss316l using mig welding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Foundation to blockchain - A guide to Blockchain Tech
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Construction Project Organization Group 2.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT 4 Total Quality Management .pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CH1 Production IntroductoryConcepts.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
R24 SURVEYING LAB MANUAL for civil enggi
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Internet of Things (IOT) - A guide to understanding
Well-logging-methods_new................
additive manufacturing of ss316l using mig welding

A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks”

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 459 A Survey on “Pass sequence acting as OTP using Login Indicator preventing Shoulder Surfing attacks” Amit Kalamkar, Sweta Chaugule, Swati Lavate, Dinesh Dalvi Student Computer Department, SKN SITS Lonavala, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Shoulder-Surfing is a recognized hazard where an attacker can capture a password by means of direct observation or by way of recording the authentication. There were some graphical schemes resistant to SSAs; however they have got substantial usabilitydrawbacks, generallyinthetime and effort to log in. In this paper, we suggest and compare a brand new shoulder-browsing resistant scheme which has a proper usability for PDAs.The new scheme requires users to attract throughout their password pix orderly inpreferenceto click directly on them. Authentication based on passwords is used in large part of programs for laptop securityandprivacy. However, human efforts consisting of choosing badpasswords and inputting passwords in an insecure manner are regarded as the weakest link in authentication chain. While choosing alphanumeric strings, customerstendtoselectpasswordsboth quick and significant for easy memorization. This evolution brings superb comfort however also increasestheopportunity of disclosing passwords to SSAs. Attackers can take a look directly or use outside recording gadgets to acquire users credentials. To conquer this hassle, we proposed a novel authentication device Pass Matrix, based totally on graphical passwords to resist SSAs assaults. With a one-time login indicator the pass sequence generated each time is different which offers no trace for attackerstodetermine thepassword. We additionally applied a Pass Matrix prototype on Android and carried out actual user experiments. From the experimental end result, the proposed system achieves higher resistance to Shoulder browsing attacks even as retaining usability. Key Words: Pass images, Pass value, Login Indicator, Shoulder Surfing Attacks (SSAs) and Authentication 1. INTRODUCTION Nowadays with the rapid and unstoppable growth in the development field of technology has created the scope of becoming the use to of it. Where the authentication plays a vital role for ensuring the users identity. And for ensuring the identity username and password must be verified. But the most importantly the attention is given to the password which must be hide from the world to protect ones repository. Till now we used the textual passwords for the authentication purpose which may be comprised of lower case letters, upper case letters or the alphanumeric combinationsofoneanother.Somehowthetextual password is considered strong enough for resisting against the brute force approach. Sometimes the long and complicated textual passwords become hard to memorize and collect. However by selecting the simple textual passwords may increasesitsvulnerability for attacks or intrusions. One of the most commonly and easily happened attack is the Shoulder surfing attacks (SSAs). SSAs are the attacks which can be happened at any point of time just by looking over someone’s shoulder while entering the passwords. It may happen by direct observing or by using video capturing technique to get passwords, PINs or other sensitive personal information. In the whole authentication process the human action such as choosing the bad and weak password for a new account and putting the passwords in an insecure way for later logins is considered as the weakest link in the authentication chain. To overcome all these drawbacks an alternative is available for setting the password as Graphical images in a place of textual passwords. Graphical passwords have the tendency to bridge the gap of inputting the password and getting attacked. As memorizing the images, for a long time with Long Term Memory (LTM) is easier then verbal representation. They also create a scope of vulnerable to SSAs but the extent of getting attacked is reduced by various means. In this paper we present a novel and secure Graphical Authentication System which providesanadvancedsecurity to the passwords with combination of Pass images selected
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 460 from the collection of images or from our local data storage. Security is provided by on click method on pass images which generates the pass value for the corresponding click and results in generation of pass sequence. Every time the pass sequence is generated by the Login Indicator in the background for single login session which acts as OTP i.e. one time password which is sent to the user’s mail id .Prevention from the SSAs is provided bygeneratingthePass sequence for every login sessionandwhichgetsuselessafter termination of that session. 2. Related Work Both are not immune as expected to SSAs and other brute force attacks More advancement in the security is provided with the Graphical images in the way of generating the pass sequence every time. So various aspects in graphical passwords are as follows: 2.1: Pass Value System The images selected from the collection of images are divided into pass squares having associated pass value for each pass square. On clicking, the corresponding pass value or pixel value is traced and recorded. For every image the pass values are generated on clicking on each image all the time and the sequence formed by the pass values is only resides till termination of that session. 2.2: Pass Matrix Algorithm The algorithm used is Pass Matrix which divides each pass image into a grid of matrix of 7 X 11 form having the horizontal and vertical bar values. Those values are randomly generated by the login indicator in each login session which corresponds to different different passvalues for the click. Fig: (a) The primary page of bypass Matrix, consumer can check in an account practice or start to login for experiment. (b) Users can pick from a listing of 24 pictures as their Pass images. (c) From the 7X11 squares in each photo, the users pick one as the pass square on clicking 2.3: OTP generation/Pass Sequence Here the OTP which is nothing but the sequence generated by the login indicator in bag ground which is sent to the user’s mail ID.After validating and verificationthatsequence the user are allowed to authenticate. 3. Proposed System The system which we are proposing is more prone to SSAs attacks and increases the level of security.Gaphical images are provided with advancements on the basis of ON CLICK method instead of following the patterns on the images which are used earlier. The whole system works in two phases 1. Registration phase: creating a username and password using the images for the very first time 2. Authentication Phase: authorized users then uses the One time randomly generated sequence to login
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 461 3.1. System Architecture 4. Motivation In 2006, Wiedenbeck et al. proposed Pass Points in which the user picks up several points (3 to 5) in an image during the password creation phase andre-enters eachofthese pre- selected click-points in a correct order within its tolerant square during the login phase. Comparingto traditional PIN and textual passwords, the Pass-Pointsschemesubstantially increases the password space and enhances password memorizability.Unfortunately,thisgraphical au-thentication scheme is vulnerable to shoulder surfing attacks. Hence, based on the Pass Points, we add the idea of using one-time session passwords and distracters to develop our Pass Matrix authentication system that is resistant to shoulder surfing attacks. 5. Acknowledgement We would like to express our gratitude towards the guide of our project Mrs. Bhavna Bahikar and all my group partners and the anonymous references who contributed to improve our paper in some way. 6. Conclusion With the growing fashion of internet offerings and apps, users are able to get right of entry to thosepackagesanytime and everywhere with various devices and with a view to guard customers’ digital property, authentication is needed on every occasion they are attempting to get rightofentry to their non-public account and statistics. However, undertaking the authentication method in public would possibly bring about potential shoulder browsing attacks. Even a complicated password can be cracked without difficulty thru shoulder surfing. using traditional textual passwords or PIN technique, users need to type their passwords to authenticate themselves andasa consequence those passwords may be discovered without difficulty if a person peeks over shoulder or uses video recording devices which include cellular telephones. Outgrowing and overcoming the issues related to security and to have a safe data storage and transfer we have proposed a system where the Pass sequence actingasOTPpreventingShoulder Surfing attacks’ replaces the textual passwords in this manner. Using this approach of passwords will greatly increases the level of security and reduces the extent of various brute force and SSAs attacks. REFERENCES [1] Hung-Min Sun,Shiunan-Tung Chen,Jyh-Haw Yeh and Chia-Yun Cheng, A Shoulder Surfing Resistant Graphical Authentication System,Citation Information DOI 10.1109/TDSC.2016.2539942,IEEE. [2] Roshni Rajavat, Bhavna Gala,Asmita Redekar, Textual and Graphical password Authentication scheme Resistant to Shoulder Surfing, 2015. International Journal of Computer Applications(0975-8887). Proceeding of International Conference on, 19,march 2015. [3] 1.S. Sood, A. Sarje, and K. Singh, Cryptanalysis of password authentication schemes: Current status and key issues, in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 17. [4] S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009.ICM2CS2009. ProceedingofInternational Conference on, Dec 2009, pp. 1–7. [5] S. Gurav, L. Gawade, P. Rane, and N. Khochare, “Graphical password authentication: Cloud securing scheme,” in Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on, Jan 2014, pp. 479–483. [6] S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, “Passpoints: Design andlongitudinal evaluation of a graphical password system,” International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 102– 127, 2005.