SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1249
AN EFFECTIVE AUTHENTICATION METHOD USING IMPROVED
PERSUASIVE CUED CLICK POINTS
Dhanashree Kadu1, Shanthi Therese2, Anil Chaturvedi3
1M.E. Computer Department, Shree L.R. Tiwari College of Engineering,
Mumbai University, MS, India
2Associate Professor, Thadomal Shahani College of Engineering,
Mumbai University, MS, India
3Assistant Professor, Shree L.R. Tiwari College of Engineering,
Mumbai University, MS, India
-------------------------------------------------------------------***------------------------------------------------------------------------
ABSTRACT: In today’s digital environment security is very
important. For that password protection is very much
necessary. Various password protection techniques are
available. For authentication text-based passwords are
used commonly which is very much prone to attacks. so to
overcome the disadvantage of text password, graphical
passwords are used. Persuasive Cued Click Point is a click-
based graphical password technique which is consist of
numbers of images where users click on one point per
image & generate one password. Graphical passwords are
easy to memorize but difficult to crack by attackers. In this
paper, we proposed a methodology of graphical password
authentication system using Improved Persuasive Cued
Click Points, including usability and security. Main goal of
this system is to support the users in selecting better
passwords, which will increases the security.
Keywords—Cued Click Point (CCP); Graphical
passwords; authentication; persuasive Cued Click
Point.
1. INTRODUCTION
All our applications needed Strong authentication
method. Text based password is a popular
authentication method and they are very much prone to
attacks. so to overcome the disadvantage of text
password, graphical passwords are used. . Graphical
authentication is best alternative solution to text-based
authentication. Graphical passwords have two main
issues as Shoulder surfing and hotspot, to reduce that we
have proposed a graphical password authentication
system which is best alternative for text password. In
this paper we have proposed a graphical password
authentication system which is best alternative for text
password. The main objective of the project is to provide
a two way authentication to the users by using
Persuasive Cued Clicked point’s technique and OTP.
2. OVERVIEW OF GRAPHICAL PASSWORD
AUTHENTICATION SYSTEMS
Graphical password is an alternative to text based
passwords in which users click on number of images to
authenticate themselves rather than typing text as
password [3]. Graphical passwords are more memorable
compared to alphanumeric passwords, because it is
easier to remember an image of flower than a set of
alphabets and numbers.
Several psychological studies have recognized human
brains have apparently superior memory to recognize,
recall visual information like photos as opposed to
verbal or text based information [4].One of the best
password authentication systems was text based or
alphanumerical based password has several problems.
One of the main problem with text based password is it
was ridicules to remember several text password for
different account. Then introduction of biometric
password [3] and token based password was considered
as alternative of the text based password, but it again has
several drawbacks like cost and unavailability issue. To
overcome the disadvantages of text based password and
token based password the invention of graphical
password is introduced. Initially there were following
graphical password authentication systems:
A. Pass point.
B. Cued Click Point (CCP).
C. Persuasive Cued Click Points (PCCP).
But this system had again disadvantage of hot spot
problem and shoulder surfing attacks. To overcome the
disadvantage of hot spot problem invention of
Persuasive cued click point is made.
A. Pass Point: The pass point system for password
authentication. Pass point was as simple as just clicking
five point on single image and combination of this point
as a password. In this user has to select five points from
single image and at the time of password selecting and
during the time of login user has to repeat the same
sequence of the points from single image. But the main
security problem with this was the HOTSPOT [1], the
area where the user clicks. User choose the easy to
memorable passwords to which can be easily guessed by
hacker. To avoid this problem the next method is
implemented.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1250
B. Cued Click point: To overcome the disadvantage of
the pass point authentication system the cued click point
is invented. Cued click point [1][2] has the same concept
as of the pass point but the main difference between
them is passing five points on five different image one
point per image.
C. Persuasive-cued click point (PCCP) The persuasive
cued click point [1][2] is the addition of the persuasive
feature to cued click point. It allows user to select less
portable password. It has two more function as shuffle
and viewport, when users make a secret word, the
images are a little monochromic except for viewport for
to avoid known hotspots the viewport. The most useful
benefit PCCP is make complex system to hackers. Users
have to choose clickable area within the area and cannot
click outside of the viewport unless they press the
shuffle button to randomly reposition the viewport. At
the time of password creation users may shuffle many
times as he want. Only during the password generation,
the viewport & shuffle buttons are displayed. After
secrete word generation process, graphical images are
presented to users casually without viewport & shuffle
or refresh button. Then user has to select particular
clickable area on particular image.
3. PROPOSED SOLUTION & PROPOSED MODEL
The two way authentication needs to be developed for
the users by using Persuasive Cued Clicked points
technique and OTP, which can be effectively used for any
system for secure login and but difficult to be guessed by
attacker.
A. Registration Process:
B. Login Process:
Proposed model contains following points:
Proposed system provides a high range of security to the
users by using Persuasive Cued Clicked point’s technique
and OTP. The user has to register him by entering his
user name; mobile number and email ID. After successful
registration user will have to select the five images with
which he wants to generate the password by clicking one
point on each image. After the five clicks unique
password is generated and the registration process is
completed. While selecting images user will get two
options for selecting images as from system or user an
select their favorite images to generate the graphical
password. Now every time the user wants to login will
have to enter the username and select the start button.
After user selects login, user will receive the binary OTP
containing 5 bit binary code on his mobile and email ID.
Now user want to select the same points which he had
selected at the time of registration for the images when
the bit in the OTP is 1 and select any other point except
the point select while registration for the image when
the bit in the OTP is 0.After successful completion of this
steps, he will get the access to the system using login.
4. SYSTEM ARCHITECTURE
Fig 1.System architecture of proposed model
Registration module focuses on the registration of a new
user who needs to register before logging on to the
system.
a) User Details:
In this module for registration user needs to like
username, name, address, mobile number and email ID,
which gets stored in the database for authentication.
Figure 2 shows User Registration form where user needs
to fill username, name, address, mobile number and
email ID.
Fig 2.User Registration Form
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1251
b) Click Points:
Once the user fills details there is provision of load image
which presents images to user after they fill user details
.For each image assigned by system there appears a
viewport which can be shuffle as per user requirement. A
single point inside this viewport user need to select as
click point.
Login Module
In this module the user authentication is verified by the
system. User has to follow the same sequence of images
and selects particular click points which is selected at the
time of registration by the user.
User has to verify the username first. After that Image
selection page will appear. User has to select one
particular point inside this viewport. These procedure
should be repeated for the five number of images. If all
the images clicked point matches with the user then user
allowed using the system.
Figure 3 shows Login form where registered user can
login into the system with a valid username.
Fig 3.Login Form
Figure 3 shows Image selection form, After clicking on
Login button Image selection form gets displayed
Fig 4.Image Selection Form
Figure 4 shows images with viewport where user can
select one point inside the viewport and these procedure
will repeat with five images and graphical password will
get saved successfully.
Fig 5.Image with viewport
5. CONCLUSION
Improved Persuasive Cued Click-Points (IPCCP)
authentication system is a secure and more user friendly
system which contains graphical password, which are
easy and flexible for the users to remember as compared
to text based passwords and difficult to attack for the
attackers. Improved Persuasive Cued Click-Points
(IPCCP) approach has tried to reduce the formation of
shoulder surfing attack and hotspot. The Improved
Authentication Scheme Using Improved Persuasive Cued
Click Points system is very efficient to use, secure and
flexible to use. This system is very cheap as compared of
as biometrics system.
REFERENCES
[1] Neha Singh, Nikhil Bomanwar “Improved
Authentication Scheme Using Password Enabled
Persuasive Cued Click Point, 2015, IEEE.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1252
[2] Sonia Chiasson, Elizabeth Stobert, Alain Forget,
Robert Middle, P.C.van Oorschot “Persuasive Cued Click-
Points: Design, Implementation, and Evaluation of a
Knowledge-Based Authentication Mechanism, 2012,
IEEE.
[3] Arash Habibi Lashkari, Farnaz Towhidi, Dr. Rosli
Saleh, Samaneh Farmand ,"A complete comparison on
Pure and Cued Recall-Based Graphical User
Authentication Algorithms”, 2009, IEEE
[4] Maslin Masrom, Farnaz Towhidi, Arash Habibi
Lashkari, “Pure and Cued Recall-Based Graphical User
Authentication”, 2009, IEEE
[5] Muhammad Daniel Hafiz, Abdul Hanan Abdullah,
Norafida Ithnin, Hazinah K. Mammi, “Towards
Identifying Usability and Security Features of Graphical
Password in Knowledge Based Authentication
Technique”, 2008, IEEE.
[6] Fatehah M.D., Mohd Zalisham Jali & Wafa M.K., Nor
Badrul Anuar, “Educating Users to Generate Secure
Graphical Password Secrets: An Initial Study” 2013,
IEEE.
[7] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen, “Graphical
Passwords: A Survey” 2005, IEEE.

More Related Content

PDF
IRJET- A Shoulder-Surfing Resistant Graphical Password System
PDF
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
DOCX
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PDF
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
PDF
PDF
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
PDF
H364752
PDF
7. 9589 1-pb
IRJET- A Shoulder-Surfing Resistant Graphical Password System
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
[IJET V2I3-1P2] Authors: S. A. Gade, Puja Bomble, Suraj Birdawade, Alpesh Valvi
H364752
7. 9589 1-pb

What's hot (10)

PDF
Implementation of video tagging identifying characters in video
PDF
IRJET- Question-Answer Text Mining using Machine Learning
PDF
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
PDF
IRJET- Voice based E-mail system
PDF
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
PDF
Finger Vein Based Licensing And Authentication Scheme Using GSM
PDF
IRJET- Bus Monitoring System using Android Application
PPTX
Business Intelligence
DOC
Android technical quiz app
Implementation of video tagging identifying characters in video
IRJET- Question-Answer Text Mining using Machine Learning
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
IRJET- Voice based E-mail system
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Finger Vein Based Licensing And Authentication Scheme Using GSM
IRJET- Bus Monitoring System using Android Application
Business Intelligence
Android technical quiz app
Ad

Similar to An Effective Authentication Method using Improved Persuasive Cued Click Points (20)

PDF
Research ppr
PDF
Persuasive Cued Click Point Password with OTP
PDF
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
PDF
Graphical password authentication using pccp with sound signature
PDF
An03402300234
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PDF
A Graphical Password Scheme using Persuasive Cued Click Points
PDF
Multiple grid based graphical text password authentication
PDF
IRJET - Securing Social Media using Pair based Authentication
PDF
IRJET- Securing Social Media using Pair based Authentication
PDF
IRJET- Random Keypad and Face Recognition Authentication Mechanism
PDF
Graphical Password Authentication
PDF
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
PDF
IRJET - Image Authentication System using Passmatrix
PDF
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
PDF
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
PDF
Video Captcha as a Graphical Password
PDF
IRJET-PLC and SCADA based Distribution and Substation Automation
PDF
C045016020
PDF
IRJET - TTL: Tap to Login
Research ppr
Persuasive Cued Click Point Password with OTP
MULTI DIMENSIONAL STERLING CONCEPTION FOR SYSTEM SECURITY
Graphical password authentication using pccp with sound signature
An03402300234
Authentication Scheme for Session Password using matrix Colour and Text
A Graphical Password Scheme using Persuasive Cued Click Points
Multiple grid based graphical text password authentication
IRJET - Securing Social Media using Pair based Authentication
IRJET- Securing Social Media using Pair based Authentication
IRJET- Random Keypad and Face Recognition Authentication Mechanism
Graphical Password Authentication
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET - Image Authentication System using Passmatrix
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Video Captcha as a Graphical Password
IRJET-PLC and SCADA based Distribution and Substation Automation
C045016020
IRJET - TTL: Tap to Login
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Well-logging-methods_new................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
additive manufacturing of ss316l using mig welding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Well-logging-methods_new................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
R24 SURVEYING LAB MANUAL for civil enggi
CH1 Production IntroductoryConcepts.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Lecture Notes Electrical Wiring System Components
OOP with Java - Java Introduction (Basics)
additive manufacturing of ss316l using mig welding
bas. eng. economics group 4 presentation 1.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CYBER-CRIMES AND SECURITY A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd

An Effective Authentication Method using Improved Persuasive Cued Click Points

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1249 AN EFFECTIVE AUTHENTICATION METHOD USING IMPROVED PERSUASIVE CUED CLICK POINTS Dhanashree Kadu1, Shanthi Therese2, Anil Chaturvedi3 1M.E. Computer Department, Shree L.R. Tiwari College of Engineering, Mumbai University, MS, India 2Associate Professor, Thadomal Shahani College of Engineering, Mumbai University, MS, India 3Assistant Professor, Shree L.R. Tiwari College of Engineering, Mumbai University, MS, India -------------------------------------------------------------------***------------------------------------------------------------------------ ABSTRACT: In today’s digital environment security is very important. For that password protection is very much necessary. Various password protection techniques are available. For authentication text-based passwords are used commonly which is very much prone to attacks. so to overcome the disadvantage of text password, graphical passwords are used. Persuasive Cued Click Point is a click- based graphical password technique which is consist of numbers of images where users click on one point per image & generate one password. Graphical passwords are easy to memorize but difficult to crack by attackers. In this paper, we proposed a methodology of graphical password authentication system using Improved Persuasive Cued Click Points, including usability and security. Main goal of this system is to support the users in selecting better passwords, which will increases the security. Keywords—Cued Click Point (CCP); Graphical passwords; authentication; persuasive Cued Click Point. 1. INTRODUCTION All our applications needed Strong authentication method. Text based password is a popular authentication method and they are very much prone to attacks. so to overcome the disadvantage of text password, graphical passwords are used. . Graphical authentication is best alternative solution to text-based authentication. Graphical passwords have two main issues as Shoulder surfing and hotspot, to reduce that we have proposed a graphical password authentication system which is best alternative for text password. In this paper we have proposed a graphical password authentication system which is best alternative for text password. The main objective of the project is to provide a two way authentication to the users by using Persuasive Cued Clicked point’s technique and OTP. 2. OVERVIEW OF GRAPHICAL PASSWORD AUTHENTICATION SYSTEMS Graphical password is an alternative to text based passwords in which users click on number of images to authenticate themselves rather than typing text as password [3]. Graphical passwords are more memorable compared to alphanumeric passwords, because it is easier to remember an image of flower than a set of alphabets and numbers. Several psychological studies have recognized human brains have apparently superior memory to recognize, recall visual information like photos as opposed to verbal or text based information [4].One of the best password authentication systems was text based or alphanumerical based password has several problems. One of the main problem with text based password is it was ridicules to remember several text password for different account. Then introduction of biometric password [3] and token based password was considered as alternative of the text based password, but it again has several drawbacks like cost and unavailability issue. To overcome the disadvantages of text based password and token based password the invention of graphical password is introduced. Initially there were following graphical password authentication systems: A. Pass point. B. Cued Click Point (CCP). C. Persuasive Cued Click Points (PCCP). But this system had again disadvantage of hot spot problem and shoulder surfing attacks. To overcome the disadvantage of hot spot problem invention of Persuasive cued click point is made. A. Pass Point: The pass point system for password authentication. Pass point was as simple as just clicking five point on single image and combination of this point as a password. In this user has to select five points from single image and at the time of password selecting and during the time of login user has to repeat the same sequence of the points from single image. But the main security problem with this was the HOTSPOT [1], the area where the user clicks. User choose the easy to memorable passwords to which can be easily guessed by hacker. To avoid this problem the next method is implemented.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1250 B. Cued Click point: To overcome the disadvantage of the pass point authentication system the cued click point is invented. Cued click point [1][2] has the same concept as of the pass point but the main difference between them is passing five points on five different image one point per image. C. Persuasive-cued click point (PCCP) The persuasive cued click point [1][2] is the addition of the persuasive feature to cued click point. It allows user to select less portable password. It has two more function as shuffle and viewport, when users make a secret word, the images are a little monochromic except for viewport for to avoid known hotspots the viewport. The most useful benefit PCCP is make complex system to hackers. Users have to choose clickable area within the area and cannot click outside of the viewport unless they press the shuffle button to randomly reposition the viewport. At the time of password creation users may shuffle many times as he want. Only during the password generation, the viewport & shuffle buttons are displayed. After secrete word generation process, graphical images are presented to users casually without viewport & shuffle or refresh button. Then user has to select particular clickable area on particular image. 3. PROPOSED SOLUTION & PROPOSED MODEL The two way authentication needs to be developed for the users by using Persuasive Cued Clicked points technique and OTP, which can be effectively used for any system for secure login and but difficult to be guessed by attacker. A. Registration Process: B. Login Process: Proposed model contains following points: Proposed system provides a high range of security to the users by using Persuasive Cued Clicked point’s technique and OTP. The user has to register him by entering his user name; mobile number and email ID. After successful registration user will have to select the five images with which he wants to generate the password by clicking one point on each image. After the five clicks unique password is generated and the registration process is completed. While selecting images user will get two options for selecting images as from system or user an select their favorite images to generate the graphical password. Now every time the user wants to login will have to enter the username and select the start button. After user selects login, user will receive the binary OTP containing 5 bit binary code on his mobile and email ID. Now user want to select the same points which he had selected at the time of registration for the images when the bit in the OTP is 1 and select any other point except the point select while registration for the image when the bit in the OTP is 0.After successful completion of this steps, he will get the access to the system using login. 4. SYSTEM ARCHITECTURE Fig 1.System architecture of proposed model Registration module focuses on the registration of a new user who needs to register before logging on to the system. a) User Details: In this module for registration user needs to like username, name, address, mobile number and email ID, which gets stored in the database for authentication. Figure 2 shows User Registration form where user needs to fill username, name, address, mobile number and email ID. Fig 2.User Registration Form
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1251 b) Click Points: Once the user fills details there is provision of load image which presents images to user after they fill user details .For each image assigned by system there appears a viewport which can be shuffle as per user requirement. A single point inside this viewport user need to select as click point. Login Module In this module the user authentication is verified by the system. User has to follow the same sequence of images and selects particular click points which is selected at the time of registration by the user. User has to verify the username first. After that Image selection page will appear. User has to select one particular point inside this viewport. These procedure should be repeated for the five number of images. If all the images clicked point matches with the user then user allowed using the system. Figure 3 shows Login form where registered user can login into the system with a valid username. Fig 3.Login Form Figure 3 shows Image selection form, After clicking on Login button Image selection form gets displayed Fig 4.Image Selection Form Figure 4 shows images with viewport where user can select one point inside the viewport and these procedure will repeat with five images and graphical password will get saved successfully. Fig 5.Image with viewport 5. CONCLUSION Improved Persuasive Cued Click-Points (IPCCP) authentication system is a secure and more user friendly system which contains graphical password, which are easy and flexible for the users to remember as compared to text based passwords and difficult to attack for the attackers. Improved Persuasive Cued Click-Points (IPCCP) approach has tried to reduce the formation of shoulder surfing attack and hotspot. The Improved Authentication Scheme Using Improved Persuasive Cued Click Points system is very efficient to use, secure and flexible to use. This system is very cheap as compared of as biometrics system. REFERENCES [1] Neha Singh, Nikhil Bomanwar “Improved Authentication Scheme Using Password Enabled Persuasive Cued Click Point, 2015, IEEE.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1252 [2] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Middle, P.C.van Oorschot “Persuasive Cued Click- Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism, 2012, IEEE. [3] Arash Habibi Lashkari, Farnaz Towhidi, Dr. Rosli Saleh, Samaneh Farmand ,"A complete comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms”, 2009, IEEE [4] Maslin Masrom, Farnaz Towhidi, Arash Habibi Lashkari, “Pure and Cued Recall-Based Graphical User Authentication”, 2009, IEEE [5] Muhammad Daniel Hafiz, Abdul Hanan Abdullah, Norafida Ithnin, Hazinah K. Mammi, “Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique”, 2008, IEEE. [6] Fatehah M.D., Mohd Zalisham Jali & Wafa M.K., Nor Badrul Anuar, “Educating Users to Generate Secure Graphical Password Secrets: An Initial Study” 2013, IEEE. [7] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen, “Graphical Passwords: A Survey” 2005, IEEE.