Welcome to Final Year Projects!!
  • Newsletter
  • +91 90254 34960
  • Contact Us
  • FAQs
Select category
  • Select category
  • Artificial Intelligence
  • Biomedical
  • Block Chain
  • Cloud Computing
  • Cyber Security
  • Data mining
  • Deep Learning
  • Embedded Components
  • Generative AI
  • IoT
  • LORA
  • Machine Learning
  • Mini Projects
    • Embedded
    • Java
    • Matlab
    • Python
    • VLSI
      • pipeline
  • Natural Language Processing
  • Projects
    • Embedded
      • Agriculture
      • Artificial Intelligence(AI)
      • Biomedical
      • Digital Twin
      • Federated Learning
      • Image Processing
      • Internet of Things(IoT)
      • LoRaWAN
      • Python Interface
      • Raspberry PI
      • Robotics
      • Social Cause
      • Wireless Sensor Network
    • Java
      • Android
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • Cloud Computing
      • Cybersecurity
      • Data Mining
      • Internet of Things (IoT)
      • Machine Learning
      • Secure Computing
      • Social Cause
    • Matlab
      • Cryptography- Authentication
      • Cyber Security
      • Deep Learning
      • Digital Image Processing
      • Machine Learning
      • Natural Language Processing
    • Python
      • Agent AI
      • Blockchain
      • Cybersecurity
      • Deep Learning
      • Explainable AI
      • Federated Learning
      • Generative AI
      • GPT
      • Graph Neural Network
      • Machine Learning
      • OpenCV
      • Quantum Encryption
      • Reinforcement Learning
    • VLSI
      • Low Power VLSI Design
      • On-Chip Cryptography
      • Self Repairing Technology
  • Robotics
  • Secure Computing
Login / Register
0 Wishlist
0 Compare
1 item ₹5,500.00
Menu
1 item ₹5,500.00
Browse Categories
  • Java
  • Python
  • Embedded
  • Machine Learning
  • Mechanical
  • Matlab
  • VLSI
  • Raspberry PI
  • Artificial Intelligence
  • Home
  • Shop
    • PROJECTS
      • PROJECTS
        • Java
        • Python
        • Embedded
        • Matlab
        • VLSI
        • Mechanical
    • MINI PROJECTS
      • PROJECTS
        • Java
        • Python
        • Matlab
        • VLSI
        • Embedded
    • WORKSHOPS
      • Workshops
        • Python
        • Robotics
        • Industry Visit
        • Raspberry Pi
        • Image Processing
        • Mechanical Engineering
        • VLSI
        • Arduino
        • Matlab
        • Machine Learning
        • Embedded
        • Android
        • IoT
    • INTERNSHIPS
      • Internships
        • Python
        • Machine learning
        • Artificial intelligence
        • Web development
        • Android
        • IoT / internet of things
        • Cloud Computing
        • Digital Marketing
        • Big Data
  • Journal paper
  • Blog
  • About us
  • Contact us
“WIPE: A Novel Web-Based Intelligent Packaging Evaluation via Machine Learning and Association Mining” has been added to your cart. View cart
Click to enlarge
Home Projects Java RoundImage Towards Secure Graphical Password Authentication via Rounded Image Selection in IoT
Octascope: A Lightweight Pre-Trained Model for Optical Coherence Tomography
Octascope: A Lightweight Pre-Trained Model for Optical Coherence Tomography ₹5,500.00
Back to products
Assisted Vision: a Transformative Web App for the Visually Impaired
Assisted Vision: a Transformative Web App for the Visually Impaired ₹5,500.00

RoundImage Towards Secure Graphical Password Authentication via Rounded Image Selection in IoT

₹5,500.00

            Our study aims to develop a Multi-Factor Authentication System that integrates RoundImage-based graphical password verification with Time-based One-Time Password (T-OTP) authentication to ensure secure, reliable, and observation-resistant user login. The system is designed to enhance trust, prevent unauthorized access, and reduce credential-based attacks by providing a tamper-resistant, user-friendly, and highly secure authentication framework suitable for modern digital environments, including IoT and web applications.

Compare
Add to wishlist
Categories: Cyber Security, Cybersecurity, Java Tags: Block chain, Cyber security, Java Projects, Node JS, ReactJS, Springboot
Share:
  • Description
  • Reviews (0)
  • Software Download
  • Download Abstract
  • Shipping & Delivery
Description

Aim:

            Our study aims to develop a Multi-Factor Authentication System that integrates RoundImage-based graphical password verification with Time-based One-Time Password (T-OTP) authentication to ensure secure, reliable, and observation-resistant user login. The system is designed to enhance trust, prevent unauthorized access, and reduce credential-based attacks by providing a tamper-resistant, user-friendly, and highly secure authentication framework suitable for modern digital environments, including IoT and web applications.

Abstract:

              This project introduces a dual-layer authentication system integrating the RoundImage graphical password scheme with Time-based One-Time Password (T-OTP) verification. RoundImage improves security through multi-round image selection, reducing vulnerability to shoulder-surfing and brute-force attacks. Its fault-tolerant matching enhances usability, especially in lightweight IoT environments. To extend protection beyond knowledge-based credentials, the system adds T-OTP as a second factor. T-OTP generates time-synchronized dynamic codes, preventing unauthorized access even if images are observed. The hybrid model combines something you know (image rounds) with something you have (OTP token). A complete web-based prototype includes registration, graphical login, QR code generation, and OTP verification. Users follow a secure onboarding process with image credential creation and authenticator app setup. The system achieves low login error rates, strong memorability, and high resistance to observation attacks. Performance evaluation shows that combining RoundImage with T-OTP greatly reduces credential compromise risks. The architecture is optimized for distributed IoT environments with minimal computational overhead. Comparative analysis confirms improved security over single-factor graphical or password-only schemes. The interface design ensures usability for both novice and experienced users. Overall, the integration provides a secure, efficient, and user-friendly authentication method. The framework offers a foundation for enhancements such as adaptive security levels. This work demonstrates a balanced security–usability model using multi-round images and dynamic OTP verification.

Proposing System:

        The proposed system introduces a hybrid authentication model that combines the RoundImage graphical password scheme with Time-based One-Time Password (T-OTP) verification. RoundImage strengthens security by requiring multi-round image selection, making it extremely resistant to shoulder-surfing and brute-force attacks. Its built-in fault-tolerant matching ensures that users can authenticate successfully even if minor selection errors occur. The system further enhances protection with T-OTP codes, providing a dynamic second factor that refreshes every 30 seconds. This dual-layer approach ensures that even if graphical credentials are observed, attackers cannot access the system without the time-sensitive OTP. A web-based interface enables secure registration, QR code generation, image-based login, and OTP verification. The architecture is optimized for both web and IoT environments, ensuring lightweight and efficient performance. Through this integrated multi-factor design, the proposed system delivers high security without compromising user convenience.

Advantages:

            The proposed system provides strong protection against shoulder-surfing, brute-force attempts, and observation-based attacks. Users benefit from improved memorability due to visual-based authentication combined with fault-tolerant logic. The addition of T-OTP ensures a second independent security layer, significantly reducing unauthorized access risk. The interface remains simple and user-friendly, making the system suitable for all types of users. Overall, the hybrid model offers a secure, practical, and highly reliable authentication solution.

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “RoundImage Towards Secure Graphical Password Authentication via Rounded Image Selection in IoT” Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Software Download

You must be logged in to download the software.

Download Abstract

You must be logged in to download the abstract.

Shipping & Delivery
wd-ship-1
wd-ship-2

MAECENAS IACULIS

Vestibulum curae torquent diam diam commodo parturient penatibus nunc dui adipiscing convallis bulum parturient suspendisse parturient a.Parturient in parturient scelerisque nibh lectus quam a natoque adipiscing a vestibulum hendrerit et pharetra fames nunc natoque dui.

ADIPISCING CONVALLIS BULUM

  • Vestibulum penatibus nunc dui adipiscing convallis bulum parturient suspendisse.
  • Abitur parturient praesent lectus quam a natoque adipiscing a vestibulum hendre.
  • Diam parturient dictumst parturient scelerisque nibh lectus.

Scelerisque adipiscing bibendum sem vestibulum et in a a a purus lectus faucibus lobortis tincidunt purus lectus nisl class eros.Condimentum a et ullamcorper dictumst mus et tristique elementum nam inceptos hac parturient scelerisque vestibulum amet elit ut volutpat.

Related products

Bio Touch Pass Handwritten Passwords for Touch screen Biometrics
Compare

Bio Touch Pass: Handwritten Passwords for Touch screen Biometrics

Java, Android, Projects
₹4,500.00
Aim:         The main aim of this project is to develop user-friendly mobile applications ensuring data protection and high security.
Add to wishlist
Add to cart
Quick view
Compare

Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks

Java, Blockchain, Block Chain
₹5,500.00
Our study aims to develop a Blockchain-Enabled Secret Image Sharing (BC-SESIS) system that ensures secure, transparent, and tamper-proof storage and retrieval of sensitive image data, enhancing trust, privacy, and data integrity in wireless communication networks.
Add to wishlist
Add to cart
Quick view
Compare

Crypt Cloud+: Secure and Expressive Data Access Control for Cloud Storage

Java, Cloud Computing, Projects, Cloud Computing
₹5,500.00
Aim:        The main aim of this project is to provide integrity of an organization data which is in public
Add to wishlist
Add to cart
Quick view
Compare

Enabling Ternary Hash Tree based Integrity Verification for Secure Cloud Data Storage

Java, Data Mining, Projects, Data mining
₹5,000.00
Aim          The main aim of this project is to provide a reliable and secure cloud service and also increase
Add to wishlist
Add to cart
Quick view
GreenLand: A Secure Land Registration Scheme for Blockchain and AI-Enabled Agriculture
Compare

GreenLand: A Secure Land Registration Scheme for Blockchain and AI-Enabled Agriculture Industry 5.0

Java, Machine Learning
₹5,500.00
Our study aims to introduce a Blockchain-Enabled Land Registration System powered by AI to ensure secure, transparent, and tamper-proof land ownership records in agriculture, enhancing trust and reducing fraud in the agricultural sector.
Add to wishlist
Add to cart
Quick view
Compare

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery

Java, Cloud Computing, Projects, Cloud Computing
₹5,000.00
Aim            To allow the cloud to securely use multiple drug formula providers’ drug formulas to train Support
Add to wishlist
Add to cart
Quick view
Compare

Secured Electronic voting system using Blockchain Technology

Java, Blockchain, Projects, Block Chain
₹5,500.00
Aim:           The aim of this paper is to explore the potential of Ethereum’s smart contracts in creating secure, transparent,
Add to wishlist
Add to cart
Quick view
Compare

Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads

Java, Cloud Computing
₹5,500.00
Aim:                  To systematically analyze and identify security vulnerabilities in websites that allow users to upload files directly to cloud storage services, assess their real-world prevalence, and propose effective mitigation strategies to protect users, websites, and cloud infrastructure from potential abuse, data breaches, and operational disruptions.
Add to wishlist
Add to cart
Quick view

    Global Techno Solutions - GTS, started by young engineering graduates to overcome a problem they faced during their academic years. That is "Providing Solutions". They kept it as the motto for their company.

    • Phone: (+91) 90254 34960
    • Mail: sales@finalyearprojects.in
    Our Category
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    • Mechanical
    USEFUL LINKS
    • Privacy Policy
    • Returns
    • Terms & Conditions
    • Contact Us
    • Latest News
    • FAQ
    Mini Projects
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    Copyright Finalyearprojects.In 2024
    payments
    • Menu
    • Categories
    • Java
    • Python
    • Embedded
    • Machine Learning
    • Mechanical
    • Matlab
    • VLSI
    • Raspberry PI
    • Artificial Intelligence
    • Home
    • Shop
    • Blog
    • About us
    • Contact us
    • Wishlist
    • Compare
    • Login / Register
    Shopping cart
    Close
    Sign in
    Close

    Lost your password?

    OR
    Don't have an account? Signup

    No account yet?

    Create an Account

    HEY YOU, SIGN UP AND CONNECT TO GLOBAL TECHNO SOLUTIONS

    Be the first to learn about our latest trends and get exclusive offers

    Will be used in accordance with our Privacy Policy

    Shop
    0 Wishlist
    1 item Cart
    My account

    Back