Aim:
Ā Ā Ā Ā Ā Ā Ā The main aim of this project is to develop user-friendly mobile applications ensuring data protection and high security.
Synopsis:
Ā Ā Ā Ā Ā Ā Ā The rapid and continuous deployment of mobile devices around the world has been motivated not only by the high technological evolution that allows the communication and use of social media in real time, the two most prevalent user authentication approaches have been Personal Identiļ¬cation Numbers and One-Time Passwords. In our proposed approach, users draw each digit of the password on the touch screen of the device instead of typing them as usual. The handwritten digits can be first recognized using for example an Optical Character Recognition. After this first authentication stage, the biometric information of the handwritten digits is compared in a second authentication stage to the enrollment data of the claimed user, comparing each digit one by one.
Existing System:
Ā Ā Ā Ā Ā Ā Ā Ā In existing system handwritten signature is one of the most socially accepted biometrics as it has been used in financial and legal agreements for many years and it also finds applications in mobile scenarios. These approaches are based on the combination of two authentication stages. The security system checks that the claimed user introduces its unique password correctly, and its behavioral biometric information is used for an enhanced final verification. The software for capturing handwritten numerical digits was developed in order to minimize the variability of the user during the acquisition process. The selection of a password that is robust enough for a specific application is a key factor. The number of digits that comprise the password depends on the scenario and level of security considered in the final application.
This effect has proven to be very important for many behavioral biometric traits such as the case of the handwritten signature.
Problem Definition:
- The amount of data requested to the user during the enrollment.
- The security level provided by the biometric system. From the point of view of the security system, it seems clear that the ideal case would be to have as much information of the user as possible.
Ā Proposed System:
Ā Ā Ā Ā Ā Ā Ā Our proposed system focus on providing user-friendly mobile applications ensuring data protection and high security. User should draw each digit of the password on the touch screen instead of typing them as usual. This way, the traditional authentication systems are enhanced by incorporating dynamic handwritten biometric information. Our system involves two stages of authentication the drawn pin should be similar to pin entered during registration process.
Ā Ā Ā Ā Ā Ā Ā Our second stage of authentication involves multiple options based on user preference where user can set multiple set of combinations. User can set second stage password as stroke, time, screen brightness or sensor based authentication system. The incorporation of biometric information on traditional password-based systems can improve the security through a second level of user authentication.
Advantages:Ā
- These approaches enable active or continuous authentication schemes, in which the user is transparently authenticated.
- Handwritten signature is one of the most socially accepted biometrics.
- The incorporation of biometric information on traditional password-based systems can improve the security through a second level of user authentication.
Algorithm:
- OCR
Reviews
There are no reviews yet.