Project Guide – Ms. Ankita Singh,CSE Dept. NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Team Members 1.Pratishtha Singh (0115CS131069) 2.Prince Pranav (0115CS131071) 3.Vivek Singh (0115CS131118) Presentation for Minor Project Initiation Date : 15/02/16
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Project Guide –Ms. Ankita Singh,CSE Dept.
NRI INSTITUTE OF INFORMATION SCIENCE & TECHNOLOGYDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Team Members 1.Pratishtha Singh (0115CS131069)2.Prince Pranav (0115CS131071)3.Vivek Singh (0115CS131118) CSE-VI(B)
Presentation for Minor Project Initiation
Date : 15/02/16
IndexObjective of projectScope of ProjectReason for selecting the projectProcess Model usedFunctional RequirementsActivity Plan
AnalysisDesignCodingTesting Implementation
Specifications (Hardware/Software)Conclusion
Objective of IBAs IBAS provides high security web logging pages to prevent from malicious attack.
While we implementing this project a random question is generated according to the picture at the login page.
The user is authenticated only by correctly identifying the password images.
Scope of IBAs We implement the Image Based Authentication
System for CSE DEPT. NRI-IST BHOPAL.
Reason for selecting this project
The reason for selecting this project because IBAS provides high security in comparision with CAPTCHA.
Process Model UsedWaterfall Model
Functional Requirement IBAS should be able to –
o Firstly user fill his/her ID and Password.o Generate a randomly question according to image.o Select the correct image for user accessing accounts/files.o We have large database of the images with characters and numeric's.
FLOW CHARTUser input Article Random Question
GenerationSelect An Image
Which is Displayed
Grant Access To Use
YES
NO
Activity PlanS.N.
WORK BREAKDOWN STRUCTURE/MODULE
S
PROJECT TEAM MEMBER,
RESPONSIBLE
PROPOSED DATE FOR
COMPLETION
1 Analysis Vivek Singh,Pratishtha Singh
15/02/16
2 Design Pratishtha Singh , PrincePranav
22/02/16
3 Coding Prince Pranav, Pratishtha singh, Vivek Singh
28/03/16
4 Testing Prince Pranav 07/04/16
5 Implementation Pratishtha Singh,PrincePranav
11/04/16
Specification(Hardware/Software)
Hardware: 2GB RAM. i3 and i5 processor.
Software: Microsoft Visual Studio 2008 as an IDE. MySQL as Database. Adobe Photo Shop. C# as programming language. Operating System Window 7 and above.
Conclusion Image-based authentication technique have a wider applicability in future.
We design it in a more user-friendly way that helps to increase the password quality compared to CAPTCHA.
In this project we had proposed the concept of random picture and image generation techniques which is unable to crack by unauthorized user.