Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER-I
1. INTRODUCTION
CHAPTER-II
KGISL Institute of Information ManagementPage 2
2. SYSTEM ANALYSIS
2.1 STUDY ON PROPOSED SYSTEM
2.1.1 DEFINING THE PROBLEM
Access to computer systems is most often based on the use of alphanumeric passwords.
Though, users have difficulty remembering a password that is long and random-appearing.
Instead, they create short, simple, and insecure passwords. Graphical passwords have been
designed to try to make passwords more memorable and easier for people to use and, therefore,
more secure. Using a graphical password, users click on images rather than type alphanumeric
characters.
Graphical password is an authentication system that works by having the user select from
images in a specific order, presented in a graphical user interface (GUI).It can be used in web
login application, atm machines, and mobiles devices.
2.1.2 DEVELOPING SOLUTION STRATEGIES
A password is a secret that is shared by the verifier and the customer. Passwords are
simply secrets that are provided by the user upon request by a recipient. They are often stored
on a server in an encrypted form so that a penetration of the file system does not reveal password
lists. Passwords are the most common means of authentication because they do not require any
special hardware. Typically passwords are strings of letters and digits, i.e. they are alphanumeric.
Such passwords have the disadvantage of being hard to remember. Weak passwords are
vulnerable to dictionary attacks and brute force attacks where as Strong passwords are harder to
remember
Access to computer systems is most often based on the use of alphanumeric passwords.
Though, users have difficulty remembering a password that is long and random-
characters.
Dictionary attacks are infeasible
On-average-millions of years to break into the system
Easy to memorize
Key-space is unlimited
MODULES
1. Pattern Selection
2. Picture Selection
3. Registration
4. Login
MODULE DESCRIPTION
1. Pattern Selection
In Pattern Selection phase the user will be choose the patterns such as POINT, LINE,
and ELLIPSE. They may select the pattern depending upon their capabilities and also they
have a choice to select any one of the pattern or combined together. But they should choose one
pattern.
2. Picture selection
Picture selection phase there are two ways for selecting picture password authentication.
1. User defines pictures: Pictures are selected by the user from the hard disk or any other image
supported devices.
Hard Disk
: 40 GB.
Floppy Drive
: 1.44 Mb.
Monitor
: 14 Colour Monitor.
Mouse
: Optical Mouse.
RAM
: 512 Mb.
Keyboard
: 101 Keyboards.
Language
Java
: SQLite
Java Applets
Java applets are pieces of java code that are embedded in HTML document using the
applet tag. When the browser encounters such code it automatically download it and execute it.
Robust
Secure
Portable
Effort=2.4(KLOC)1.05
Time=2.5(Effort)0.38
=2.5(10)0.38
Time=6 Months
Cost= 5.4*10,000
=
54,000
Group Size=Effort/Time
=10/6
Group Size= 2 Persons
The system has the capability for easy integration with other systems.
The user can access from anywhere
It is a platform independent.
New modules can be added to the existing system with less effort
CHAPTER-III
KGISL Institute of Information ManagementPage 10
A Data Flow Diagram is a graphical technique that depicts information flow and
transforms that are applied as data move from input to output. The DFD is used to represent
increasing information flow and functional details. A level 0 DFD, also called a fundamental
system model or a Context Model, represents the entire software elements as a bubble with input
and output indicated by incoming and outgoing arrows respectively. Additional process and
information flow parts are represented in the next level i.e., Level 1 DFD. Each of the processes
KGISL Institute of Information ManagementPage 11
Arrow
Circles
Open End Box
Squares
Arrow
An arrow identifies the data flow in motion. It is a pipeline through which information is
flown like the rectangle in the Flow Chart.
Data may flow a source to a processor and from a data store or process. An arrow line
depicts the flow, with the arrowhead pointing in the direction of flow.
Circle
Circle stands for process that converts the data into information
A process represents transformation where incoming data flow is changed into outgoing
flows.
Rectangle
Pending
Tasks
The module and forms in the Session Authentication Password Using Image represents
in the below structure chart.
Pattern selection
Picture selection
Three patterns
Select various
pictures from
gallery
Line
Registration
Point
circle
Login
Verify the
registered pattern
is same or not
COLUMN NAME
DATA TYPE
CONSTRAINT
Vch_picture_id
Varchar(10)
Primary Key
Blob_pictures
Blob
Not Null
DESCRIPTION
Auto generation of
picture id for each
pictures
Storing pictures
COLUMN NAME
DATA TYPE
CONSTRAINT
Vch_user_id
Varchar(10)
Primary Key
Vch_picture_id
Varchar(10)
Int_position
Int(200)
Not Null
DESCRIPTION
Auto generation of
user id
Select picture id from
database
Indicate the position
Picture Selection
Registration
Picture Selection
Description: Select the Picture from gallery for register the pattern.
Input: Select the picture from Database.
Process: Store the picture in the table
Table: Tb_Master_Picture
Registration
Description: Register the pattern such as line, point, and circle in the image.
Input: Draw the pattern as per instruction.
Process: Store the pattern in the table
Table: Tb_Child_Registration
3.3.4 OUTPUT DESIGN
The output design presents the manipulated data to the end user. The output design acts as
medium of communication to the user by providing the desired data that may be either a stored
data fetched from the database or may be manipulated result displayed to the user for
confirmation before it is stored into the database.
The quality output is one, which meets the requirements of the end user and presents the
information clarity. In any system results of processing are communicated to the users and to
KGISL Institute of Information ManagementPage 19
System/Information Engineering
Analysis
Design
Code
Test
Behavior.
Performance &Interface.
Design
It focuses four distinct attributes of a program
Data structure
Software architecture
Interface representations &
Procedural (Algorithmic) Detail.
This process translates the requirements in to representation, and the design is documented.
Code generation
The design is translated in to machine readable form in code generation
Testing
The testing process focuses
Ensure that the Defined input will produce the actual Results.
Support
Software will undergo a change after it is delivered to the customer. Change will occur
because
CHAPTER IV
4. TESTING AND IMPLEMENTATION
4.1 SYSTEM TESTING
System testing is a type of testing to confirm that all code modules work as specified, and
that the system as a whole performs adequately on the platform on which it will be deployed.
System testing should be performed by testers who are trained to plan, execute, and report on
application and system code. They should be aware of scenarios that might not occur to the end
user, like testing for null, negative, and format inconsistent values.
System testing of software or hardware is testing conducted on a complete, integrated system to
evaluate the system's compliance with its specified requirements. A tester should be able to
repeat the steps that caused an error. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding software bugs.
4.1.1 TESTING AND METHODOLOGIES
Requirements Trace ability
As most interested portion is whether the system is meeting its requirements or not, for
that testing should be planned so that all requirements are individually tested. We checked the
output of certain combination of inputs, which gives desirable results, or not. Strictly stick to the
requirements specifications, gives the path to get desirable results from the system.
Tested Items
Tested items are like sending request to administrator, solving the sent request by the
Assignee, changing password of Assignee and student, sending user feedback, adding new
categories, adding new departments etc.
Testing Schedule
Testing has been done for each procedure back-to-back so that errors and omissions can
be found as early as possible. Once the system has been developed fully testing procedure is
followed on other machines, which differs in configuration.
Software Testing involves executing an implementation of the software with test data and
examining the outputs of the software and its operational behavior to check that it is performing
as required.
Different testing techniques are as described below:
Black-box Testing
In Black-Box Testing or Functional Testing, the output of the module and software, is
taken into consideration, i.e. whether the software gives proper output as per the requirements or
not. In another words, this testing aim to test a program's behavior against it specification
without making any reference to the internal structure of the program or the algorithms used.
Therefore the source code is not needed, and so even purchased modules can be tested. The
program just gets a certain input and its functionality is examined by observing the output.
This can be done in the following way:
Input Interface
Processing
Output Interface
The tested program gets certain inputs. Then the program does its job and generates a certain
output, which is collected by a second interface. This result is then compared to the expected
output, which has been determined before the test.
White-box Testing
White Box testing is used as an important primary testing approach. Here code is inspected
to see what it does; tests are designed to exercise the code. Code is tested using code scripts,
driver etc that are employed to directly interface with and drive the code.
Integration Testing
After the individual modules were tested out, the integration procedure is done to create a
complete system. This integration process involves building the system and testing the resultant
system for problems that arise from component interactions.
The top-down strategy is applied to validate high-level components of a system before design
and implementations have been completed.
TEST CASES
Test Cases using Unit Testing:- Picture Selection Module
Test Id
Test Condition
Test
Description
LF_01
LF_02
LF_05
User discard
the picture
User wants to
select other
picture choose
discard
LF_08
Test
Input
Data
Actual
Result
Expected
Result
System
accepts the
Picture
System should
accept the
picture
System does
not accepts
the picture
System shows
error message
Pass
System
accepts the
picture
System should
accept the
picture
Pass
System
discard the
selected
picture
System should
discard the
selected
picture
Pass
Result
Pass
Screen
Fig
Integration Testing
Test case for Integration Testing: Registration
Test
ID
Test
Condition
Test Description
IG_01
User
register
the pattern
IG_02
User
forget the
pattern
Actual
Result
Expected
Result
System
accepts the
data
System should
accepts the data
Pass
System does
not accept
the wrong
pattern
System should
show the pin
number page
Pass
Screen
Fig
Test
Input
Data
Result
Validation Testing
Validation testing ensures that the software has been build satisfies the customer
requirements. Validation testing is used to validate the fields in the form. It mainly focuses on
text field and numeric field. But in this project it validates pattern
Test
ID
Test
Test
Test Description
Input
Data
Actual
Result
Expected
Result
LF_01
Draw the
Pattern
System accept
only correct
pattern
System should
accept only
correct pattern
Pass
LF_02
Forget the
pattern
System shows
access denied
System should
show error
message
Pass
Condition
Screen
Result
Fig
Security
Session Management.
The active user must be aware of the benefits of using the system.
Their confidence in the software is built up.
application.
The user must know that for viewing the result, the server program should be running
in the server.
If the server object is not up running on the server, the actual processes wont take
place.
CHAPTER-V
5. CONCLUSION
The proposed Cued Click Points scheme shows promise as a usable and memorable
authentication mechanism. By taking advantage of users ability to recognize images and the
memory trigger associated with seeing a new image, CCP has advantages over Pass Points in
terms of usability. Being cued as each images shown and having to remember only one clickpoint per image appears easier than having to remember an ordered series of clicks on one
image.
CCP offers a more secure alternative to Pass Points. CCP increases the workload for
attackers by forcing them to first acquire image sets for each user, and then conduct hotspot
analysis on each of these images.
5.2 BIBLIOGRAPHY
BOOKS
WEB REFERENCES
www.stackoverflow.com,
www.tutorialpoin.com
www.google.co.in
www.androidtutorial.com
www.android.com,
www.androidschool.com
ANNEXURES
1. INPUT DESIGN
Home Page
2. OUTPUT DESIGN
Login
3. SOURCE CODE
HomeChooser
package com.TwinBlade.PicturePassword;
import android.app.Activity;
import android.app.AlertDialog.Builder;
import android.content.ComponentName;
import android.content.Context;
import android.content.DialogInterface;
import android.content.DialogInterface.OnClickListener;
import android.content.Intent;
import android.content.SharedPreferences;
import android.content.SharedPreferences.Editor;
KGISL Institute of Information ManagementPage 37
3. ABBREVATIONS
CCP
SDK
DFD
API
GUI