AUTHENTICATION SCHEME USING ROTATING PATTERN PASSWORD MUHAMMAD FAISAL BIN DAUD

Size: px
Start display at page:

Download "AUTHENTICATION SCHEME USING ROTATING PATTERN PASSWORD MUHAMMAD FAISAL BIN DAUD"

Transcription

1 AUTHENTICATION SCHEME USING ROTATING PATTERN PASSWORD MUHAMMAD FAISAL BIN DAUD BANCHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) FACULTY INFORMATICS AND COMPUTING UNIVERSITI SULTAN ZAINAL ABIDIN 2018

2 DECLARATION I hereby declare that this project is based on my own effort with helps getting information from sources that I have confessing. All section of the text and results which have been obtained from other workers or sources are fully references. I understand that are cheating and plagiarism constitute a breach of university regulations and will be dealt with accordingly. Name:... Date:.

3 CONFIRMATION I hereby declare that this report is based on my original work except for quotations and citations, which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at Universiti Sultan Zainal Abidin or other university. Name:... Date:.

4 DEDICATION I am using this opportunity to express my greatest gratitude to everyone who supported me throughout my final year project which is Authentication Scheme Using Rotating Pattern Password. I am overwhelmingly thankful to them for their aspiring guidance, invaluably constructive criticism and friendly advice during the project work. I am sincerely grateful to them for truthful illuminating views on a number of issues related to the project. Firstly, I want to express a very special thanks to Madam Nor Aida Binti Mahiddin as my supervisor for guiding, monitoring and encouraging me throughout the course of this final year project. And also I want to take this opportunity to thank my family and all lecturers of Faculty of Informatics and Computing for their attention, guidance and meaningful advices during the development of this project. I would like to give a special appreciation thanks to all my friends and classmates for their valuable comments and suggestions on this project which gave me an inspiration and brilliant ideas to improve this project. Lastly, I want to say thank you to all people who help me directly and indirectly to complete this project. Thank You, Muhammad Faisal Bin Daud

5 ABSTRACT Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eavesdropping, dictionary attacks, social engineering and shoulder surfing. Random and lengthy passwords can make the system secure but difficulty of remembering those password has become the main problem. Studies have stated that most users tend to pick a short and easy-to-remember password. Unfortunately, these passwords can be easily cracked and guessed. Hence, a Graphical password is introduced as alternative techniques to textual passwords. In this thesis, DAS technique is proposed to generate a rotating pattern password for Android.

6 TABLE OF CONTENTS PAGE FRONT PAGE.....i DECLARATION..ii CONFIRMATION...iii DEDICATION..iv ABSTRACT..v TABLE OF CONTENTS vii LIST OF FIGURES.. x CHAPTER 1 INTRODUCTION 1.1 Introduction Project Background Problem Statement Objectives Scope Limitation of Works Report Organizing 3 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Project and Research Paper

7 2.2.1 Dhamija and Perrig Passfaces Convex Hull Authentication Scheme Signature Authentication Scheme Jansen Pair-Based Authentication Scheme Hybrid Textual Authentication Scheme DAS Technique Shoulder Surfing Technique Chapter Summary 12 CHAPTER 3 METHODOLOGY 3.1 Introduction Methodology Phases Planning Phase Requirement Analysis Phase Design Phase Framework DAS Technique Flow of the Process Implementation Phase Testing Phase Deployment Phase 21

8 3.3 Chapter Summary 21 CHAPTER 4 PROJECT DESIGN AND MODELLING 4.1 Introduction Framework Chapter Summary 24 CHAPTER 5 IMPLEMENTATION AND TESTING 5.1 Introduction Hardware Software Adding New Library Designing Layout Writing Function Java Function of Rotation Pattern Lock View Rotation of Password Chapter Summary 34

9 CHAPTER 6 CONCLUSION 6.1 Introduction Result Project Constraint Future Work Conclusion 37 REFERENCES GANT CHART 41-42

10 LIST OF FIGURES FIGURE NO. Figure 2.1 Figure 2.2 Figure 2.3 Figure 2.4 Figure 2.5 Figure 2.6 Figure 2.7 Figure 2.8 Figure 2.9 Figure 2.10 Figure 3.1 Figure 3.2 Figure 3.3 Figure 3.4 Figure 3.5 Figure 3.6 Figure 3.7 Figure 4.1 Figure 5.1 Figure 5.2 Figure 5.3 Figure 5.4 TITLE Random images used by Dhamija and Perrig Examples of Passfaces Example of convex hull Example of signature technique Login Interface Intersection letter for pair AN Rating colour by user Login Interface Draw-A-Secret Technique DAS and Story Combination Technique Iterative and Incremental model Framework of the scheme View of DAS Technique Registration Process Drawing Process Login Process User access of Application The Complete Framework for Authentication Scheme Xiomi Redmi Note 5A Android Studio Main Screen Adding New Library Designing The Layout

11 Figure 5.5 Figure 5.6 Figure 5.7 Figure 5.8 Figure 5.9 Figure 5.10 Figure 6.1 Java Code Implementing the rotation using java code Pattern Lock View First Attempt of Drawing the Password Second Attempt To Login by Drawing The Same Pattern Drawing 90 Degree Rotated Password Main Layout of this Project

12 CHAPTER 1 INTRODUCTION 1.1 Introduction This chapter presents an introduction to the project proposal. It starts with an overview of the key concept related to the project problems addressed. Then, the solution is proposed to overcome the problem of the project. Further, it will explain the aims and limitations of this project. 1.2 Project Background Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eavesdropping, dictionary attacks, social engineering and shoulder surfing. Random and lengthy passwords can make the system secure but the difficulty to remember the password has become the main problem. Studies have stated that most users tend to pick a short and easy-to-remember password. Unfortunately, these passwords can be easily cracked and guessed. Graphical passwords are introduced as alternative techniques to textual passwords. In this project, DAS or know as Draw-A-Secret technique is proposed to generate rotating pattern passwords for Android.

13 1.3 Problem Statement A textual password is the most common method used for authentication in many platforms like Android and IOS. However, a textual password is vulnerable to eavesdropping, dictionary attack, social engineering and shoulder surfing. User may pick a length and strong password to make it more secure but the difficulty of remembering random and lengthy textual passwords is becoming the main problem. Mostly, user tend to pick short textual passwords which easy to be guessed and cracked. 1.4 Objectives There are three objectives that aim to be achieved through this project. The aims are as follows: 1. To analyse the drawbacks of textual passwords. 2. To develop a graphical password that is rotating pattern password. 3. To implement a technique to replace the textual password which provides more security from vulnerabilities using a rotating pattern password on Android. 1.5 Scope of Project The scope of this project is to design and develops a graphical password that can overcome the vulnerabilities. User: A user needs to register their password by drawing the password on nine dots of screen layout. When the first step is done, user can first log in by orderly re-drawing the predefined password. The user is required to draw on the dots of pattern orderly rather than clicking on them directly. However, for every time the user want to log into the app, the dots pattern is rotating 90 degrees clockwise.

14 The rotation is infinite which means the rotation will happens every time when the user enters the login screen. 1.6 Limitation of Work This project is developed for Android so it is only can be used on android based devices. 1.7 Report Organizing The thesis organize each chapter that has on the thesis. It arranges with refer to the specific format and it easy for readers to understand the whole of report. The report is started with chapter 1 that explains about Introduction, this chapter will explain roughly about this project. The next chapter is chapter 2 Literature Review, this chapter tells more about the study on some references and research for the system development. The chapter 3 Methodology is explaining about methodology and requirement of software and hardware that guide the system development. Chapter 4 Project Modelling and Design are the core part in the development process, the chapter 5 Implementation and Testing are explaining more about the complete the system to the perfect without any lack, and lastly the chapter 6 Conclusion and Discussion are explaining about the conclusion that form the project development.

15 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction This thesis will discuss the previous journals and research papers. Data and information have been gathered to get a better understanding of the method used and applied to this project. 2.2 Project and Research Paper Dhamija and Perrig Figure 2.1 Random images used by Dhamija and Perrig

16 This scheme is a graphical authentication scheme which user make the authentication using the pre-defined images. In this scheme, the user needs to register by selecting a set of images which is later on the user has to select it during the login time to prove the authentication. However, this scheme is quite vulnerable to shoulder-surfing Passfaces Figure 2.2 Examples of Passfaces This new scheme was introduced as Passfaces. In this scheme, there is a grid that consists of nine faces and user needs to select images from the grid. First, user needs to choose four faces of human as their selected images. Then, the user has to select one of the four selected images from eight images. Since there are four images that the user has selected, thus user need to do it four times. However, this scheme is quite vulnerable and easy to be attacked by guessing or trying many times.

17 2.2.3 Convex Hull Authentication Scheme Figure 2.3Example of convex hull Describe a graphical password scheme using convex hull method towards Shoulder Surfing attacks. A user needs to recognize pass-objects and click inside the convex hull formed by all the pass-objects. In order to make the password hard to guess large number of objects can be used but it will make the display very crowded and the objects almost indistinguishable, but using fewer objects may lead to a smaller password space, since the resulting convex hull can be large.

18 2.2.4 Signature Authentication Scheme Figure 2.4 Example of signature technique This technique included two stages, registration and verification. At the time of registration stage the user draws signature with a mouse, after that the system extracts the signature area. In the verification stage it takes the user signature as input and does the normalization and then extracts the parameters of the signature. The disadvantage of this technique is the forgery of signatures. Drawing with mouse is not familiar to many people, it is difficult to draw the signature in the same perimeters at the time of registration.

19 2.2.5 Jansen Proposed a graphical password scheme for mobile devices. During password creation, a user selects a theme consisting of photos in thumbnail size and set a sequence of pictures as a password. During authentication, user must recognize the images in the correct order. Each thumb nail image is assigned a numerical value, thus the sequence of the chosen images will create a numerical password. As the no. of images is limited to 30, the password space of this scheme is not large Pair-Based Authentication Scheme During registration user submits the password. Minimum length of the password is 8. The secret pass should contain even number of characters. During the login phase, when the user enters his username an interface consisting of a grid is displayed. The grid is of size 6 x 6 and it consists of alphabets and numbers. These are randomly placed on the grid and the interface changes every time. Figure 2.5 Login Interface Figure 2.5 shows the login interface. User has to enter the password depending upon the secret pass. User has to consider his secret pass in terms of pairs. The session password consists of alphabets and digits.

20 Figure 2.6 Intersection letter for pair AN The first letter in the pair is used to select the row and the second letter is used to select the column. The intersection letter is part of the session password. This is repeated for all pairs of secret pass. Figure 2.6 shows that L is the intersection symbol for the pair AN. The password entered by the user is verified by the server to authenticate the user. The grid size can be increased to include special characters in the password Hybrid Textual Authentication Scheme During registration, user should rate colours as shown in figure 2.7. User should rate colour from 1 to 8 and he can remember it as RLYOBGIP. Same rating can be given to different colours. During the login phase, when the user enters his username an interface is displayed based on the colours selected by the user. The login interface consists of grid of size 8 8. This grid contains digits 1-8 placed randomly in grid cells. The interface also contains strips of colours as shown in figure 2.8. The colour grid consists of 4 pairs of colours. Each pair of colour represents the row and the column of the grid.

21 Figure 2.7 Rating colour by user Depending on the ratings that have been given to colours, we get the session password. As discussed above, the first colour of every pair in colour grid represents row and second represents column of the number grid. The number in the intersection of the row and column of the grid is part of the session password. Instead of digits, alphabets can be used. For every login, both the number grid and the colour grid get randomizes so the session password changes for every session. Figure 2.8 Login Interface

22 Figure 2.8 shows the login interface having the colour grid and number grid of 8 x 8 having numbers 1 to 8 randomly placed in the grid. Depending on the ratings given to colours, we get the session password. As discussed above, the first colour of every pair in colour grid represents row and second represents column of the number grid. The number in the intersection of the row and column of the grid is part of the session password. Consider the Figure 2.7 ratings and Figure 2.8 login interfaces for demonstration. The first pair has red and yellow colours. The red colour rating is 1 and yellow colour rating is 3. So the first letter of session password is 1st row and 3rd column intersecting element is 3. The same method is followed for other pairs of colours. For figure 8 the password is Instead of digits, alphabets can be used. For every login, both the number grid and the colour grid get randomizes so the session password changes for every session DAS Technique Figure 2.9 Draw-A-Secret Technique

23 Jermyn proposed a new technique called Draw- a-secret (DAS) as shown in figure 3 where the user is required to re-draw the pre-defined picture on a 2D grid. If the drawing touches the same grids in the same sequence, then the user is authenticated. This authentication scheme is vulnerable to shoulder surfing Shoulder Surfing Technique Figure 2.10 DAS and Story Combination Technique Haichang has proposed a new shoulder-surfing resistant scheme as shown in figure 10 where the user is required to draw a curve across their password images orderly rather than clicking on them directly. This graphical scheme combines DAS and Story schemes to provide authenticity to the user. 2.3 Chapter Summary This chapter briefly explained about research of graphical password. It also includes the comparison of each literature study about method and technique used in every project.

24 CHAPTER 3 METHODOLOGY 3.1 Introduction In developing the scheme, the methodology applied is the Iterative and Incremental Method. Figure 3.1 shows the iterative and incremental model adopted for the development of this project. This model is selected because a project can be developed through the repeated cycle (iterative). Even if there are any changes during the any phases, this project still can be proceed. This model consists of six phases which are planning, requirement analysis, designing, implementation, testing and deployment. Figure 3.1 Iterative and Incremental model

25 3.2 Methodology Phases Planning Phase Planning is the first phase to develop an authentication scheme using graphical password. At this phase, planning is important to develop a scheme to overcome the vulnerabilities of the textual password and enhance the security in authentication. To implement the project, Android development software like Android Studio is used and this project will be applied on Android-based device. Required material has been prepared as below: 1. Hardware Android Phone Personal Computer (PC) 2. Software Google Chrome Notepad ++ Microsoft Word W3 School YouTube Microsoft PowerPoint PHP Android Studio

26 3.2.2 Requirement Analysis In the second phase, all information about the schemes is gathered. As the scheme is for session password and using images and colours, so a lot of information about graphical session password is identified. All of the software and hardware requirement is listed to develop the project. Some source codes about session password, authentication scheme using images and colour, and more information related is collected Design The design is the third phase where the workflow of the project is designed in order to make this project successful. After all the important information related to this project is acquired, a framework is designed to show the flow of the scheme that is going to be developed, so that, this project will be easier to be understood. In this phase, a design of flowchart and framework will be explained to show the flow of the scheme specifically Framework Figure 3.2 shows the framework for session password using images and colours. In order for user to get into the system, user need register their username and password by entering their name and drawing their pattern on the imaged grid. Then, during login process user need re-draw the password. Once the password is matched, the user will be authenticated.

27 Figure 3.2 Framework of the scheme The user can now have the access to the application. However, once the user logs out, the session is ended and the password will be terminated DAS Technique Figure 3.3 shows the method of Draw-A-Secret Technique. After user register password by drawing the pattern on the imaged grid, the drawing will be stored in the database based on sequence pictures. When user redraws to login into the application, the password in the database will be retrieved to match the user draws. If it matches, the user will be authenticated.

28 Figure 3.3 View of DAS Technique Images on the grid are set in sequence of number. Therefore, the drawing of pictures will be saved in database by sequence of number of the grid images Flow of The Process All figures will explain how the flow of the process works. Starting from registration by drawing password and then logging into the system by redrawing the password on the grid of images. Figure 3.4 Registration phase Process

29 Figure 3.4 shows how the pre-registration is working out. To register, user need to sign up and then fill the information requested. Figure 3.5 Drawing Process Figure 3.5 show the process of user drawing the password on the grid of images. User need to draw the password twice before confirming the password by clicking submit button. Figure 3.6 Login Process Figure 3.6 displays the login process of this scheme. Once user click on the sign in button, user need to draw the password that have been drawn during the registration phase. If the drawing matched with saved password, the user will be authenticated.

30 Figure 3.7 User access of Application Figure 3.7 shows the WhatsApp and Custom-Made Calculator application. Once the user is authenticated, the user will have the access of linked application like WhatsApp and Calculator. By quitting the application, user will be considered as logged out Implementation After all the information has been gathered and the design has been developed. This stage is to implement all the method and technique into the system. If there is any error or changes, it will be solved at this phase Testing At this phase, the system will be tested. If the error still occurred, it will be solved at this phase and if there are any changes need to implement, the project must back to design phase for revision of flow. In this phase, after the system has been completely developed without any errors, the system will be implemented on Android device.

31 3.2.6 Deployment In this phase, after the system has been completely developed without any errors, the system will be implemented on Android device. 3.3 Chapter Summary In this chapter, the methodology of this project is explained. The flow of this project is being shown in framework. The requirement of the software and hardware that used is listed to ensure the success of this project development.

32 CHAPTER 4 PROJECT DESIGN AND MODELLING 4.1 Introduction In this chapter, the conceptual model that defines the structure, flow of the process and details of the system were discussed. Technique that used to define and analyse the data requirement needed to support the software development. In the modelling process, the system model can be used as part of understanding a situation, identifying problems and supporting decision making. 4.2 Framework A framework is often a layered structure which indicating what kind of program can or should be build and how they would interrelate. A framework may be a set of functions within a system and they interrelate, the layer of operating system, the layers of a network and many more. A framework is generally more comprehensive than a protocol and more prescriptive than structure.

33 Figure 4.1 The Complete Framework for Authentication Scheme Based on Figure 4.1, there are two main processes that are required in order to successfully authenticate the user which are registration and verification. First, user need to create password by drawing pattern on the dots layout. The password must consist of at least three dots. Password would not be saved if the user click or draw on one or two dots only. Once the user finished drawing the pattern, the pattern will be saved in the database and user will be able to enter the application for the first after the registration. After logging out and the user want to open the system again, the user need to log in by re-drawing the pattern in the same sequence of dots. In login process, the system will read the input password to determine whether it is matched or not with the registered password. If the password matches with the registered password, the user will be authenticated and have the access of the system. However, if the password is wrong, the user need to draw the password again.

34 4.4 Chapter Summary In this chapter, the design and modelling of the system were explained. The framework of the system provides a better and clearer system flow to the user. This ensures that the functionality of the system is fulfilling the user and system requirement.

35 CHAPTER 5 IMPLEMENTATION AND TESTING 5.1 Introduction Testing and implementation is about to construct the system as specific design that has been developed in previous phase, methodically verified to ensure that they are errorfree and fully meet the user requirement. This phase should be done before a project is fully finished and ready to be deployed. This chapter covers the correct mechanism on testing the authentication scheme in real environment. 5.2 Hardware For this project, the main hardware that been used is the Xiomi Redmi Note 5A with the android version of (Nougat) as the platform to test and implement this authentication scheme.

36 5.3 Software Figure 5.1 Xiomi Redmi Note 5A This project developed by using Android OS platform using Android Nougat The version of the software to develop the application is Android Studio Figure 5.2 shows the welcoming screen of Android Studio. Figure 5.2 Android Studio Main Screen

37 5.3.1 Adding New Library This is the first thing need to done when developing an android application. Library is added to glade section in Android Studio so that the user can have the feature and function needed to develop the project. Figure 5.3 shows how a library is added to glade. After typing down the code, user needs to sync the glade before the library is ready to use. Figure 5.3 Adding New Library

38 5.3.2 Designing Layout This is second phase for development of this project where layout is designed based on requirement of the project. Pattern lock view is imported from the library that has been added in the glade. Figure 5.4 Designing The Layout

39 5.3.3 Writing Function Java functions need to be added in order to make the system working because the layout screen is only a display but the java functions is the engine that will run the system accordingly. Figure 5.5 Java Code

40 5.3.4 Java Function of Rotation Rotation is set by implementing the java code which set the pattern layout to rotate every time the user opens the input password layout. Figure 5.6 Implementing the rotation using java code

41 5.4 Pattern Lock View Figure 5.7Pattern Lock View Figure 4.2 shows exactly how the pattern screen layout. This pattern layout consists of nine dots in three rows. And for user to create the pattern password, the user needs to use three dots at least. If the user draws on two dots, the password would not be saved and the user needs to draw the password again. In other words, at least three dots are needed to create a password but the user can uses all the dots provided to create the password depends on their own creativity and ideas in creating the password.

42 5.5 Rotation of Password Figure 5.8 First Attempt of Drawing the Password Based on Figure 5.8 above, during registration, user has created the password by drawing Z pattern. And then during login process the user need to draw the same pattern to login into the application for the first time. In this phase, rotation is not happen yet since the rotation was not set to start working for the first time user want to login. The rotation will start working right when the user want to login second time and will continue for each time user want to log into the system.

43 Which means every time user open Input Password layout, rotation will start working and pattern lock view will be rotating. For every rotation, the pattern lock view will rotate 90 degree clockwise and the rotation is infinite. Therefore, the password will not be cracked or guessed by shoulder surfing since the rotation is infinite loop. Figure 5.9 Second Login Attempt by Drawing The Same Pattern Figure 5.9 shows second login attempt is made by drawing the same pattern as the first time login. However, the system detects the password as wrong and popped Wrong Password validation up. Here we can see that the rotation is happened and that is why the Z pattern is wrong.

44 Figure 5.10Drawing 90 Degree Rotated Password After unsuccessfully drawing the correct pattern, Figure 5.10 shows rotated password is drawn by the user. As the rotation is working at 90 degree clockwise, therefore N pattern is true and the user successfully log into the application. However, the drawing must be done with right sequence of dots or else the password will be absolute wrong. 5.6 Chapter Summary Testing and implementation is an interrelated process where each of implementation modules need to be tested in order to achieve error-free and meets the specified requirement. In general, most of the budget consume on implementation and testing phase because it is core process to complete the product and able to deliver all the functionalities smoothly.

45 CHAPTER 6 CONCLUSION 6.1 Introduction In this chapter, it discuss about the structure of application and the best result of the project. Besides that, possible future works, pros and cons of the project also will be discussed in this chapter. 6.2 Result The result for this project is value based on the rotation for the pattern password. Since the rotation is the main enhancement of this pattern password project, the success of the project fully depends on the rotation. This prove that the objective of this project to develop a rotating pattern password in providing a better and more secure authentication scheme to replace textual password using DAS technique is succeed.

46 Figure 6.1 Main Layout of this Project Figure 6.1 shows the main layout of this pattern password project which it this scheme is now ready to use after going through implementation and testing phases. Therefore, this scheme is now error-free and successfully meets the objective of this project. 6.3 Project Constraint There are several problems and limitations that occurred throughout the development of this project. The problems and limitations in conducting this project are: Low specification laptop is not able to support Android Studio well. Need to stop other running program when running Android Studio. Limited design option on Android Studio. Some variables can not be assigned value since it is imported from a library.

47 6.4 Future Work For future work, there is a good suggestion that can be made to upgrade this authentication scheme to be more secure and make it more user-friendly. The suggestions that can be considered are: Assign colour to every dots of the pattern to ease the user to remember the rotation of the password and also can avoid confusion for the user. To assign the colour, a new library for the pattern lock view need to be created and any extra feature also can be included in the library. Add a new feature which is Auto-Captures camera to monitor the unknown login attempts. 6.5 Conclusion Authentication Scheme using Rotating Pattern Password is brand new scheme which is been published before. This scheme aimed to provide a better authentication for user. Rotating Pattern Password gives user an easier and faster authentication process and also provides user a better password option. This scheme will overcome the textual password vulnerabilities like eaves dropping, dictionary attacks, social engineering and shoulder surfing. In conclusion, the objective to develop an Authentication Scheme Using Rotating Pattern Password was successfully achieved. Thus, it is ready to be used in any android device which has android version and above. In terms of security, this project is successfully providing a more secure authentication scheme as alternative to replace the textual password.

48 REFERENCES 1. M Sreelatha 1, M Shashi 2, M Anirudh 1, Md Sultan Ahamer 1, V Manoj Kumar 1 -Authentication Schemes For Session Passwords Using Color And Images. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May Jay Patel, SagarPadol, Bhushan Kankariya, KainjanKotecha - Authentication Schemes for Session Passwordsusing Color and Images. International Journal of Computer Applications ( ) International Conference on Recent Trends in engineering & Technology (ICRTET'2013) 3. Pattern Lock View- GitHub Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang-Cracking Android Pattern Lock in Five Attempts.School of Information Science and Technology, Northwest University, China 5. FreyrSævarsson - Combinatorics in Pattern-Based Graphical Passwords. Master s thesis in Mathematics May, Geumhwan Cho1, Jun Ho Huh2, Junsung Cho1, Seongyeol Oh1, Youngbae Song1, Hyoungshick Kim1-SysPal: System-guided Pattern Locks for Android. Department of Computer Science and Engineering, Sungkyunkwan University, South Korea 7. EMDT Dev - Android Studio Tutorial (Pattern Lock View) 8. TihomirRAdeff - Develop Password protected app in Android Studiohttps://

49 9. Rotating Image Button in Android Studio Android: Rotate image in imageview by an angle StackOverFlowhttps://stackoverflow.com/questions/ /android-rotateimage-in-imageview-by-an-angle 11. How to Save Variables in Shared Preferences - Android Studio Tutorialhttps:// 12. Android sharedpreferences tutorialhttps:// Android Activity Save State Part 1 and Part /watch?v=b3g6kuxvfuy

50 APPENDIX

51 Final Year Project 1 Month Task Final year project workshop Discussion and selection of proposal topic Registration of project title Detailed problem statement and literature study Detailed research methodology Preparation of proposal and presentation Proposal presentation Amendment of proposal Designing framework Framework implementation Preparation for pre-conference Pre-conference evaluation Detailed implementation of framework Conference provisioning Academic conference I Proposal draft submission Amendment of proposal Submission of proposal F E B * M A R * A P R * M A Y * J U N *

52 Final Year Project 2 Month Task Progress presentation Project development Project implementation and testing Project documentation Pre-conference evaluation Academic conference II Submission of proposal report Report amendment Final submission of project report J U N * J U L Y* A U G *

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme 1 Prof. S. K. Sonkar, 2 Prof. R. L. Paikrao Computer Engineering Dept. Amrutvahini College of engineering Sangamner,

More information

Graphical User Authentication Using Random Codes

Graphical User Authentication Using Random Codes Graphical User Authentication Using Random Codes Mr.D.S.Gawande 1, Manisha P. Thote 2, Madhavi M. Jangam 3, Payal P. Khonde 4, Payal R. Katre 5, Rohini V. Tiwade 6 1Assistant Professor, Computer Science

More information

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com

More information

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION P.Kiruthika R.Tamilarasi Department of Computer Applications, Dr.Mahalingam College Of Engineering and Technology,

More information

SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD

SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD Bagade Om, Sonawane Anuja, Patil Akash, Patil Yogita, Maurya Jagruti Department of Computer Engineering Shram sadhana trust s college of engineering

More information

Simple Text Based Colour Shuffling Graphical Password Scheme

Simple Text Based Colour Shuffling Graphical Password Scheme Simple Text Based Colour Shuffling Graphical Password Scheme Nikita Parab 1, Ketan Gawde 2, Anshumaan Nalluri 3 1,2,3 Information Technology Dept., Universal College Of Engineering Vasai India, Abstract

More information

Authentication Using Grid-Based Authentication Scheme and Graphical Password

Authentication Using Grid-Based Authentication Scheme and Graphical Password Authentication Using Grid-Based Authentication Scheme and Graphical Password Vijayshri D. Vaidya 1 Department of Computer engineering SND COE & RC Yeola, India Imaran R. Shaikh 2 Department of Computer

More information

Authentication schemes for session password using color and special characters

Authentication schemes for session password using color and special characters Authentication schemes for session password using color and special characters Rohit Jagtap1, a, Vaibhav Ahirrao2,b Vinayak Kadam3,c Nilesh Aher4 1.Department of Computer Engineering, 2 Department of Computer

More information

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS Sreelatha Malempati Dept. of Computer Science & Engineering R.V.R. & J.C. College of Engineering Chowdavaram, Guntur, A.P lathamoturi@rediffmail.com

More information

Innovative Graphical Passwords using Sequencing and Shuffling Together

Innovative Graphical Passwords using Sequencing and Shuffling Together Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology

More information

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate

More information

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS Dr. Mohammed A. Fadhil Al-Husainy Raghda Ahmed Malih Department of Computer Science, Faculty of Information Technology, Middle

More information

Graphical password authentication using Pass faces

Graphical password authentication using Pass faces RESEARCH ARTICLE OPEN ACCESS Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information

More information

Presented By: Miss Samya Ashraf Want Student ID

Presented By: Miss Samya Ashraf Want Student ID Paper: Haichang Gao, Xiyang Liu, Sidong Wang and Honggang Liu, Ruyi Dai, Design and Analysis of a Graphical Password Scheme, Fourth International Conference on Innovative Computing, Information and Control,

More information

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Siddheshwar A. Suratkar Rahul A. Udgirkar Pratik D. Kale Amit A. Shelke Mohsin H. Shaikh Prof. D. C. Dhanwani Prof. CSE,

More information

An Ancient Indian Board Game as a Tool for Authentication

An Ancient Indian Board Game as a Tool for Authentication An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati 1 and Shashi Mogalla 2 1 Department of Computer Science and Engineering RVR & JC College of Engineering, Guntur, A.P. e-mail:

More information

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 395-402 TJPRC Pvt. Ltd. ENHANCEMENT OF SECURITY FEATURE IN

More information

Graphical Authentication System

Graphical Authentication System Graphical Authentication System A Sivasankar Reddy 1, M Kusuma 2 1 Student, Dept. of MCA, EAIMS 2 Professor, Dept. of MCA, EAIMS, Tirupati, A.P. Abstract- This evolution brings great convenience but also

More information

Usable Privacy and Security, Fall 2011 Nov. 10, 2011

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon (youngseok@cs.cmu.edu) Institute for Software Research School of Computer Science Carnegie Mellon University picture/photo based vs.

More information

3LAS (Three Level Authentication Scheme)

3LAS (Three Level Authentication Scheme) 3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology,

More information

The MSU Department of Mathematics "Account Manager" can be used for the following:

The MSU Department of Mathematics Account Manager can be used for the following: MSU Department of Mathematics Account Manager Tutorial Overview The MSU Department of Mathematics "Account Manager" can be used for the following: Change your Math account password Reset a forgotten password

More information

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Australian Journal of Basic and Applied Sciences, 7(4): 688-695, 2013 ISSN 1991-8178 Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Mohd Afizi Bin Mohd Shukran, Mohd

More information

11.0 Random Assignment

11.0 Random Assignment 11.0 Random Assignment Random assignment is the procedure by which enrolled youth will be assigned to either the Usual Services or ASPIRE Services groups. Random assignment is performed in a computer system,

More information

VISUAL RERANKING USING MULTIPLE SEARCH ENGINES

VISUAL RERANKING USING MULTIPLE SEARCH ENGINES VISUAL RERANKING USING MULTIPLE SEARCH ENGINES By Dennis Lim Thye Loon A REPORT SUBMITTED TO Universiti Tunku Abdul Rahman in partial fulfillment of the requirements for the degree of Faculty of Information

More information

Palm Vein Extraction and Matching For Personal Identification

Palm Vein Extraction and Matching For Personal Identification IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 64-68 Palm Vein Extraction and Matching For Personal Identification

More information

Database Security MET CS 674 On-Campus/Blended

Database Security MET CS 674 On-Campus/Blended Database Security MET CS 674 On-Campus/Blended George Ultrino gultrino@bu.edu Office hours: by appointment Course Description The course provides a strong foundation in database security and auditing.

More information

Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers Mohammed Farik, ABM Shawkat Ali Abstract: Issues of weak login passwords arising from default passwords in wired and wireless

More information

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method Salim Istyaq, Khalid Saifullah Assistant Professor, Dept. of Computer Engineering, EES, University Polytechnic, Faculty

More information

CPNW Account Creation Instructions

CPNW Account Creation Instructions CPNW Account Creation Instructions 1. Go to www.cpnw.org and click on the register link. We recommend you use a desktop or laptop for registration. Older phones and tablets may cause errors. 2. Enter the

More information

Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords

Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.3, August 2012, pp. 163~170 ISSN: 2089-3299 163 Novel Shoulder-Surfing Resistant

More information

Secure Authentication for Internet environment using Biometric and One-Time Password

Secure Authentication for Internet environment using Biometric and One-Time Password UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time

More information

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

Image Password Based Authentication in an Android System

Image Password Based Authentication in an Android System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

A Secure Graphical Password Authentication System

A Secure Graphical Password Authentication System International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 12, Number 2 (2016), pp. 197-201 Research India Publications http://www.ripublication.com A Secure Graphical Password

More information

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis

More information

A Hybrid Password Authentication Scheme Based on Shape and Text

A Hybrid Password Authentication Scheme Based on Shape and Text JOURNAL OF COMPUTERS, VOL. 5, NO. 5, MAY 2010 765 A Hybrid Password Authentication Scheme Based on Shape and Text Ziran Zheng School of Management & Economics Shandong Normal University, Jinan, China Email:

More information

Student Guide to Neehr Perfect Go!

Student Guide to Neehr Perfect Go! Student Guide to Neehr Perfect Go! I. Introduction... 1 II. Quick Facts... 1 III. Creating your Account... 1 IV. Applying Your Subscription... 4 V. Logging in to Neehr Perfect... 6 VI. Activities... 6

More information

Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique

Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Second Asia International Conference on Modelling & Simulation Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Muhammad Daniel Hafiz

More information

ILPO55 REFERENCE FRAMEWORK - EMPLOYABILITY PORTFOLIO TOOL

ILPO55 REFERENCE FRAMEWORK - EMPLOYABILITY PORTFOLIO TOOL ILPO55 REFERENCE FRAMEWORK - EMPLOYABILITY PORTFOLIO TOOL 3: E-Portfolio Introduction The 3 rd tool within the ILPO55 Reference Framework Employability Portfolio is the e-portfolio. The e- portfolio is

More information

One of the fundamental kinds of websites that SharePoint 2010 allows

One of the fundamental kinds of websites that SharePoint 2010 allows Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental

More information

MYINTERN : INTERNSHIP PLACEMENT FOR STUDENT MOHAMMAD ADLY BIN ALIMIN BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT)

MYINTERN : INTERNSHIP PLACEMENT FOR STUDENT MOHAMMAD ADLY BIN ALIMIN BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT) MYINTERN : INTERNSHIP PLACEMENT FOR STUDENT MOHAMMAD ADLY BIN ALIMIN BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT) UNIVERSITI SULTAN ZAINAL ABIDIN 2018 MYINTERN: INTERNSHIP PLACEMENT FOR STUDENT

More information

PowerPoint Basics: Create a Photo Slide Show

PowerPoint Basics: Create a Photo Slide Show PowerPoint Basics: Create a Photo Slide Show P 570 / 1 Here s an Enjoyable Way to Learn How to Use Microsoft PowerPoint Microsoft PowerPoint is a program included with all versions of Microsoft Office.

More information

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor

More information

A Multi-Grid Graphical Password Scheme

A Multi-Grid Graphical Password Scheme A Multi-Grid Graphical Password Scheme Konstantinos CHALKIAS, Anastasios ALEXIADIS, George STEPHANIDES Dept. of Applied Informatics, Macedonia University, 156 Egnatia str., 540 06 Thessaloniki, Greece

More information

In an effort to maintain the safety and integrity of our data and your information, TREK has updated the web site security.

In an effort to maintain the safety and integrity of our data and your information, TREK has updated the web site security. In an effort to maintain the safety and integrity of our data and your information, TREK has updated the web site security. Here s what has changed: The next time you login to EzQuote, after you enter

More information

Advanced Migration of Schema and Data across Multiple Databases

Advanced Migration of Schema and Data across Multiple Databases Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across

More information

A Development Of A Web-Based Application System Of QR Code Location Generator and Scanner named QR- Location

A Development Of A Web-Based Application System Of QR Code Location Generator and Scanner named QR- Location UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 A Development Of A Web-Based Application System Of QR Code Location Generator

More information

Digitized Engineering Notebook

Digitized Engineering Notebook Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Sandeep Kumar Gudivada Governors State University

More information

IOS SAFETY APPLICATION FOR UITM

IOS SAFETY APPLICATION FOR UITM Journal of Engineering Science and Technology Special Issue on ICE & ICIE 2015, April (2016) 97-105 School of Engineering, Taylor s University IOS SAFETY APPLICATION FOR UITM MOHAMAD FAHMI HUSSIN*, W AHMAD

More information

Blackboard course design

Blackboard course design DEO team, Academic Registry www.bristol.ac.uk/digital-education Blackboard course design Updated: 8 th Jan 2018 Contents 1. About this guide... 2 2. Essential information... 2 3. Requesting a Blackboard

More information

Guide for Researchers: Online Human Ethics Application Form

Guide for Researchers: Online Human Ethics Application Form Ethics & Integrity Research Office HUMAN RESEARCH ETHICS ONLINE APPLICATION October 2016/V1.03 Guide for Researchers: Online Human Ethics Application Form ENQUIRIES Senior Human Ethics Officer University

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

GNOSYS PRO 0.7. user guide

GNOSYS PRO 0.7. user guide GNOSYS PRO 0.7 user guide Author Guido M. Re Date September 2016 Reviewer Chad Barksdale Date September 2016 3 Contents 1 Get Started 7 1.1 System Requirements...................................................

More information

A Text based Authentication Scheme for Improving Security of Textual Passwords

A Text based Authentication Scheme for Improving Security of Textual Passwords A Text based Authentication Scheme for Improving Security of Textual Passwords Shah Zaman Nizamani Department of Information Technology Quaid-e-Awam University of Engineering, Science & Technology, Pakistan

More information

Sign in using social media without an EU Login account

Sign in using social media without an EU Login account EU Login How to authenticate with EU Login EU Login is the entry gate to sign in to different European Commission services and/or other systems. EU Login verifies your identity and allows recovering your

More information

PROJECT REPORT. TweetMine Twitter Sentiment Analysis Tool KRZYSZTOF OBLAK C

PROJECT REPORT. TweetMine Twitter Sentiment Analysis Tool KRZYSZTOF OBLAK C PROJECT REPORT TweetMine Twitter Sentiment Analysis Tool KRZYSZTOF OBLAK C00161361 Table of Contents 1. Introduction... 1 1.1. Purpose and Content... 1 1.2. Project Brief... 1 2. Description of Submitted

More information

Please note: If you already have an active SAM 2016 Account from another CAWT course, you do not need to purchase another SAM Code for this course.

Please note: If you already have an active SAM 2016 Account from another CAWT course, you do not need to purchase another SAM Code for this course. GREETINGS! Welcome to a new and exciting way of taking a college class. For many of you this will be your first time taking an online class. I will work very hard to make this a rewarding and successful

More information

edofe Management Toolkit

edofe Management Toolkit edofe Management Toolkit A guide to effective edofe management for Directly Licensed Centres 1 2 Contents Section one: Setting up the correct infrastructure on edofe... 4 Creating a group... 4 Editing

More information

Running Head: Lab 4 STAT User Manual. User Manual. Prepared by: 411 Blue Team. Date: 12 December, Version 3

Running Head: Lab 4 STAT User Manual. User Manual. Prepared by: 411 Blue Team. Date: 12 December, Version 3 Running Head: Lab 4 STAT User Manual User Manual Prepared by: 411 Blue Team Date: 12 December, 2013 Version 3 Lab 4: STAT User Manual 2 Contents 1. Introduction (Christian)... 5 1.1 Background... 5 1.2

More information

Broadband internet connection ipad, Android tablet, Windows Surface RT or Pro, Chromebook Safari, Google Chrome, Microsoft Edge, Mozilla Firefox

Broadband internet connection ipad, Android tablet, Windows Surface RT or Pro, Chromebook Safari, Google Chrome, Microsoft Edge, Mozilla Firefox TABLE OF CONTENTS OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 INSTALLATION... 4 LOGGING INTO THE SOFTWARE... 4 STUDENT PASSWORDS... 5 TEACHER PASSWORDS... 5 GETTING YOUR STUDENTS STARTED... 6 OPEN LOGIN...

More information

facebook a guide to social networking for massage therapists

facebook a guide to social networking for massage therapists facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook

More information

International Journal of Advances in Engineering Research

International Journal of Advances in Engineering Research GRAPHICAL PASSWORD AUTHENTICATION SYSTEM WITH INTEGRATED SOUND SIGNATURE 1 Anu Singh, 2 Kiran Kshirsagar, 3 Lipti Pradhan 1 Student, Department of Computer Engineering, Pune University 2 Student, Department

More information

Recall Based Authentication System- An Overview

Recall Based Authentication System- An Overview Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S

More information

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES , pp.-04-08. Available online at http://www.bioinfo.in/contents.php?id=219 A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES ASHWINI FULKAR*, SUCHITA SAWLA, ZUBIN KHAN

More information

Inventory Management Software

Inventory Management Software Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2015 Sofia Galarza Governors State University Kevin Kovach Governors State University

More information

Windows 10 Tips and Tricks

Windows 10 Tips and Tricks Windows 10 Tips and Tricks You've made the move to Windows 10. The Start Menu has returned and its cloud integration is obvious, but most everything else is unfamiliar. This session will help you setup

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

A Model to Restrict Online Password Guessing Attacks

A Model to Restrict Online Password Guessing Attacks A Model to Restrict Online Password Guessing Attacks Aqib Malik, Dr. Sanjay Jamwal Department of Computer Science, Baba Ghulam Shah Badshah University, Rajouri, J&K, India Abstract Passwords are a critical

More information

Graphical Password Authentication: Methods and Schemes

Graphical Password Authentication: Methods and Schemes Graphical Password Authentication: Methods and Schemes Geeta M. Rane, Student (BE) of Computer Science and Engineering, Shri Sant Gadge Baba College of Engineering & Technology, Bhusawal, North Maharashtra

More information

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail GOOGLE APPS GETTING STARTED Page 02 Prerequisites What You Will Learn INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail DRIVE Page 07 Uploading Files to Google Drive Sharing/Unsharing

More information

ONLINE VIRTUAL TOUR CREATOR

ONLINE VIRTUAL TOUR CREATOR P a g e 1 ONLINE VIRTUAL TOUR CREATOR SCHOOL OF SCIENCE AND COMPUTER ENGINEERING CSCI 6838 TEAM 1 SPRING 2017 INSTRUCTOR DR. SADEGH DAVARI MENTOR MR. CLAUS NILSSON SUBMITTED BY: SUPRIYA HUBLI SOWMYA KONGARA

More information

How to Secure SSH with Google Two-Factor Authentication

How to Secure SSH with Google Two-Factor Authentication How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Shah Zaman Nizamani Waqas Ali Sahito Shafique Awan Department of IT Department of IT Department of Computer

More information

Contents ECOPS HOW-TO-GUIDE FOR PCSOs... 2

Contents ECOPS HOW-TO-GUIDE FOR PCSOs... 2 Contents... 2 ADMIN HOME... 4 HELP CENTRE... 4 PASSWORD... 4 ATTACHMENTS... 5 To add a file to be attached to a message... 5 HOW TO SEND A MESSAGE... 10 MESSAGE RESPONSES... 35 MESSAGE RATINGS... 42 INFORMATION

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

New Era of authentication: 3-D Password

New Era of authentication: 3-D Password New Era of authentication: 3-D Password Shubham Bhardwaj, Varun Gandhi, Varsha Yadav, Lalit Poddar Abstract Current authentication systems suffer from many weaknesses. Textual passwords are commonly used.

More information

An image edge based approach for image password encryption

An image edge based approach for image password encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5733 5745 Published online 16 January 2017 in Wiley Online Library (wileyonlinelibrary.com)..1732 RESEARCH ARTICLE An image edge based

More information

Table of Contents. I) Project Planning. User Analysis. III) Tasks Analysis. IV) Storyboard. V) Function Design. VI) Scenario Design.

Table of Contents. I) Project Planning. User Analysis. III) Tasks Analysis. IV) Storyboard. V) Function Design. VI) Scenario Design. FINAL REPORT Table of Contents I) Project Planning II) User Analysis III) Tasks Analysis IV) Storyboard V) Function Design VI) Scenario Design VII) Database VIII) Usability Questionnaire IX) System Version

More information

I. INTRODUCTION ABSTRACT

I. INTRODUCTION ABSTRACT 2018 IJSRST Volume 4 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Voice Based System in Desktop and Mobile Devices for Blind People Payal Dudhbale*, Prof.

More information

Introduction Building and Using Databases for historical research December 2012

Introduction Building and Using Databases for historical research December 2012 1. Introduction This is a non-tutor led course that can be completed at your own pace and at a time of your own choosing. We strongly recommend that you complete each module and its component sections

More information

MET CS 674 C1/EL Spring 2017: DATABASE SECURITY SYLLABUS

MET CS 674 C1/EL Spring 2017: DATABASE SECURITY SYLLABUS MET CS 674 C1/EL Spring 2017: DATABASE SECURITY Boston University Metropolitan College Boston Campus and elive Schedule Thursday 18:00-21:00 US Eastern Time Location Room B36 College of Arts and Sciences

More information

OCR Interfaces for Visually Impaired

OCR Interfaces for Visually Impaired OCR Interfaces for Visually Impaired TOPIC ASSIGNMENT 2 Author: Sachin FERNANDES Graduate 8 Undergraduate Team 2 TOPIC PROPOSAL Instructor: Dr. Robert PASTEL March 4, 2016 LIST OF FIGURES LIST OF FIGURES

More information

GEOG 487 Lesson 2: Step-by-Step Activity

GEOG 487 Lesson 2: Step-by-Step Activity GEOG 487 Lesson 2: Step-by-Step Activity In Lesson 2, we are going to create a website that contains interactive maps with datasets related to our project scenario described in the Introduction. We will

More information

Guide for Researchers: Online Human Ethics Application Form

Guide for Researchers: Online Human Ethics Application Form Guide for Researchers: Online Human Ethics Application Form What is Quest Quest is our comprehensive research management system used to administer and support research activity at Victoria University.

More information

ASSESSMENT COVER SHEET FOR Subject: COMPUTER PROGRAMMING Subject Code:BMM1312 PROJECT REPORT UMMU KULTHUM BINTI JAMALUDIN

ASSESSMENT COVER SHEET FOR Subject: COMPUTER PROGRAMMING Subject Code:BMM1312 PROJECT REPORT UMMU KULTHUM BINTI JAMALUDIN ASSESSMENT COVER SHEET FOR Subject: COMPUTER PROGRAMMING Subject Code:BMM1312 TYPE OF COURSEWORK: LECTURER: PROJECT REPORT UMMU KULTHUM BINTI JAMALUDIN TITLE: GGPAD (ANDRIOD APP INVENTING) DUE DATE: 14

More information

Farm Modernisation Programme Tranche 3

Farm Modernisation Programme Tranche 3 Farm Modernisation Programme Tranche 3 A step by step guide to the completion of an online application for funding under Tranche 3 of the Farm Modernisation Programme. 1 TABLE OF CONTENTS Introduction...

More information

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Int'l Conf. Security and Management SAM'17 273 Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Joshua Sherfield 1, Cheryl V. Hinds 2 1 Lawrence

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

University of Moratuwa

University of Moratuwa University of Moratuwa Guidelines on Documentation and Submission of Theses and Dissertations 1. INTRODUCTION A dissertation is an essay advancing a new point of view resulting from research as a requirement

More information

Michigan State University

Michigan State University Michigan State University Team Meijer Mobile Customer Satisfaction Application Project Plan Spring 2014 Meijer Staff: Jim Becher Chris Laske Michigan State University Capstone Members: Noor Hanan Ahmad

More information

Remote Security Camera Monitoring System

Remote Security Camera Monitoring System Remote Security Camera Monitoring System Submitted By: Zeeshan Ahmed 1118-FBAS/BSSE/F10 Muhammad Faizan 1379-FBAS/BSSE/F10 Supervised By: MR. Syed Muhammad Saqlain Assistant Professor Department of Computer

More information

Service Manager. Ops Console On-Premise User Guide

Service Manager. Ops Console On-Premise User Guide Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD Kruthi K 1, Kumuda B G 2, Nandhini N V 3, Mrs. R.Anitha 4 (Associate Professor) 1, 2, 3, 4 Department of Computer Science and Engineering, The National Institute

More information

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Young-Hwa An* * Division of Computer and Media Information Engineering, Kangnam University 111, Gugal-dong,

More information