Preview

Speech

Good Essays
Open Document
Open Document
472 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Speech
GRAPHICAL PASSWORD AUTHENTICATION WITH SOUND INTEGRATION

ABSTRACT: Here, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound frequency or time which he wants to be played at login time will be used to help the user to login. System showed very good performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. PROPOSED SYSTEM:

In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication.
Study says that sound signature or tone can be used to recall facts like images, text etc. In daily life we see various examples of recalling an object by the sound related to that object enters User ID and select one sound frequency which he want to be played at login time, a tolerance value is also selected which will decide that the user is legitimate or an imposter.
To create detailed vector user has to select sequence of images and clicks on each image at click points of his choice. Profile vector is created.

EXISTING SYSTEM:

In the existing system, Brostoff and sasse carried out an empirical study of pass faces, which illustrates well how a graphical password recognition system typically operates. Blonder-style passwords are based on cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by Passlogix Corporation, the user chooses several predefined regions in an image as his or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    An important use of sound is to confirm the correct or incorrect entry of a keystroke for the action that is desired and help reduce the…

    • 919 Words
    • 4 Pages
    Better Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Speech

    • 983 Words
    • 4 Pages

    Topic: Print advertisements should have to disclose within the ad itself if the models have been digitally altered. (For)…

    • 983 Words
    • 4 Pages
    Better Essays
  • Good Essays

    It takes a great deal of effort to encode things into memory. It does not always consist of repetition. There is a difference in an automatic response and something you have to work at. Drinking when thirsty is an automatic response, as opposed to riding a bicycle take concentration and you need to put the steps into memory. People tend to process information differently. Two individuals can watch the same video and gather different bits of information but both correctly state the main point of the video. Simply trying to remember things by simple repetition simply will not do. When choosing a password, people tend to choose something that has meaning to them so they will not forget it. I tend to use one of three passwords in different variations and I tend to forget them until I request a password reset.…

    • 311 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Speech

    • 823 Words
    • 4 Pages

    Greg Critser lives in Pasadena, California, and writes regularly for USA Today and the Los Angeles Times on issues of nutrition, health, and medicine. An authority on the subject of food politics, Critser has been interviewed by PBS and other media, and his writ­ing on obesity earned him a James Beard nomination for best feature writing in 1999. Embarrassed by a passing motorist who shouted "Watch it, fatso," Critser went on a diet and lost forty pounds. In the process he discovered that in America, weight is a class issue—fat and poor often go together. In exposing the heavy truths about American obesity, Critser gives our bloated nation a wake-up call. His books include Fat Land: How Americans Became the Fattest People in the World (2003) and Generation Rx: How Prescription Drugs Are Altering American Lives, Minds, and Bodies (2005).…

    • 823 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    * Common passwords containing name, birthdate, mobile number etc, that can be easily guessed by your friends, any known to you.…

    • 900 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Making Strong Passwords

    • 1119 Words
    • 5 Pages

    In today’s society, computer-based user accounts that require a username and password are very common in workplaces, schools, and homes for various applications. E-mail accounts, online bank accounts, social networking profiles, and many other instances of private information are all secured by user created passwords. With so much data at risk, it should be safe to assume people would generate passwords worthy of protecting their assets. However, a study performed by Burnett (2006) of millions of passwords revealed that the top five-hundred user passwords were significantly weak and at extremely high risk of theft. In order to properly safeguard user accounts and associated data, users must disregard sub-par password creating practices and learn to create unique, complex, and robust passwords.…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Individuals who use mnemonic devices have a greater ability to process information rather than those who do not. Using symbolic and auditory messages can help everyone to signal their memory recall process. Many people do not use mnemonic devices as a memorization tool and those are disadvantaged to the people who do. If everyone started to make an effort to use mnemonic devices, people could recall stored information much more efficiently throughout daily life.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    With remembered information, a user is required to enter a word or series of characters that match an entry in a security file in the computer. Most multiuser operating systems provide for a logon code, a user ID, and a password (all forms of remembered information) that all must be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. “A password usually if confidential, often known only by the user and the system administrator.” (Baker, 29-47).…

    • 414 Words
    • 2 Pages
    Good Essays