JERUSALEM COLLEGE OF ENGINEERING
(An Autonomous Institution)
DEPARTMENT OF INFORMATION TECHNOLOGY
GRAPHICAL PASSWORD AUTHENTICATION FOR BANKING SYSTEM
TEAM MEMBERS
GOPINATH R (310916205015)
HARISH D (310916205018)
RIYAZ MEERAN M A(310916205037)
PROJECT SUPERVISOR
OBJECTIVE
To provide Graphical Password as alternative to the Conventional
Alphanumeric password techniques.
To provide an efficient way of verification to achieve
confidentiality during the transaction.
To provide additional feature to the system to improve its functionality
using Electronic Filing.
To terminate the process in case of fraudulence.
To send automatic notification to the user’s registered
mobile number incase of halts.
INTRODUCTION
The prime concern of the bank is to achieve the trust of
the customers by securing the client details and the
transactions.
The common method which is used by banking system is
alphanumeric password , but that are easily cracked .
The proposed system uses graphical password technique.
This graphical password technique overcomes the
shoulder surfing problem in textual password.
Thus the graphical password authentication technique
uses session password.
CHALLENGES
Based on the survey, the systems are prone to attacks such as shoulder
surfing, dictionary attack, guessing attack
Retrieval of images from the database is tedious and time consuming.
Presenting more pictures on the screen , user cannot distinguish the
images from one another.
The recognition based technique requires more storage space.
Crackers can guess the image patterns easily.
PROPOSED METHOD
The attacks in the system is overcame by neuro fuzzy
technique.
The details about the transactions and the customer are stored
in the Gsuite server(Google cloud).
Degree of searching and retrieval is increased.
The images are secured using the pass point based technique.
The confidentiality of the system is maintained by E-filing
method
ARCHITECTURE DIAGRAM
ROLES
NEW USER ADMINISTRATOR USER
REGISTRATION
LOGIN
AFTER
COMPLETING
DB STORED
TYPE USER MOBILE IT IN CLOUD
GENERATED THE NO SERVER
PIN NUMBER
AUTOMATICALLY
SEND VIA SMS OR GENERATE THEIR DETAILS
EMAIL
TYPE THE UPI PIN
STORED DATA INTO THE DATABASE
NUMBER
AUTOMATIC ACCESS PIN USING GRAPHICAL
RANDOMNESS COLOR FRAMEWORK
OF COLOR
VALID THE PIN THROUGH
CLOUD SERVER
AUTOMATICALLY
TRANSACTION TRANSACTION UPDATE
BLOCK THE
FAILED COMPLETED DATABASE
ACCOUNT
ALGORITHMS AND METHODS
NEURO FUZZY METHODOLOGY – COLOR PALETTE
Integrated neuro Fuzzy systems combine the parallel
computation and learning abilities of neural networks.
It can be trained to develop if-then fuzzy rules.
The neuro fuzzy algorithm is used to randomizes the colors
each time.
The structure of neuro fuzzy system is similar to a multi
layer neural network.
The color changes randomly to avoid shoulder surfing.
It also minimizes the repetition in the shuffling of the colors.
HARDWARE AND SOFTWARE SPECIFICATION
HARDWARE SPECIFICATION
• Processor - i3 Processor
• Speed - 2.0 GHz
• RAM capacity- 4 GB
• Hard Disk - 500 GB
SOFTWARE SPECIFICATION
• Operating System - Windows 2007
• Back End - My SQL 2005
• Front End - PHP MVC Framework
• Hosting server - Gsuite Server(Google Cloud)
REFERENCES
[1] Mudassar Ali Khan, Ikram Ud Din∗ Senior Member IEEE, Sultan Ullah
Jadoon, Muhammad Khurram Khan∗ Senior Member IEEE, Mohsen Guizani
Fellow IEEE, and Kamran Ahmad Awan, “g-RAT | A Novel Graphical
Randomized Authentication Technique for Consumer Smart Devices” , 2018
IEEE.
[2] Miss.Swati Tidke, Miss Nagama Khan, Miss.Swati Balpande Computer
Engneering, RTM nagpur university, M.I.E.T Bhandara, “Password
Authentication Using Text and Colors “, ISSN 2278 – 0882 Volume 4, Issue 3,
March 2015
[3] M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, “Certificate based (linkable)
ring signature,” in Proc. Inf. Security Practice Experience Conf., 2007, pp. 79–
92.
[4] M. H. Au, Y. Mu, J. Chen, D. S. Wong, J. K. Liu, and G. Yang, “Malicious
KGC attacks in certificateless cryptography,” in Proc. 2nd ACM Symp. Inf.,
Comput. Commun. Security, 2007, pp. 302–311.
[5] S. Habib, S. Hauke, S. Ries, and M. Mhlhuser, “Trust as a Facilitator in cloud
computing: a survey,” Journal of cloud computing, vol. 1, no. 1, 2012.