Image and Sound Based Authentication of User
Badgude Puja1, Ghorpade Hemlata2, Ghadge Yogita3, More Supriya4
1Badgude Puja, Student of COMP/IT (Dept.) S.P.C.O.E.,Otur, India.
2Ghorpade Hemlata, Student of COMP/IT (Dept.) S.P.C.O.E.,Otur, India.
3Ghadge Yogita, Student of COMP/IT (Dept.) S.P.C.O.E.,Otur, India
4More Supriya, Student of COMP/IT (Dept.) S.P.C.O.E.,Otur, India.
Manuscript received on March 02, 2014. | Revised Manuscript received on March 03, 2014. | Manuscript published on March 05, 2014. | PP: 191-192 | Volume-4 Issue-1, March 2014. | Retrieval Number: A2063034114/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: An image and sound based authentication of a user,it means we will authenticate the users of a system by a password that they entered through a sequence of images. And also having some special sound effects associated with a password. In the previous days, Pass Point was the technique,used to give image based password.But it requires five clicks on one image.This will take more memory to store the clicks and become easy for attacker to guess. To overcome that drawback CCP technique was developed which takes a sequence of five images and one click on each image. In addition, a user has to select sound signature with respective each click on image to easily recall the password. After addition a persuasive feature to CCP, we will get PCCP,which was used to address an issue of hotspots.While creating an image based password a complete image is dimmed except viewport area.A user has to click within this viewport.This viewport area can be repositioned randomly by using shuffle button. In the proposed work, we aimed to build more interactive, userfriendly and secure email system by creating strong and difficult password to guess by attacker.
Keywords: CCP and PCCP technique, system architecture, working of proposed system.