- 1. Kai. Sushilatai Gaikwad Bahuuddeshiya SansthasBHARAT RATN
INDIRA GANDHI COLLEGE OFENGINEERING,KEGAON,SOLAPURSEMINARONUnder
the Guidance OfProf. Sneha TirthPresented ByNitesh Kumar sahMayur
BulbuleVasim InamdarManoj Kamshetti
2. Contents Introduction Project Objective Requirement Analysis
System Architecture Modules Installation & Maintenance
Conclusion Future Scope 3. Introduction Textual password, the most
common method usedfor authentication. Textual password are
vulnerable to eves dropping,dictionary attacks, social engineering
& shouldersurfing. Graphical password, an alternative
technique. 4. Projective Objective To develop secure system To
avoid eves dropping. To avoid shoulder surfing. To avoid dictionary
attack. To avoid brute force attack. 5. Requirement
AnalysisSoftware Requirement Operating System: Windows XP, Window
7, Windows Vista Jdk 1.6 Net bean IDE 7.1 MySqlServer 5.5.28
MySqlGuiTools 5.0 Programming Language : JavaHardware Requirement
Processor : Pentium 4 Hard Disk : 1 GB Ram : 512 MB 6. System
ArchitectureUser RegistrationPoint Selection onImageColor Chart
Table1Table2Figure :- Registration Diagram 7. User Color
AuthenticationImage Pont AuthenticationSMS
AuthenticationTable1Table2Figure :- Authentication DiagramSystem
Architecture 8. ModulesFigure :- Registration Page 9. ModulesFigure
:- Image Selection 10. Figure :- Selected ImageModules 11.
ModulesFigure :- Rating of colors 12. Figure :- Login PageModules
13. ModulesFigure :- Login for Color Rating 14. Figure :- User Data
15. Installation and MaintenanceInstallation to be done Install the
JDK 1.7 Install Net Beans IDE 7.1 MySQL server 5.5.0 MysqlGuiTool
5.0.5Maintenance Connectivity Database 16. Conclusion It is more
securable ascompared to theexisting system. It is not vulnerable
toshoulder surfing, evesdropping, brute forceattack.More sites More
passwords More forgetting More repeated credentialsIncreased
exposure to hackingand cloning 17. Future Scope It can be used in
PDAs. Folder locker or an external gateway authentication toconnect
the application to a database or an externalembedded device.