Data Security Using Unique Code Generation and Micro Pattern Analysis with GUA CCP Technique

This project is concentrated on the data security using various authentication mechanisms. This is to validate the user to enter into the system and to access the database by using password. The password techniques will differ and it may be vary from stage to stage. If the password is correct then o...

Full description

Saved in:
Bibliographic Details
Published inInternational journal for research in applied science and engineering technology Vol. 11; no. 9; pp. 1321 - 1325
Main Author Parvathi, M.
Format Journal Article
LanguageEnglish
Published 30.09.2023
Online AccessGet full text

Cover

Loading…
More Information
Summary:This project is concentrated on the data security using various authentication mechanisms. This is to validate the user to enter into the system and to access the database by using password. The password techniques will differ and it may be vary from stage to stage. If the password is correct then only the user can get accessing rights. In this project three different types of techniques are analyzed. The project comprises of text password i.e. passphrase, image based password and graphical password for the three levels respectively. First one is unique one time password generation whenever the user gets into login. Second one is behavioral authentication. User has to upload their finger print at the time of registration. User has to import their finger print. If it matches with the database already stored then the access rights will be given to the user. Third one is graphical password. In this method CCP method is implemented. Set of images uploaded at the time of registration and a pixel coordinate is fixed on each image. At the time of login user has to enter the correct pixel coordinate in all the images then only user can get the accessing rights. In these methods nobody can crack all the three level passwords. In the first level it is dynamic password and in the second level unique identification password and in the third level multiple static key points are used as password. It is highly impossible to crack the third level authentication.
ISSN:2321-9653
2321-9653
DOI:10.22214/ijraset.2023.55838