Data Security Using Unique Code Generation and Micro Pattern Analysis with GUA CCP Technique
This project is concentrated on the data security using various authentication mechanisms. This is to validate the user to enter into the system and to access the database by using password. The password techniques will differ and it may be vary from stage to stage. If the password is correct then o...
Saved in:
Published in | International journal for research in applied science and engineering technology Vol. 11; no. 9; pp. 1321 - 1325 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
30.09.2023
|
Online Access | Get full text |
Cover
Loading…
Summary: | This project is concentrated on the data security using various authentication mechanisms. This is to validate the user to enter into the system and to access the database by using password. The password techniques will differ and it may be vary from stage to stage. If the password is correct then only the user can get accessing rights. In this project three different types of techniques are analyzed. The project comprises of text password i.e. passphrase, image based password and graphical password for the three levels respectively. First one is unique one time password generation whenever the user gets into login. Second one is behavioral authentication. User has to upload their finger print at the time of registration. User has to import their finger print. If it matches with the database already stored then the access rights will be given to the user. Third one is graphical password. In this method CCP method is implemented. Set of images uploaded at the time of registration and a pixel coordinate is fixed on each image. At the time of login user has to enter the correct pixel coordinate in all the images then only user can get the accessing rights. In these methods nobody can crack all the three level passwords. In the first level it is dynamic password and in the second level unique identification password and in the third level multiple static key points are used as password. It is highly impossible to crack the third level authentication. |
---|---|
ISSN: | 2321-9653 2321-9653 |
DOI: | 10.22214/ijraset.2023.55838 |