SlideShare a Scribd company logo
Project Team:
Deepak Yadav (1001031031)
Deepak Kumar (1001031029)
Arvind Yadav (1001031022)
Deepankar Ram (1001031032)
Table of Content
 Introduction

 Hardware Description
 Advantages and disadvantages
 Procedural steps for compilation, simulation and

dumping
 Conclusion
 References
Introduction
 The main aim of this project is to provide a security system

for illiterates.
 Since the images are more easily to recalling in comparison
to string of character.
 The images are displayed on touch screen ,one can enter
correct sequences of images get authenticated.
 Gives exposure about how touch screen interface in our
practical life.
 It can be easily installed in industries ,houses ,poultry form

for security .
Block Diagram
Hardware Description
The major building blocks of this project are:
 Regulated power supply with voltage regulator
 Micro controller

 Touch screen sensor
 Stepper motor
 Buzzer
Power supply
Microcontroller (PIC16F72)
1.
2.

3.
a.

The microcontroller used in this
project is PIC16F72.
The PIC families of microcontrollers
are
developed
by
Microchip
Technology Inc.
PIC microcontrollers:
PIC12CXXX 12/14-bit program word .

b.
c.
d.

PIC 16C5X 12-bit program word .
PIC16CXXX and PIC16FXXX 14-bit
program word .
PIC17CXXX and PIC18CXXX 16-bit
program word.
Technologies of Touch Screen
There are a number of types of touch screen
technology.
1. Resistive
2. Surface acoustic wave
3. Capacitive
4. Surface capacitance
5. Projected capacitance
6. Infrared
7. Strain gauge
8. Optical imaging
Working of Resistive Touch screens
1. Polyester Film
2. Upper Resistive
3.

4.
5.
6.

7.

circuit Layer
Conductive ITO
(Transparent Metal
Coating).
Lower Resistive
Circuit Layer
Insulating Dots
Glass/AcrylicSubstrat
-e
Touch screen
Continue….
The contact can close

the switch an generated
Voltages.
Touch screen controller
convert it into (X,Y)
Co-ordinate system and
hence the position of
touch is sense by
controller easily.
Stepper motor
 It is gear based motor.

 The stepper motor are connected

with ULN2803 driver.
When the correct password
entered the lock attached to the
motor is open.
Buzzer
Basically it works as sound source

based on piezoelectric diaphragm.
It is consists of electrode ,when dc
voltage applied across electrode
produces sound.
To switch on buzzer -high 1
To switch off buzzer -low 1
Advantages
 Easily recalling.
 Image based password is more secure than text based

password.
 Less vulnerable.
 Easily installation method.
Disadvantages
 Since it is totally based on password hence shoulder

surfing can reduce the security of system.
 Taken more prevention for touch screen safety.
Procedural steps for compilation,
simulation and dumping
 PIC compiler is used for programming.
 After programming run the programs, it generated a

.hex extension file.
 The .hex extension file are dumping into
microcontroller using PIC kit programmer.
Conclusion
 Image password is easily remember than string of






character password.
Image password is more secure than text based
password.
Less vulnerable by attacker.
Know the exposure of touch screen interface in
practical life.
Shoulder surfing reduce the security of system.
References
http://www.wikipedia.com
http://www.google.com
http://www.slideshare.net
Thank you
Ad

More Related Content

What's hot (20)

Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Shobha Rani
 
Graphical password
Graphical passwordGraphical password
Graphical password
sowji888
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
Weverify
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
Alexander Decker
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
Naveen Jakhar, I.T.S
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Suraj Swarnakar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Shobha Rani
 
Graphical password
Graphical passwordGraphical password
Graphical password
sowji888
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
Weverify
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
Alexander Decker
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 

Similar to Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav (20)

Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
Siang Wei Lee
 
Alcohol report
Alcohol reportAlcohol report
Alcohol report
chandan kumar
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
Vinny Chweety
 
embedded systems
embedded systemsembedded systems
embedded systems
Shanmuga Vadivu
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
Paras Jha
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptx
ManojG81
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
IRJET Journal
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android application
Avinash Vemula
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
IRJET Journal
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control report
engineerssolution
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years
Debasish Sahu
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full edit
Sayam Roy
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
1000kv technologies
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
IRJET Journal
 
Report (2)
Report (2)Report (2)
Report (2)
Shivangi Dwivedi
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
Anwar Al Ahdab
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentation
Rajendra Prasad
 
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghjdfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
fydfyd1
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
Siang Wei Lee
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
Vinny Chweety
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
Paras Jha
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptx
ManojG81
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
IRJET Journal
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android application
Avinash Vemula
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
IRJET Journal
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control report
engineerssolution
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years
Debasish Sahu
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full edit
Sayam Roy
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
1000kv technologies
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
IRJET Journal
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
Anwar Al Ahdab
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentation
Rajendra Prasad
 
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghjdfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
dfhgfhdfg.pdffjhfgjgfjgfjfghjghhjghjjgjghjghj
fydfyd1
 
Ad

Recently uploaded (20)

Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Ad

Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav

  • 1. Project Team: Deepak Yadav (1001031031) Deepak Kumar (1001031029) Arvind Yadav (1001031022) Deepankar Ram (1001031032)
  • 2. Table of Content  Introduction  Hardware Description  Advantages and disadvantages  Procedural steps for compilation, simulation and dumping  Conclusion  References
  • 3. Introduction  The main aim of this project is to provide a security system for illiterates.  Since the images are more easily to recalling in comparison to string of character.  The images are displayed on touch screen ,one can enter correct sequences of images get authenticated.  Gives exposure about how touch screen interface in our practical life.  It can be easily installed in industries ,houses ,poultry form for security .
  • 5. Hardware Description The major building blocks of this project are:  Regulated power supply with voltage regulator  Micro controller  Touch screen sensor  Stepper motor  Buzzer
  • 7. Microcontroller (PIC16F72) 1. 2. 3. a. The microcontroller used in this project is PIC16F72. The PIC families of microcontrollers are developed by Microchip Technology Inc. PIC microcontrollers: PIC12CXXX 12/14-bit program word . b. c. d. PIC 16C5X 12-bit program word . PIC16CXXX and PIC16FXXX 14-bit program word . PIC17CXXX and PIC18CXXX 16-bit program word.
  • 8. Technologies of Touch Screen There are a number of types of touch screen technology. 1. Resistive 2. Surface acoustic wave 3. Capacitive 4. Surface capacitance 5. Projected capacitance 6. Infrared 7. Strain gauge 8. Optical imaging
  • 9. Working of Resistive Touch screens 1. Polyester Film 2. Upper Resistive 3. 4. 5. 6. 7. circuit Layer Conductive ITO (Transparent Metal Coating). Lower Resistive Circuit Layer Insulating Dots Glass/AcrylicSubstrat -e Touch screen
  • 10. Continue…. The contact can close the switch an generated Voltages. Touch screen controller convert it into (X,Y) Co-ordinate system and hence the position of touch is sense by controller easily.
  • 11. Stepper motor  It is gear based motor.  The stepper motor are connected with ULN2803 driver. When the correct password entered the lock attached to the motor is open.
  • 12. Buzzer Basically it works as sound source based on piezoelectric diaphragm. It is consists of electrode ,when dc voltage applied across electrode produces sound. To switch on buzzer -high 1 To switch off buzzer -low 1
  • 13. Advantages  Easily recalling.  Image based password is more secure than text based password.  Less vulnerable.  Easily installation method.
  • 14. Disadvantages  Since it is totally based on password hence shoulder surfing can reduce the security of system.  Taken more prevention for touch screen safety.
  • 15. Procedural steps for compilation, simulation and dumping  PIC compiler is used for programming.  After programming run the programs, it generated a .hex extension file.  The .hex extension file are dumping into microcontroller using PIC kit programmer.
  • 16. Conclusion  Image password is easily remember than string of     character password. Image password is more secure than text based password. Less vulnerable by attacker. Know the exposure of touch screen interface in practical life. Shoulder surfing reduce the security of system.