(Make sure you follow all the 3 steps involved in submission. This is only Step 2 of 3. For details, visit http://bit.ly/16iNfUL)
Contact Information
Name of the College :
PRATHYUSHA INSTITUTE OF TECHOLOGY AND MANAGEMENT
Name of the Team Members along with their respective current semester :
P.BALAMURALI KRISHNA (VII Semester)
KARTHIKEYAN (VII Semester)
K.SUDHEER KUMAR (VII Semester)
S.HARSHA VARDHAN (VII Semester)
E-Mail Address & Phone Number of the Team Leader :
ph.o: 809844926
Name of the Faculty Guide :
p.kalpanadev
E-Mail Address & Phone Number of the Faculty Guide :
Project Information
Project Title:
IMAGE BASED AUTHENTICTION SYSTEM USING NI-LABVIEW
Hardware & Software Used:
INTER FACEING KITS(OPTIONAL),NI-LABVIEW
What challenge/problem are you trying to solve through your application:
ØIn the present days hackers are hacking passwords in every system oftenly. Due to this hacking a lot of problems occurring in all sectors.
Ø In order to avoid problems due to hacking, We are implementing a new concept of image based authentication system.
>Text passwords which are not secure in now a days dueto-------------> Hackers
>CONVENTIONAL METHOD OF USING TEXT PASSWORDS
---------------------------------------------------------------- TECHNOLOGY NEEDS TO BE UPDATED ----------------------------------------------------------------
PREVENTION IS BETTER THAN CURE
How does your application solves the above mentioned challenge/problem:
ØIn this system we are using images/symbols as passwords which were assigned by the user for the Alphabets in the password, which is created by user itself during registration process.
ØFor the applications like Banks, Military etc… We are adding more Security by introducing RFID, GSM modem to the system. This system can avoid problems of hacking and provide more secure login.
-------------------------------------------- APPLIES INNOVATIVE AND SECURED THOUGHT TO USER --------------------------------------------
Description of Project:
ØIn our system we are mainly concentrating on hacking.
ØOur system is more secure and hacking is not so easy in this case.
ØWe are using images as passwords for authentication.
ØIn our system we will assign each image to the each letter in the password which is created by the user during registration process.
ØWhile login user has to select the images in the order he set during registration.
Insert Images Here:
YouTube Link of Video:
Insert the Video here:
AN INNOVATIVE TRAIL requires ur sgestions and feedbackk