Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Dr. Sharavanakumar R, Yashaswini S, Deepak Raj N, Rakshitha E S, Chandana V
DOI Link: https://doi.org/10.22214/ijraset.2022.44434
Certificate: View Certificate
Personal identification numbers area unit used for user authentication and security. word verification exploitation PINs requires users to enter a physical PIN, which may be vulnerable to word breakage or hacking via shoulder water sport or thermal chase. PIN authentication with eye blinks entry techniques, doesn\'t leave any quite physical footprints behind and therefore provide a safer word entry possibility. This project presents a time period application to avoid. The personal identification numbers (PINS) is a common user authentication method for many applications, such as money transaction is online banking application and automatic teller machine(ATMs).unlocking personal devices ,event centers, shopping malls, Medical centers, schools/collages and opening Doors.
I. INTRODUCTION
Today, the net has entered into our daily life and all the services are stirred on-line. on the far side reading the news, trying to find info, and different threat free task, we have conjointly become acquainted with different risk-related work, such as paying victimization credit cards, checking/composing emails, on-line banking, and so on. whereas we have a tendency to appreciate its benefits, we have a tendency to square measure putting ourselves in danger. Eye trailing is that the method of police investigation the attention location across video frame. The motion of the attention relative to the pinnacle may also be additional interest. Eye trailing is vital for development and analysis areas like visual systems, psychological analysis, scientific discipline and products style. An eye trailing system is associate integration of a group of devices and associated programs for mensuration eye positions and movement, and correlating the results to a similar eye across images non inheritable consecutive over time.
II. LITERATURE REVIEW
A. Title: Advanced Safe PIN-Entry Against Human Shoulder- Surfing
Author: Ms. R Revathy, Mrs..Bama2
When users insert their passwords in a common area, they might be at risk of aggressor stealing their password. The PIN entry can be perceived by close by adversaries, more effectually in a crowded place. A new technique has been established to cope with this problem that is cryptography prevention techniques. Instead, there have been alternative approaches among them, the PIN entry was elegant because of its simplicity and accessibility. The basic BW method is focused to withstand a human shoulder surfing attack. In every round, a well ordered numeric keypad is colored at odd. A user who knows the accurate PIN digit can enter by pressing the separate color key. The IBW method is examined to be confidential against human nemesis due to the restricted cognitive abilities of humans. Also the IBW method is proven to be robust against any hacking attacks.
B. Title: Gaze-Based Password Authentication through Automatic Clustering of Gaze Points
Author: Justin Weaver, Kenrick Mock, Bogdan Hoanca
Researchers have proposed systems in which users utilize an eye tracker to enter passwords by merely looking at the proper symbols on the computer monitor in the appropriate order. This authentication method is immune to the practice of shoulder surfing: secretly observing the keystrokes of a legitimate user as he or she types a password on a keyboard. In this paper we describe the EyeDent system—in which users authenticate by looking at the symbols on an on-screen keyboard to enter their password. Existing eye-tracking based.authentication systems require the user to dwell or press a trigger when looking at each symbol.
???????C. Title: Gaze-Based Password Authentication through Automatic Clustering of Gaze Points
Author: Justin Weaver, Kenrick Mock, Bogdan Hoanca Here researchers have proposed one system i.e eye tracker to enter password by looking at the proper symbol on the computer monitor in an appropriate order. This type of authentication is used in order to avoid shoulder surfing. And in this paper we have discussed the Eye Dent System in which users authenticate by looking at the symbols on an server to enter their password. And in Eye Dent, gaze points are automatically clustered to determine the user selected symbols. Result from this investigation indicates that quick authentication is possible using this scheme.
???????D. Title: Drag-and-Type: A New Method for Typing with Virtual Keyboards on Small Touch screens
Author: Taekyoung Kwon, Sarang Na,and Sang-ho Park Some users are experiencing difficulties and also many errors in typing alphanumeric keys with their thumb. Because small touch screens are widely used in consumer electronics, such as smart phones and mobile electronic devices. However, typing on the small touch screen is still worth studying. In fact, smart phone users are experiencing difficulties and also many errors in typing alphanumeric keys with their thumbs because a small virtual keyboard even with the reduced set of touchable keys can only provide tiny size keys to the users. This paper studies a new style of typing method called Drag and-Type, which leverages the dragging action instead of direct tapping on the touch screen to ease more accurate typing on the small virtual keyboard virtual keyboard can only provide tiny size keys. Drag-and- Type, which provides the dragging action instead of direct tapping on the touchscreen. In existing system we are using keyboard from which the attacker can easily accessible the password by using shoulder-surfing and thermal attacks. Proposed method could be used for secure and accurate password entry.
III. PROPOSED SYSTEM
A. Problem Statement
The use of personal identification numbers (PINs) is a common user authentication method for many applications, such as money management in automatic teller machines (ATMs), approving electronic transactions, unlocking personal devices, and opening doors. Authentication is always a challenge even while using PIN authentication. According to European ATM Security, fraud attacks on ATMs increased by 26% in 2016 compared to that of 2015. Authorized user enters the code in public places make PIN entry vulnerable to password attacks, such as shoulder surfing as well as thermal tracking.
???????B. Methodology
The algorithm has four stages:
a. Haar Feature Selection: First step is to collect the Haar Features. A Haar feature considers adjacent rectangular regions at a specific location in a detection window, sums up the pixel intensities in each region and calculates the difference between these sums.
2. Creating Integral Images: Integral Images are used to make this super fast.
3. Adaboost Training: Among all these features we calculated, most of them are irrelevant. For example, consider the image below. Top row shows two good features. The first feature selected seems to focus on the property that the region of the eyes is often darker than the region of the nose and cheeks. The second feature selected relies on the property that the eyes are darker than the bridge of the nose. But the same windows applying on cheeks or any other place is irrelevant.
So how do we select the best features out of 160000+ features? This is accomplished using a concept called Adaboost which both selects the best features and trains the classifiers that use them. This algorithm constructs a “strong” classifier as a linear combination of weighted simple “weak” classifiers.
4. Cascading Classifiers
The cascade classifier consists of a collection of stages, where each stage is an ensemble of weak learners. The weak learners are simple classifiers called decision stumps. Each stage is trained using a technique called boosting. Boosting provides the ability to train a highly accurate classifier by taking a weighted average of the decisions made by the weak learners. Each stage of the classifier labels the region defined by the current location of the sliding window as either positive or negative. Positive indicates that an object was found and negative indicates no objects were found. If the label is negative, the classification of this region is complete, and the detector slides the window to the next location. If the label is positive, the classifier passes the region to the next stage. The detector reports an object found at the current window location when the final stage classifies the region as positive. The stages are designed to reject negative samples as fast as possible. The assumption is that the vast majority of windows do not contain the object of interest. Conversely, true positives are rare and worth taking the time to verify.
To work well, each stage in the cascade must have a low false negative rate. If a stage incorrectly labels an object as negative, the classification stops, and you cannot correct the mistake. However, each stage can have a high false positive rate. Even if the detector incorrectly labels a nonobject as positive, you can correct the mistake in subsequent stages. Adding more stages reduces the overall false positive rate, but it also reduces the overall true positive rate. Cascade classifier training requires a set of positive samples and a set of negative images. we must provide a set of positive images with regions of interest specified to be used as positive samples. we can use the Image Labeler to label objects of interest with bounding boxes. The Image Labeler outputs a table to use for positive samples. we also must provide a set of negative images from which the function generates negative samples automatically. To achieve acceptable detector accuracy, set the number of stages, feature type, and other function parameters.
???????5. LBPH Face Reorganization: Local Binary Patterns Histogram algorithm was proposed in 2006. It is based on local binary operator. It is widely used in facial recognition due to its computational simplicity and discriminative power.
The steps involved to achieve this are:
The LBPH algorithm is a part of opencv. Steps
being the intensity of the the neighbor pixel
Using median pixel value as threshold, it compares a pixel to its 8 closest pixels.
This way the following neighborhoods are captured:
LBPH can recognise both side and front faces and it is not affected by illumination variations which means that it is more flexible
IV. COMPARISON
The method for entering passwords can be made safe enough using latest method that is eye blinking .User’s can enter the password by blinking the eye at the suitable symbols in the appropriate order which will make the user’s is invulnerable to shoulder surfing(observation of user while typing his/her password through the keyboard
A. Proposed System
We are going to propose the three layer security scheme to avoid the shoulder surfing and thermal tracking attacks. Our system contains the three layers which are 1.Face reorganization, 2. Eye- blink verification, and 3.
OTP by combining all this layers we are going to implement our secure framework to avoid shoulder surfing and thermal tracking attacks. In our frame works there is no physical entry of password so we are completely avoiding the shoulder surfing and thermal tracking attacks. For the first layer security we are using Deep Learning algorithm., for the second layer we are using OpenCV.
V. FLOWCHARTS
???????
A smart-camera based eye-blinking system has been incorporated into a new application for eyelid blinkbased PIN identification, the PIN identification is accomplished after real- time eye-blinks and eye center computations and recording are completed. Leakage of the passwords can be overcome by this method . A smart-camera based eye-blinking system has been incorporated into a new application for eyelid blinkbased PIN identification. The system has been successfully tested with a nine-digit keypad, and can be extended to character and digit combination password entry.. The stability of the user’s eye blink will affect the accuracy of the detected pins.
[1] R. Revathy and R. Bama, \"Advanced Safe PIN-Entry Against Human Shoulder-Surfing,\" IOSR Journal of Computer Engineering, vol 17, issue 4, ver. II. pp. 9- 15,JulyAug.2015.(Available:http://www.iosrjournals.org/io sr-jee/papers/Vol17-issue4/Version2/B017420915.pdf) Based Attacks,\" WOOT \'11, pp. 1-8, August 2011.(Available:https://cseweb.ucsd.edu/kmowery/papers/the rmadf) [2] K. Mowery, S. Meiklejohn and S. Savage, \"Heat of the Moment: Characterizing the Efficacy of Thermal Camera- [3] M. Mehrubeoglu, E. Ortlieb, L.. McLauchlan, L. M. [4] J. Weaver, K. Mock and B. Hoanca,”Gaze-Based Password Authentication through Automatic Clustering of Gaze Points,” proc.2011 IEEE Conf. on systems, Man and Cybernetics, Oct 2011(DOI: 10.1109/1CSMC.2011.6084072). [5] \"ATM Fraud, ATM Black Box Attacks SpreadAcross Europe\", European ATM SecurityTeam(E.A.S.T.), online, posted 11 April 2017.(Available:https://www.european-at security.eu/tag/atmfraud/) Pham, \"Capturing reading patterns throughareal-time smart camera iris tracking system,\" Proc. SPIE, vol. 8437, id. 843705, 2012.(DOI:10.1117/12.922875). [6] 2018 IEEE International Conference on Consumer Electronics, Mr Kaustubh.S.Sawant, Mr. Pange P.D has published \"Real-time eye tracking for password authenticationusing gaze based\". [7] Smart Cameras for Embedded Machine Vision,(product information) National Instruments(Available: http://www.ni.com/pdf/products/us/cat ni 1742.pdf).
Copyright © 2022 Dr. Sharavanakumar R, Yashaswini S, Deepak Raj N, Rakshitha E S, Chandana V. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44434
Publish Date : 2022-06-17
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here