SlideShare a Scribd company logo
1 of 18
Project Team:
Deepak Yadav (1001031031)
Deepak Kumar (1001031029)
Arvind Yadav (1001031022)
Deepankar Ram (1001031032)
Table of Content
 Introduction

 Hardware Description
 Advantages and disadvantages
 Procedural steps for compilation, simulation and

dumping
 Conclusion
 References
Introduction
 The main aim of this project is to provide a security system

for illiterates.
 Since the images are more easily to recalling in comparison
to string of character.
 The images are displayed on touch screen ,one can enter
correct sequences of images get authenticated.
 Gives exposure about how touch screen interface in our
practical life.
 It can be easily installed in industries ,houses ,poultry form

for security .
Block Diagram
Hardware Description
The major building blocks of this project are:
 Regulated power supply with voltage regulator
 Micro controller

 Touch screen sensor
 Stepper motor
 Buzzer
Power supply
Microcontroller (PIC16F72)
1.
2.

3.
a.

The microcontroller used in this
project is PIC16F72.
The PIC families of microcontrollers
are
developed
by
Microchip
Technology Inc.
PIC microcontrollers:
PIC12CXXX 12/14-bit program word .

b.
c.
d.

PIC 16C5X 12-bit program word .
PIC16CXXX and PIC16FXXX 14-bit
program word .
PIC17CXXX and PIC18CXXX 16-bit
program word.
Technologies of Touch Screen
There are a number of types of touch screen
technology.
1. Resistive
2. Surface acoustic wave
3. Capacitive
4. Surface capacitance
5. Projected capacitance
6. Infrared
7. Strain gauge
8. Optical imaging
Working of Resistive Touch screens
1. Polyester Film
2. Upper Resistive
3.

4.
5.
6.

7.

circuit Layer
Conductive ITO
(Transparent Metal
Coating).
Lower Resistive
Circuit Layer
Insulating Dots
Glass/AcrylicSubstrat
-e
Touch screen
Continue….
The contact can close

the switch an generated
Voltages.
Touch screen controller
convert it into (X,Y)
Co-ordinate system and
hence the position of
touch is sense by
controller easily.
Stepper motor
 It is gear based motor.

 The stepper motor are connected

with ULN2803 driver.
When the correct password
entered the lock attached to the
motor is open.
Buzzer
Basically it works as sound source

based on piezoelectric diaphragm.
It is consists of electrode ,when dc
voltage applied across electrode
produces sound.
To switch on buzzer -high 1
To switch off buzzer -low 1
Advantages
 Easily recalling.
 Image based password is more secure than text based

password.
 Less vulnerable.
 Easily installation method.
Disadvantages
 Since it is totally based on password hence shoulder

surfing can reduce the security of system.
 Taken more prevention for touch screen safety.
Procedural steps for compilation,
simulation and dumping
 PIC compiler is used for programming.
 After programming run the programs, it generated a

.hex extension file.
 The .hex extension file are dumping into
microcontroller using PIC kit programmer.
Conclusion
 Image password is easily remember than string of






character password.
Image password is more secure than text based
password.
Less vulnerable by attacker.
Know the exposure of touch screen interface in
practical life.
Shoulder surfing reduce the security of system.
References
http://www.wikipedia.com
http://www.google.com
http://www.slideshare.net
Thank you

More Related Content

What's hot

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDKarishma Khan
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTvicci4041
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar pptShruti Maheshwari
 
E-Ball Technology
E-Ball Technology E-Ball Technology
E-Ball Technology ashima sood
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
E ball technology..ppt
E ball technology..pptE ball technology..ppt
E ball technology..pptManilaBhardwaj
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 

What's hot (20)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
3d passwords
3d passwords3d passwords
3d passwords
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
 
E-Ball Technology
E-Ball Technology E-Ball Technology
E-Ball Technology
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
E ball technology..ppt
E ball technology..pptE ball technology..ppt
E ball technology..ppt
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
E ball technology
E ball technologyE ball technology
E ball technology
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Similar to Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav

Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Siang Wei Lee
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversVinny Chweety
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHAParas Jha
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security systemNIT srinagar
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptxManojG81
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice boardIRJET Journal
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android applicationAvinash Vemula
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockIRJET Journal
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control reportengineerssolution
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish Sahu
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full editSayam Roy
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 90308448771000kv technologies
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEIRJET Journal
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paperAnwar Al Ahdab
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationRajendra Prasad
 

Similar to Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav (20)

Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
 
Alcohol report
Alcohol reportAlcohol report
Alcohol report
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
 
embedded systems
embedded systemsembedded systems
embedded systems
 
Presentation on Embedded system using micro controller by PARAS JHA
Presentation on Embedded system using micro controller  by PARAS JHAPresentation on Embedded system using micro controller  by PARAS JHA
Presentation on Embedded system using micro controller by PARAS JHA
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
intership ppt see.pptx
intership ppt see.pptxintership ppt see.pptx
intership ppt see.pptx
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
 
Industrial monitoring and control system using android application
Industrial monitoring and control system using android applicationIndustrial monitoring and control system using android application
Industrial monitoring and control system using android application
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
 
Wireless appliances control report
Wireless appliances control reportWireless appliances control report
Wireless appliances control report
 
Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years Debasish sahu embedded software engineer 2 years
Debasish sahu embedded software engineer 2 years
 
final project report_full edit
final project report_full editfinal project report_full edit
final project report_full edit
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
 
Report (2)
Report (2)Report (2)
Report (2)
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
Gesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentationGesture control robot using accelerometer documentation
Gesture control robot using accelerometer documentation
 
E1103024045
E1103024045E1103024045
E1103024045
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Image Based Password Authentication for Illiterate using Touch screen by Deepak Yadav

  • 1. Project Team: Deepak Yadav (1001031031) Deepak Kumar (1001031029) Arvind Yadav (1001031022) Deepankar Ram (1001031032)
  • 2. Table of Content  Introduction  Hardware Description  Advantages and disadvantages  Procedural steps for compilation, simulation and dumping  Conclusion  References
  • 3. Introduction  The main aim of this project is to provide a security system for illiterates.  Since the images are more easily to recalling in comparison to string of character.  The images are displayed on touch screen ,one can enter correct sequences of images get authenticated.  Gives exposure about how touch screen interface in our practical life.  It can be easily installed in industries ,houses ,poultry form for security .
  • 5. Hardware Description The major building blocks of this project are:  Regulated power supply with voltage regulator  Micro controller  Touch screen sensor  Stepper motor  Buzzer
  • 7. Microcontroller (PIC16F72) 1. 2. 3. a. The microcontroller used in this project is PIC16F72. The PIC families of microcontrollers are developed by Microchip Technology Inc. PIC microcontrollers: PIC12CXXX 12/14-bit program word . b. c. d. PIC 16C5X 12-bit program word . PIC16CXXX and PIC16FXXX 14-bit program word . PIC17CXXX and PIC18CXXX 16-bit program word.
  • 8. Technologies of Touch Screen There are a number of types of touch screen technology. 1. Resistive 2. Surface acoustic wave 3. Capacitive 4. Surface capacitance 5. Projected capacitance 6. Infrared 7. Strain gauge 8. Optical imaging
  • 9. Working of Resistive Touch screens 1. Polyester Film 2. Upper Resistive 3. 4. 5. 6. 7. circuit Layer Conductive ITO (Transparent Metal Coating). Lower Resistive Circuit Layer Insulating Dots Glass/AcrylicSubstrat -e Touch screen
  • 10. Continue…. The contact can close the switch an generated Voltages. Touch screen controller convert it into (X,Y) Co-ordinate system and hence the position of touch is sense by controller easily.
  • 11. Stepper motor  It is gear based motor.  The stepper motor are connected with ULN2803 driver. When the correct password entered the lock attached to the motor is open.
  • 12. Buzzer Basically it works as sound source based on piezoelectric diaphragm. It is consists of electrode ,when dc voltage applied across electrode produces sound. To switch on buzzer -high 1 To switch off buzzer -low 1
  • 13. Advantages  Easily recalling.  Image based password is more secure than text based password.  Less vulnerable.  Easily installation method.
  • 14. Disadvantages  Since it is totally based on password hence shoulder surfing can reduce the security of system.  Taken more prevention for touch screen safety.
  • 15. Procedural steps for compilation, simulation and dumping  PIC compiler is used for programming.  After programming run the programs, it generated a .hex extension file.  The .hex extension file are dumping into microcontroller using PIC kit programmer.
  • 16. Conclusion  Image password is easily remember than string of     character password. Image password is more secure than text based password. Less vulnerable by attacker. Know the exposure of touch screen interface in practical life. Shoulder surfing reduce the security of system.