Projectwale,Opp. DMCE,Airoli,sector 2
projectwale@gmail.com

Graphical Password Authentication

Graphical Password Authentication

ABSTRACT: –

 

The most common method of authenticating a user is to use alphanumeric usernames and passwords. It turned out that this method had significant disadvantages. For example, users tend to choose passwords that are easy to guess. On the other hand, when a password is hard to guess, it’s often hard to remember. To solve this problem, some researchers have developed authentication methods that use images as passwords. In this article, we take a comprehensive look at existing graphical password techniques. We classify these techniques into two categories: detection-based approaches and memory-based approaches. We discuss the advantages and limitations of the individual methods and point out future research directions. in this area. We also try to answer two important questions: “Are picture passwords as secure as text passwords?” and “What are the main issues in the design and implementation of graphical passwords?” This survey will be useful for researchers and information security professionals interested in finding alternatives to password authentication methods.

This article mainly focuses on the concept of a graphical password system. supports using click points with keys for authentication purposes. The basic concept of this system is simply the user’s interaction with a sequence of five images. The basic goal of this system is to achieve higher security using simple techniques that are easy for users to use and harder for hackers to guess. A graphical password verification system is the best alternative to a text password. The Keyed Click Point is the best alternative to the old graphical password system. The CCP is a combination of five click points on specific images. In this document, the CCP is associated with new technologies such as mobile phones and e-mail.

 

SYSTEM:-

 

  • user registration: when a new user wants to create an account they provide their personal details and select a set of images that will be used as their graphical password.
  • image encoding: the users selected images are encoded using a hashing algorithm to produce a unique digital signature the signatures are then stored on the blockchain along with the users personal details authentication process: when the user wants to log in they select their images from a pool of images presented on the screen in a specific order that they have previously set up these selections are then converted into a sequence of hashes that are compared against the hashes stored on the blockchain.
  • blockchain validation: if the hashes match the system validates the authenticity of the user and grants them access if the hashes do not match the user is denied access.
  • blockchain consensus: the blockchain network reaches a consensus on the validity of the authentication request through a consensus algorithm such as proof-of-work or proof-of-stake.
  • smart contract execution: once the authentication request is validated a smart contract is executed to grant access to the user the smart contract may also have additional rules and conditions for access such as requiring the user to have a certain amount of cryptocurrency in their wallet.
  • Audit Trail: all authentication requests and blockchain transactions are recorded on the blockchain providing an immutable audit trail of user activity

Overall, this system provides a secure and user-friendly alternative to traditional alphanumeric passwords for blockchain-based systems. By leveraging the inherent security and transparency of blockchain technology, the system can prevent unauthorized access and provide a tamper-proof record of user activity.

 

PROPOSED SYSTEM:-

 

Since our goal was to eliminate all the disadvantages associated with older methods of web authentication systems, hackers tend to crack passwords in the clear, and it was ridiculous for users to create multiple passwords for different accounts, which they will remember. In our system, we have developed an easy way to create a simple graphical password that is easy to remember, easy to recognize, and difficult for hackers to guess. In this system, we use an advanced click-point system with mail alert systems for potential security risks. After trying, we sent email notifications without knowing the hacker. CCP is a recognizable, clickable, graphical password verification system that is easy to use and difficult for a hacker to crack. CCP generation is based on the areas clicked by the user. the x and y axes. The system-generated password is created using the RGB values along the clicked pixels. To register, a user can select multiple images in almost any format or simply select an image from an existing database. Upon registration, the user receives a system-generated text password based on the RGB values of the selected click points on the image. Upon login, the user must enter this text password, which is highly secure with this second-level key click-point method. While the hacker tries to hack the system, after the third wrong click, a warning message is sent to the user’s mobile device to alert them.

 

MODULES:-

 

  • User Registration Module: This module would allow users to register for an account by providing their personal details and selecting a set of images to be used as their graphical password. The module would then generate a unique digital signature for each image and store them on the blockchain along with the user’s personal details.

 

  • Authentication Module: This module would handle the process of authenticating users when they log in by presenting a pool of images for the user to select from in a specific order. The module would then convert the selections into a sequence of hashes and compare them against the hashes stored on the blockchain.

 

  • Blockchain Validation Module: This module would validate the authenticity of the authentication request by checking the hashes on the blockchain. If the hashes match, the module would grant access to the user. If not, the module would deny access.

 

  • Consensus Module: This module would handle the consensus algorithm used to reach agreement among the nodes on the blockchain network regarding the validity of the authentication request.

 

  • Smart Contract Module: This module would execute the smart contract that grants access to the user if the authentication request is validated. The smart contract could also include additional rules and conditions for access, such as requiring the user to have a certain amount of cryptocurrency in their wallet.

 

  • Audit Trail Module: This module would record all authentication requests and blockchain transactions on the blockchain, providing an immutable audit trail of user activity.

 

These modules would work together to provide a secure and user-friendly alternative to traditional alphanumeric passwords for blockchain-based systems. By leveraging the inherent security and transparency of blockchain technology, the system can prevent unauthorized access and provide a tamper-proof record of user activity.

 

 

 

APPLICATION:-

 

the user opens the application and is prompted to register for an account by providing their personal details and selecting a set of images to be used as their graphical password the application generates a unique digital signature for each image and stores them on the blockchain along with the users personal details

 when the user logs in the application presents a pool of images for the user to select from in a specific order the user selects the images in the correct order and the application converts the selections into a sequence of hashes and compares them against the hashes stored on the blockchain the application then validates the authenticity of the authentication request by checking the hashes on the blockchain if the hashes match the application grants access to the user if not the application denies access the application uses a consensus algorithm to reach agreement among the nodes on the blockchain network regarding the validity of the authentication request if the consensus is reached the application executes the smart contract that grants access to the user if the authentication request is validated the application also records all authentication requests and blockchain transactions on the blockchain providing an immutable audit trail of user activity overall this application provides a secure and user-friendly alternative to traditional alphanumeric passwords for blockchain-based systems by leveraging the inherent security and transparency of blockchain technology the system can prevent unauthorized access and provide a tamper-proof record of user activity

 

HARDWARE AND SOFTWARE REQUIREMENTS:-

 

HARDWARE:-
  • Processor: Intel Core i3 or more.
  • RAM: 4GB or more.
  • Hard disk: 250 GB or more.
SOFTWARE:-

 

  • Windows Operating System.
  • Blockchain
  • Python
  • Flask,Anaconda ,Jupyter, Spyder

Leave a Reply

Your email address will not be published. Required fields are marked *