0% found this document useful (0 votes)
24 views10 pages

Group Front Page

The mini project report focuses on 'Graphical Password Authentication' as an alternative to traditional text-based passwords, emphasizing its design, implementation, and evaluation. It discusses various graphical password schemes, their strengths and weaknesses, and presents findings on their security and user experience. The report is submitted by four students from the Department of Computer Science and Engineering under the guidance of Dr. M. Amit Kumar for the B.Tech degree.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

Group Front Page

The mini project report focuses on 'Graphical Password Authentication' as an alternative to traditional text-based passwords, emphasizing its design, implementation, and evaluation. It discusses various graphical password schemes, their strengths and weaknesses, and presents findings on their security and user experience. The report is submitted by four students from the Department of Computer Science and Engineering under the guidance of Dr. M. Amit Kumar for the B.Tech degree.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

A

MINI PROJECT REPORT


ON

GRAPHICAL PASSWORD AUTHENTICATION


Submitted in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
in

COMPUTER SCIENCE AND ENGINEERING


By

M.PAVAN KUMAR -- 21Q91A05M9


CH.HARINADH -- 21Q91A05K5
B.RAVALIKA -- 21Q91A05K1
V.ROHAN -- 21Q91A05Q3

Under the guidance of


Dr.M.AMIT KUMAR
Assistant Professor

2024-2025

i
This is to certify that the Mini Project report on “Graphical Password Authentication ”
is successfully done by the following students of Department of Computer Science &
Engineering of our college in partial fulfilment of the requirement for the award of B.Tech degree
in the year 2024-2025. The results embodied in this report have not been submitted to any other
University for the award of any diploma or degree.
M.PAVAN KUMAR – 21Q91A05M9
CH.HARINADH -- 21Q91A05K5
B.RAVALIKA -- 21Q91A05K1
V.ROHAN -- 21Q91A05Q3

Submitted for the viva voice examination held on:

INTERNAL GUIDE HOD


Dr.M.Amit Kumar Dr.M.Manjunath
Asst.Professor Professor

Internal Examiner External Examiner

ii
DECLARATION

We, the final year students are hereby declaring that the mini project report entitled
“Graphical Password Authentication” has done by us under the guidance of Dr.M.Amit
Kumar Assistant Professor, Department of CSE is submitted in the partial fulfillment of the
requirements for the award of the degree of BACHELOR OF TECHNOLOGY in
COMPUTER SCIENCE AND ENGINEERING. The Results embedded in this project report
have not been submitted to any other University or institute for the award of any degree or
diploma.

Signature of the candidate:


M.PAVAN KUMAR (21Q91A05M9)
CH.HARINAD (21Q91A05K5)
B.RAVALIKA (21Q91A05K1)
V.ROHAN (21Q91A05Q3)

DATE:
PLACE: Maisammaguda

iii
ACKNOWLEDGEMENT

First and foremost, we would like to express our immense gratitude towards our institution
Malla Reddy College of Engineering, which helped us to attain profound technical skills in the
field of Computer Science & Engineering, there by fulfilling our most cherished goal.

We are pleased to thank Sri Ch. Malla Reddy, our Founder, Chairman MRGI, Sri Ch.
Mahender Reddy, Secretary, MRGI for providing this opportunity and support throughout the
course.

It gives us immense pleasure to acknowledge the perennial inspiration of Dr. M. Ashok our
beloved principal for his kind co-operation and encouragement in bringing out this task.

We would like to thank Dr. T. V. Reddy our vice principal, Dr. M.Manjunath HOD, CSE
Department for their inspiration adroit guidance and constructive criticism for successful
completion of our degree.

We would like to thank Dr.M.Amit Kumar Assistant Professor our internal guide, for his
valuable suggestions and guidance during the exhibition and completion of this project.

Finally, we avail this opportunity to express our deep gratitude to all staff who have
contribute their valuable assistance and support making our project success.

M.PAVAN KUMAR (21Q91A05M9)


CH.HARINAD (21Q91A05K5)
B.RAVALIKA (21Q91A05K1)
V.ROHAN (21Q91A05Q3)

iv
ABSTRACT

In an era where digital security is paramount, traditional text-based passwords are


increasingly vulnerable to breaches and unauthorized access. Graphical password
authentication, which leverages images and patterns instead of alphanumeric characters,
offers a promising alternative to enhance security and usability. This paper explores the
design, implementation, and evaluation of graphical password systems, highlighting their
strengths and weaknesses compared to conventional methods. We delve into various
graphical password schemes, such as click-based, image selection, and draw-a-secret (DAS),
analyzing their resistance to common attacks like shoulder surfing, guessing, and phishing.
Through user studies and empirical analysis, we assess the memorability, convenience, and
overall effectiveness of graphical passwords. Our findings indicate that while graphical
passwords can significantly improve security and user experience, they also present unique
challenges that must be addressed. This research contributes to the understanding of graphical
password systems and lays the groundwork for developing more secure and user-friendly
authentication mechanisms in the digital age.

v
TABLE OF CONTENTS

CERTIFICATE ii
DECLARATION iii
ACKNOWLEDGEMENT iv
ABSTRACT v
TABLE OF CONTENTS vi
LIST OF FIGURES viii
LIST OF SCREENSHOTS ix
LIST OF ABBREVIATIONS x

CHAPTER 1: INTRODUCTION
1.1 Introduction 2
1.2 Objective 3
1.3 Methodology Adopted 3

CHAPTER 2: LITERATURE SURVEY


2.1 Literature survey 6
CHAPTER 3: SYSTEM ANALYSIS

3.1 Existing System 9


3.2 Drawbacks 9
3.3 Proposed system 11
3.4 Advantages 11
3.5 System Requirements 13
3.6 Feasibility study 14
CHAPTER 4: SYSTEM DESIGN
4.1 System Architecture 17
4.2 Modules 17
4.3 UML Diagrams 18

vi
CHAPTER 5: SYSTEM IMPLEMENTATION

5.1 What is python 24


5.2 History of Python 28
5.3 What is Machine Learning 28
5.4 Python development steps 35
5.5 Modules used in Python 37
CHAPTER 6: TESTING
6.1 Testing 47
6.2 Testing Methodologies 45

CHAPTER 7: RESULTS
7.1 Screenshots 51

CHAPTER 8: CONCLUSION
8.1 Conclusion 58

CHAPTER 9: FUTURE ENHANCEMENTS


9.1 Future enhancements 60

REFERENCES 61

vii
LIST OF FIGURES

Figure Name of the Figure Page


No No
4.1.1 System Architecture 17
4.3.1 Use Case Diagram 19
4.3.2 Class Diagram 20
4.3.3 Sequence Diagram 21
4.3.4 Collaboration Diagram 22

viii
LIST OF SCREENSHOTS

Figure Name of Screenshot Page


NO No

5.5.1 Python 40
7.1.1 User Interface 51
7.1.2 New User Signup Screem 51
7.1.3 Registry credentials 52
7.1.4 Registration Confirmation. 52
7.1.5 User Profile Detail -Username 53
7.1.6 User Profile Detail -Password 53
7.1.7 Login Service Provider 54
7.1.8 Password Assistance 54
7.1.9 Password Reset Screen 55
7.1.10 Password Configuration 55
7.1.11 Password Update Confirmation 56

LIST OF ABBREVIATIONS

S.NO Short Form Full Form


1. ML Machine Learning
2. UML Unified Modelling Language
3. JS Java Script

ix
4. CSS Cascading Style Sheets
5. OTP One Time Password
6. DB Database
7. UI User Interface
8. TCP Transmission Control Protocol

You might also like