0% found this document useful (0 votes)
87 views

Graphical Password Authentication For Banking System

This document presents a project that proposes using a graphical password authentication technique for banking systems as an alternative to alphanumeric passwords. The objectives are to provide a more secure authentication method, improve system functionality through electronic filing, and automatically notify users of any issues. The proposed method uses a neuro-fuzzy technique to randomly generate color palettes for graphical passwords at each login to prevent shoulder surfing. The project details the challenges, architecture, algorithms, and hardware and software specifications of the system. References are provided on related graphical password and cloud computing authentication research.

Uploaded by

Harish hari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

Graphical Password Authentication For Banking System

This document presents a project that proposes using a graphical password authentication technique for banking systems as an alternative to alphanumeric passwords. The objectives are to provide a more secure authentication method, improve system functionality through electronic filing, and automatically notify users of any issues. The proposed method uses a neuro-fuzzy technique to randomly generate color palettes for graphical passwords at each login to prevent shoulder surfing. The project details the challenges, architecture, algorithms, and hardware and software specifications of the system. References are provided on related graphical password and cloud computing authentication research.

Uploaded by

Harish hari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

JERUSALEM COLLEGE OF ENGINEERING

(An Autonomous Institution)

DEPARTMENT OF INFORMATION TECHNOLOGY

GRAPHICAL PASSWORD AUTHENTICATION FOR BANKING SYSTEM

TEAM MEMBERS
GOPINATH R (310916205015)
HARISH D (310916205018)
RIYAZ MEERAN M A(310916205037)

PROJECT SUPERVISOR
OBJECTIVE

 To provide Graphical Password as alternative to the Conventional


Alphanumeric password techniques.

 To provide an efficient way of verification to achieve


confidentiality during the transaction.

 To provide additional feature to the system to improve its functionality


using Electronic Filing.

 To terminate the process in case of fraudulence.

 To send automatic notification to the user’s registered


mobile number incase of halts.
INTRODUCTION
 The prime concern of the bank is to achieve the trust of
the customers by securing the client details and the
transactions.

 The common method which is used by banking system is


alphanumeric password , but that are easily cracked .

The proposed system uses graphical password technique.

This graphical password technique overcomes the


shoulder surfing problem in textual password.

 Thus the graphical password authentication technique


uses session password.
CHALLENGES

Based on the survey, the systems are prone to attacks such as shoulder
surfing, dictionary attack, guessing attack

Retrieval of images from the database is tedious and time consuming.

Presenting more pictures on the screen , user cannot distinguish the


images from one another.

The recognition based technique requires more storage space.

Crackers can guess the image patterns easily.


PROPOSED METHOD

 The attacks in the system is overcame by neuro fuzzy


technique.
 The details about the transactions and the customer are stored
in the Gsuite server(Google cloud).
 Degree of searching and retrieval is increased.
 The images are secured using the pass point based technique.
 The confidentiality of the system is maintained by E-filing
method
ARCHITECTURE DIAGRAM

ROLES

NEW USER ADMINISTRATOR USER

REGISTRATION

LOGIN
AFTER
COMPLETING
DB STORED
TYPE USER MOBILE IT IN CLOUD
GENERATED THE NO SERVER
PIN NUMBER

AUTOMATICALLY
SEND VIA SMS OR GENERATE THEIR DETAILS
EMAIL

TYPE THE UPI PIN

STORED DATA INTO THE DATABASE


NUMBER

AUTOMATIC ACCESS PIN USING GRAPHICAL


RANDOMNESS COLOR FRAMEWORK
OF COLOR

VALID THE PIN THROUGH


CLOUD SERVER

AUTOMATICALLY
TRANSACTION TRANSACTION UPDATE
BLOCK THE
FAILED COMPLETED DATABASE
ACCOUNT
ALGORITHMS AND METHODS
NEURO FUZZY METHODOLOGY – COLOR PALETTE

 Integrated neuro Fuzzy systems combine the parallel


computation and learning abilities of neural networks.

 It can be trained to develop if-then fuzzy rules.

 The neuro fuzzy algorithm is used to randomizes the colors


each time.

 The structure of neuro fuzzy system is similar to a multi


layer neural network.

 The color changes randomly to avoid shoulder surfing.

 It also minimizes the repetition in the shuffling of the colors.


HARDWARE AND SOFTWARE SPECIFICATION

HARDWARE SPECIFICATION

• Processor - i3 Processor
• Speed - 2.0 GHz
• RAM capacity- 4 GB
• Hard Disk - 500 GB

SOFTWARE SPECIFICATION

• Operating System - Windows 2007


• Back End - My SQL 2005
• Front End - PHP MVC Framework
• Hosting server - Gsuite Server(Google Cloud)
REFERENCES
[1] Mudassar Ali Khan, Ikram Ud Din∗ Senior Member IEEE, Sultan Ullah
Jadoon, Muhammad Khurram Khan∗ Senior Member IEEE, Mohsen Guizani
Fellow IEEE, and Kamran Ahmad Awan, “g-RAT | A Novel Graphical
Randomized Authentication Technique for Consumer Smart Devices” , 2018
IEEE.
[2] Miss.Swati Tidke, Miss Nagama Khan, Miss.Swati Balpande Computer
Engneering, RTM nagpur university, M.I.E.T Bhandara, “Password
Authentication Using Text and Colors “, ISSN 2278 – 0882 Volume 4, Issue 3,
March 2015
[3] M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, “Certificate based (linkable)
ring signature,” in Proc. Inf. Security Practice Experience Conf., 2007, pp. 79–
92.
[4] M. H. Au, Y. Mu, J. Chen, D. S. Wong, J. K. Liu, and G. Yang, “Malicious
KGC attacks in certificateless cryptography,” in Proc. 2nd ACM Symp. Inf.,
Comput. Commun. Security, 2007, pp. 302–311.

[5] S. Habib, S. Hauke, S. Ries, and M. Mhlhuser, “Trust as a Facilitator in cloud


computing: a survey,” Journal of cloud computing, vol. 1, no. 1, 2012.

You might also like