Sie sind auf Seite 1von 9

CAPTCHA AS AGRAPHICAL PASSWORD-A NEW

SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS


A Thesis
Submitted in Partial fulfillment of the
Requirements for the award of the Degree of
MASTER OF TECHNOLOGY
In
SOFTWARE ENGINEERING
By
T.RANI
(13F01D2516)

Under the esteemed guidance


of
Mrs. M. LAKSHMI BAI
Asst. Prof.

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


ST.ANNS COLLEGE OF ENGINEERING & TECHNOLOGY
CHIRALA
2013-15

ST.ANNS COLLEGE OF ENGINEERING & TECHNOLOGY


CHIRALA
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE
This is to certify that the Thesis entitled, CAPTCHA AS AGRAPHICAL
PASSWORD-A

NEW

SECURITY

PRIMITIVE

BASED

ON

HARD

AI

PROBLEMS is being submitted by TEETLA RANI bearing Regd. No. 13F01D2516,


in partial fulfillment of the requirement for the award of the degree of M.Tech. in Software
Engineering, Jawaharlal Nehru Technological University Kakinada is a record of bonafide
work carried out by her under my guidance and supervision. The results presented in this
project have been verified and are found to be satisfactory.

Guide

Head of the Department

Mrs. M. LAKSHMI BAI

Dr. P. Harini

External Examiner

ACKNOWLEDGEMENTS

The successful completion of any task is not possible without proper suggestion, guidance
and environment. Combination of these three factors acts like backbone to my project titled
CAPTCHA AS AGRAPHICAL PASSWORD-A NEW SECURITY PRIMITIVE
BASED ON HARD AI PROBLEMS
I express my sincere thanks to my guide, Mrs. M. LAKSHMI BAI Asst.Prof for her
valuable suggestions during our course period, timely help, guidance and providing us with the
most essential materials required for the completion of this work.
I express my sincere thanks to my Head, Department of Computer Science and
Engineering, Dr. P. Harini for her valuable suggestions during our course period, timely help,
guidance and providing us with the most essential materials required for the completion of this
work.

I am thankful to all teaching and non-teaching staff of the Department of Computer


Science & Engineering for the cooperation given for the successful completion of my project.
I would like to thank our principal, Dr. P. Ravi Kumar for providing support and
simulating environment. I would like to express my gratitude to the Management of St. Anns
College of Engineering & Technology for providing me a pleasant environment and excellent
laboratory facilities.

T.Rani
(13F01D2516)

ABSTRACT

Many security primitives are based on hard mathematical problems. Using hard AI
problems for security is emerging as an exciting new paradigm, but has been underexplored. In this Project, it present a new security primitive based on hard AI problems,
namely, a novel family of graphical password systems built on top of Captcha technology,
which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of security problems altogether, such
as online guessing attacks, relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by
automatic online guessing attacks even if the password is in the search set. CaRP also offers
a novel approach to address the well-known image hotspot problem in popular graphical
password systems, such as Pass Points, that often leads to weak password choices. CaRP is
not a panacea, but it offers reasonable security and usability and appears to fit well with
some practical applications for improving online security.

LIST OF FIGURES
FIGURE No.

NAME OF THE FIGURE

PAGE No.

Fig 4.1.1

Block diagram

15

Fig 4.2.1.

context level

17

Fig 4.2.2.1.

Top level for user

17

Fig 4.2.2.2

top level for admin

18

Fig 4.2.3.1

Detailed level for user

18

Fig 4.2.3.2

Detailed Level for admin

19

Fig 4.3.3.

Entity Relationship Diagram

22.

Fig 4.4.1.

Class Diagram

24

Fig 4.4.2.1

Use case Diagram for Admin

25

Fig 4.4.2.2

Use case Diagram for user

26

Fig 4.4.3.1

sequence diagram

27

Fig 4.4.4.1

Collaboration Diagram

28

Fig 4.5.1

Activity diagram for Admin

29

Fig 4.5.2

Activity diagram for User

30

Fig 6.1

Test case Diagram

65

Fig 7.1

Home page

71

Fig 7.2

Admin Login Page

72

Fig 7.3

View requested users List

73

Fig 7.4

Registration Page

74

Fig 7.5

Selecting Image as Password

75

Fig 7.6

Login Page

76

Fig 7.7

Login through password

77

LIST OF TABLES

TABLE No.

NAME OF THE TABLE

PAGE No.

Tab 4.6.1

Registration

33

Tab 4.6.2

Admin Login

33

Tab 4.6.3

Uploading Images

33

Tab 4.6.4

Bank account details

34

Tab 4.6.5

Adding payees

34

Tab 4.6.6

Transferring amount

34

Tab 4.6.5

Wrong account

34

LIST OF ABBREVIATIONS

CARP

--

captcha as a graphical password

TABLE OF CONTENTS
Contents

Page No.

CERTIFICATE
ACKNOWLEDGEMENT
ABSTRACT
LIST OF FIGURES
LIST OF TABLES
LIST OF ABBREVIATIONS
CHAPTER 1 : INTRODUCTION ...........................1
1.1 Existing System .....................................................................................2
1.2 Proposed System ...................................................................................3

CHAPTER 2: LITERATURE SURVEY ........................................................4


2.1 Image processing ...................................................................................4
2.2 Purpose of Image Processing ..................................................................5
2.3 Idea of the Project....................................................................................5
2.3.1 Security through captcha .......................................................6

CHAPTER 3: SYSTEM ANALYSIS ..............................................................8


3.1 Module Description .............................................................................8
3.2 Hardware & Software Requirements ...................................................8
3.3 Feasibility Study ...................................................................................10

CHAPTER 4: SYSTEM DESIGN ...................................................................15


4.1 Block Diagram ....................................................................................15
4.2 Data Flow Diagram .............................................................................16
4.3 Entity Relationship Diagrams ...........................................................19

4.4 UML DIAGRAMS ............................................................................23


4.4.1. Use Case Diagram.................................................................24
4.4.2. Class Diagram .......................................................................25
4.4.3. Sequence Diagram .................................................................27
4.4.4. Activity Diagram ...................................................................28
4.4.5. Collaboration Diagram. .........................................................29

CHAPTER 5: IMPLEMENTATION ............................................................. 35


5.1 Technical Background .........................................................................35
5.2 Oracle .................................................................................................53
5.3 Technologies used ..............................................................................55
5.4 Implementation of Modules ...............................................................55
5.5 Coding ................................................................................................57
CHAPTER 6: SYSTEM TESTING. .................................................................64
6.1 Unit Testing .......................................................................................64
6.2 Integration Testing ............................................................................65
6.3 Acceptance Testing . .........................................................................68

CHAPTER 7: RESULTS ...................................................................................71


7.1 Screen Shots ......................................................................................71
CHAPTER 8: CONCLUSIONS .......................................................................78
CHAPTER 9: FUTURE SCOPE .......................................................................79
CHAPTER 10: REFERENCES ........................................................................80
CHAPTER 11:PUBLICATION .........................................................................81

Das könnte Ihnen auch gefallen