Three Level Image Password Authentication System
1.Background/ Problem Statement
A security breach can be a threat to national confidential data or the private data of an organization or a person. The most popular kind of password used for security purposes is text-based. However, these passwords can be easily breached and one may lose his/her private data to the wrong hands. With the rise in cyber-crime, security threats related to logins & accesses have become a major concern. Also, the use of single security authentication is not sufficient enough to keep you protected from cyber threats.
Hence to increase the security level we have developed a Three-Level Password Authentication system that will make sure that only the authorized person will have access to the system or data. This system contains three-level logins having three different kinds of password systems. The project comprises a passphrase, image-based segmentation password, and graphical password. The password difficulty increases with each level making the access more secured. In this way, this PHP-based Three Level Authentication System will help the users to keep their data safe from any hackers & cyber threats.
- Working of the Project
In this System, while user registration, user will be asked to setup three level password for security purpose first level is the conventional password system i.e. texted password, second level is image-based password and third level is graphical password method. For Login User need to Login to check the security by entering three level password-authentication. As user start entering password, the first level will authenticate the user by matching the data store in the database while registration & similarly, second & third level will authenticate the entered password by user.
3)Advantages
- This system uses only security purpose, it uses to all security place.
- Provides strong security against bot attacks or hackers.
- Hackers are not very easily to hack the security, because their levels are more useful this concept.
- Any hacker if in the extreme case, suppose (although difficult) will cross through the above two mentioned security levels, will definitely not be able to cross the third security level.
- Users can set or upload their own images.
- The user will be authenticated as an authentic user, and will be awarded access to the stored information, only after crossing the three security levels.
- Protects systems vulnerable to attacks.
- The system is user-friendly and has simple interface.
5)System Description
This system is having 4 Modules
- Registration
- User first need to register by filling up all the details to access the system.
- Password Set-up
- While registration, user will be asked to set-up three level password for security purpose.
- Following are the three levels for password set-up.
- First Level: The first level is a conventional password system i.e. text-based password or a passphrase.
- Second Level: The second level is an image-based password.
- Third Level: The third level is a graphical password method.
- Login
- After registrations, user need to login to check the security of the system by entering three level password-authentication.
- Authentication
- As user start entering the password, the first level will authenticate the user by matching the data store in the database while registration.
- Similarly, second & third level will authenticate the entered password by user.
6)Project Life Cycle
The waterfall model is a classical model used in system development life cycle to create a system with a linear and sequential approach. It is termed as waterfall because the model develops systematically from one phase to another in downward fashion. The waterfall approach does not define the process to go back to the previous phase to handle changes in requirement. The waterfall approach is the earliest approach that was used for software development
7)System Requirement
- Hardware Requirement
- Laptop or PC
- I3 processor system or higher
- 4 GB RAM or higher
- 100 GB ROM or higher
- Software Requirement
- Laptop or PC
- Windows 7 or higher
- Wamp or Xamp server
- PHP MySQL
8)Limitation/Disadvantages
- The only disadvantage is if users forget the password, it cannot retrieve it.
9)Application
- It can be used by individuals or over the internet to protect the system.
- The system can be used in website registrations.
9)Reference
- https://ieeexplore.ieee.org/document/5522747