SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 142 
WEBSITES USING TOUCHLESS INTERACTION HAVING GRAPHICAL PASSWORD AUTHENTICATION AND EMBEDDED ANDROID APPLICATION Wafa Waheeda S1, M. Shunmugapriya2, K. Dheephikaa3, J. Visumathi4 1Department of CSE, Jeppiaar Engineering College, Chennai, India 2Department of CSE, Jeppiaar Engineering College, Chennai, India 3Department of CSE, Jeppiaar Engineering College, Chennai, India 4Department of CSE, Jeppiaar Engineering College, Chennai, India Abstract Living in an era of touch screens and large monitor screens, basic interactions on them have gone uncomfortable and difficult to understand. To overcome this difficulty, we discovered that, operating a device with the help of gestures via touch less interaction. To apply the idea of touch less interaction on a website, web camera facility is required, as the website takes the navigation instructions from a web camera. Henceforth a device which is connected to the internet uses the JavaScript and web camera gestures to enable having a website to navigate through the large monitor screens and also to be easily operated. In this busy world, where users keep forgetting account passwords, this website also allows them to generate graphical passwords for authentication. This will make user accounts sound safer and passwords remember able. In this paper we have developed a website using touch less interaction and also this website has an embedded android application running on it. Keywords: Touch less interaction, Gesture based navigation, Graphical password, Embedded Android application; 
----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Independent navigation is becoming a bigger challenge with the advances in technology and increasing size of monitor screens. As with growing technology, the digital displays keep on growing in size and they have also found their way into homes, offices and public spaces, more and more. However, in many cases these displays are not yet interactive and they merely present information. An untapped potential is the interactivity of these large displays for which there are diverse application areas: meeting rooms, surgery rooms and shopping centers. And these digital devices will always be connected to the internet. Providing a website, which will be operated based on Gesture based navigation via touch less interaction, will solve the problem faced on large digital screens. Examples include the interactions for navigating e-shopping website or any other website, which can be navigated via touch less interaction on any large sized digital display screens. 
For the touch less interface to be successful, it is of paramount importance to understand the interactions that take place with it. It was recently shown that touch-sensitive displays can be built cheaply and with ease and, as a result, there has been extensive attention for the interactions with touch-sensitive displays. However, interactions with large displays cannot always be based only on tactile input. Displays might be placed out of reach or behind glass surfaces to prevent vandalism, other users might obstruct the interaction or the display might be too large. 
The digital display surface or monitor screens may not be touched in touch less, gesture-based interactions. These interactions are a direct extension of touch-based interactions and, as a result, they can and should complement one another. But what makes hand gestures are suited for these touch less interactions is that the choice for gestures in commercial systems and scientific prototypes is driven by technological developments and by the cost, complexity and availability of the sensors that are used to look at the users gesturing. This often entails that seemingly unnatural gestures must be learned by users to accommodate the sensor, for example, using the flat hand in various poses to navigate a menu of website. This contradicts other claims that the interaction should come naturally. However, the extent in which these gestures are really intuitive is mostly ignored; „intuitive‟ meaning how easy users can learn, remember and correctly perform these gestures. 
Touch less, gesture-based interactions with large displays are best based on intuitive, everyday actions. And providing a graphical password to the touch less website user is becoming of prime importance, because of the busy life. A graphical password system is to provide an authentication system that works by having the user to select from images, in a specific
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 143 
order which are presented in a graphical user interface (GUI). Also the most commonly used computer authentication methods, is to use alphanumerical usernames and passwords. But using alphanumeric usernames and passwords have shown drawbacks in terms of security. For example, the user tends to choose a password that can be easily remember able and guessed. On the other hand, it gets hard for the user to guess a password which is often hard to remember and guess. Authentication is the process to allow users to confirm his or her identity to a Web application. The weakest link in a computer security system, where often considered to be human factors. There are three major areas where human-computer interaction is considered very important. They are, 1. Authentication 2. Developing Secure Systems and 3. Secure Operations. And here we focus on the user authentication problem. We know that a a secret form of authentication to data is via a password. The password is known only to the user or in other words. It is kept secret from the unauthorized to prevent their access. And those users who wish to gain access are tested whether they know the password or not and based on that, they are granted or denied access accordingly. And the use of password in ancient times, would allow the person knowing the password. But now a days, in modern times, the passwords control access to a protected computer operating system, ATMs machines, Bank accounts, Mobile phones etc. Generally, a typical computer user will require passwords for a lot of purposes like, logging in to the computer system‟s account, accessing the private files, email accounts, databases, networks, bank accounts and web sites. As most of the things happen online now a days, everything gets stored in a computer by a user from reading newspaper to accessing their highly confidential bank accounts. Passwords are even now a very good and strong authentication method used up to now. But the huge advance in the uses of computer in many applications, such as sharing of data, data transfer, login to emails or internet are some of the drawbacks of conventional password, which appears like the stolen password or even forgetting the password and week password. And so there is a big necessity for the users to have a strong authentication way which is needed to secure their applications. And thus, to avoid the weakness and drawbacks of conventional password, we go for the graphical password authentication methods. The graphical password authentication system is proposed as a possible alternative to the text based password authentication. And is proposed by the fact that all humans cannot remember text as well as they remember pictures better. Especially photos, a form of pictures representing moments, can be easily remembered than random pictures. 
And this website has an embedded android application, which makes it multi-operational. Here, the user is allowed to access the website via touch less interaction and also create graphical password authentication. Having an android application, which enables the user to run the application, makes the website more interactive and productive. 
In further sections, we discuss more about the touch less interaction, gesture based navigation, the graphical password authentication and the embedded android application. On whole, the era of touch less technology and touch less websites is being discussed. 2. LITERATURE SURVEY [1] David Lowe, Xiaoying Kong "NavOptim Coding: Supporting Website Navigation Optimisation using Effort Minimisation") put forth the idea of the importance of web applications and also highlighted the problems faced during the web navigation. Also proposed the navigation optimization techniques for it. [2] Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated Gestures for Touchless Interactions from a Distance" highlighted more on the touchless interactions with a device using a gesture based navigation technique. But the proposed system is where a tocuhless interaction will enable navigation in a website on large displays via gesture based navigation. This website will also have a graphical password authentication facility and an embedded android application features in it. Also, [3] Yuxin Meng "Designing Click-Draw Based Graphical Password Scheme for Better Authentication" and [4] Srinath Akula, Veerabhadram Devisetty‟s “Image Based Registration and Authentication System” elaborated more on the authentication of user via images. [5]Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile web application engine to the Android platform" explain the graphical passwords and porting android on web platform in a elaborated manner on different systems. But in this proposed system, they will be deployed on a website accesses via touchless interaction using gesture based navigation facility. [6]Don Norman & Bahar Wadia “The Next Touch Evolution. Advancing the Consumer Experience in Other Realms: Tasks and Tough Environments” highlighted the opportunities and challenges for touch and gesture based systems, which are overcome in this proposed system. [7]“Design and development of an Android application to process and display summarized corporate data” explained the concept of databases in android apps, and the data storage, access in them. 3. LINEAMENT OF SYSTEM This system is provided as a solution to the navigation facility offered by it on large monitor screens. Those digital displays, which are huge, are navigated via touch less interaction based on gestures. The devices have a web camera attached to them, with the help of which navigation through the website takes place.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 144 
3.1. Touch less Interaction by Gesture Based 
Navigation 
For touch less interaction to take place in a system on a 
device, there exists a sensing space for the gestures to be taken 
as input for navigating through the website. The sensing space 
will detect the gestures which help in navigating through the 
website via touch less interaction. The space between the web 
camera and the gestures given by the user, on a device, is 
sensing space. 
Fig -1: Device‟s sensing space–gesture detection in website 
navigation 
This figure displays the sensing space of a device. Generally, 
in most of the devices, the web camera is attached on top. And 
the web navigation facility is obtained by waving the hand 
(making a gesture) in front of the web camera attached to the 
large digital display device. 
Fig -2: Website navigation through gesture based touch less 
interaction 
The website having touch less gesture based navigation is used 
to navigate the menu of the website using the web camera. For 
the website to use the web camera facility, the java script plug 
in will be invoked by it. And the user will be allowed to view 
the option dialog box, to enable the java plug in and navigate 
the website using the web camera of device. This device will 
also enable the user to have a login access. And authenticate 
the user using graphical password authentication scheme. 
3.2. Graphical Password Authentication 
A graphical password scheme is to enable the user remember 
passwords easily. The graphical password can be in variety of 
forms. It is by clicking on the sequence of graphical images, 
and recording the sequence and image as password for user 
authentication. Generally authentication is of many forms and 
the graphical password authentication comes under the 
knowledge based authentication method. And in turn, the 
knowledge based authentication has two forms, i.e., text based 
passwords and picture based passwords. 
The picture-based techniques which come under the graphical 
password authentication technique, is divided into two 
categories, 1. Recognition-based graphical technique and 2. 
Recall-based graphical techniques. Here, using the 
recognition-based techniques of picture, the user will be 
presented with a set of images. And the user will pass the 
authentication by recognizing and identifying the images that 
he/she has selected during the registration stage of creating an 
account for user authentication. Whereas in using the recall-based 
techniques, a user is asked to reproduce something that 
he/she has created or selected earlier, during the registration 
stage. 
Here, in the recognition based technique, the registered 
pictures are present and displayed as themes, which a user is 
allowed to select one as theme for password. 
Fig -3: Selecting theme for graphical password authentication
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 145 
When the authentication process is carried, the user must enter the registered images in a correct sequence, as entered in the registration process of account creation. But there is a drawback of this technique. And that is the number of thumb nail images being limited to a number, which corresponds to the small password space. And here, each thumbnail image will be assigned a numerical value. Also, the sequence of selection will generate a numerical password, by which the user will be authenticated. The result will show the image sequence length which was generally shorter than the textural password length. And in turn to address this problem, the idea of combining two pictures to compose a new alphabetical element. Thereby expanding the image alphabet size and having a long secured graphical password to authenticate the user safely. 3.3. Embedding Android Application Embedded android application in the website is the other last feature of it, which helps user run the application and perform the task. Since there are many drawbacks faced by an android application on having database connectivity, running the app on the website will help provide better MySQL connectivity and also test and run the application to perform the application operation. 4. SYSTEM ARCHITECHTURE 
Fig -4: Architecture of proposed touch less website The architecture of proposed touch less website system is as shown above. The entire website consists of three built in modules which are the touch less interaction using gesture based navigation, graphical password authentication to the user and embedded android application in the website. In the gesture based navigation module, the JS of the website will invoke and enable the web camera, by asking the user whether he wants to enable or skip and use the default method. And once the web camera is enabled, the user will be allowed to navigate through the website via gestures displayed in front of the web camera. 
Here, the graphical password authentication is used to enable the user to create a authenticated account in the website. Thereby enabling security to the user accounts via graphical password authentication. The graphical passwords are of many types, of which the recognition based technique is implemented in the website. 
The embedded android application in the website will enable the user to run the android application and perform the basic functionality of the android app embedded in the website. This happens by embedding the .apk file of the android application inside the webpage of the website. 5. IMPLEMENTATION OF THE PROPOSED SYSTEM Working of Proposed System is split into modules for easy explanation. 5.1. Touch less Interaction Our proposed system will comprise of the touchless website, navigating with the help of gesture based navigation. It comprises of 5 steps, which will enable the user to navigate via gestures given by the user through a web camera. Step 1 A touchless website‟s URL is entered by the user where a digital device having internet and web camera facility is navigated using a touchless website by user, giving gestures for navigation Step 2 JavaScript will be invoked and will ask for users permission to access the web camera Step 3 The web camera gets on, and the user is now allowed to make gestures in front of the web camera Step 4 The gestures given by user in front of web camera is identified and taken as the navigation request by the user to the website with the help of the JavaScript Step 5 The user is allowed to navigate via gesture based navigation facility of the website, hence supporting easy navigation. 5.2. Graphical Password Authentication 
Here, our proposed graphical password authentication system, will comprise of 6 steps. Out of which steps 1-3 are registration steps to enable the user register for a graphical password authenticated account. And steps 4-6 are for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 146 
authentication, which will enable the user to authenticate 
safely with the graphical password facility. 
Step 1 
The first step is for the user to register and to type the 
username and a textual password, which will be stored in the 
database. 
Step 2 
In this second step objects in the form of pictures will be 
displayed to the user and he/she selects minimum of three 
objects or spots on a picture, from the set displayed. The 
selected spots on the picture will be again stored in the 
database with the specific appropriate username. 
Step 3 
And during the authentication, user selects the registered 
picture, and clicks on the spots as his password on a touch 
sensitive screen (or according to the environment) with a 
mouse. 
Step 4 
The system performs pre-processing where a numerical 
calculation will be performed by the system, taking in 
consideration of the numerical value of the spots on picture 
and the sequence 
Step 5 
In this step, the system compares the numerical value of that in 
the database 
Step 6 
After crosschecking, the system considers the user to be 
authenticated and logs in the user successfully 
5.3. Embedded Android Application 
And finally the last module of our proposed system will 
consist of an android application inside the website, suitable 
database connectivity. The working of the android application 
will comprise of the following steps. 
Step 1 
The user, after logging in the website, will be directed to the 
embedded android application. Where, the apk file of android 
app, embedded inside the website, allows the user to operate 
the app. 
Step 2 
User enters values, and interacts with the android application. 
Step 3 
Entered input values get stored in the database. 
Step 4 
The application functions and processes the output on the 
android application of the web page. 
6. PROPOSED SYSTEM OUTPUT 
6.1. Touch less Interaction on the Website 
The enabled JavaScript will display a message to the user, to 
allow the web camera access of the system. And when the web 
camera is enabled, the user navigates, by making gestures in 
front of the web camera. 
Fig -5: Touch less Website displaying JavaScript Message to 
User 
6.2. Graphical Password Authentication 
During registration, the user is allowed to select a graphical 
password for account. Registered images displayed as themes, 
from which the user is allowed to select one, and create a 
password by clicking on each part of the image chosen. 
Fig -6: Login Interface
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 147 
Fig -7: Choosing Password 
6.3. Embedded Android Application 
After logging into an account, user can run application and 
perform task. This application creates connectivity to MySQL 
database and performs the application. 
Fig -8: Embedded Android Application in the Website 
7. CONCLUSIONS 
In this paper, we have proposed touch less website with three 
built in modules enabled in it. With the features of gesture 
based navigation in front of a web camera, graphical password 
authentication and an android application embedded in the 
website, the website proves to be multipurpose. And is also 
efficient compared to the drawbacks, which were overcome in 
this proposed system. 
REFERENCES 
[1]. David Lowe, Xiaoying Kong "NavOptim Coding: 
Supporting Website Navigation Optimisation using Effort 
Minimisation" in 2004 IEEE/WIC/ACM International 
Conference on Web Intelligence (WI‟04). 
[2]. Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated 
Gestures for Touchless Interactions from a 
Distance" in 2010 IEEE International Symposium on 
Multimedia 2010 IEEE International Symposium on 
Multimedia. 
[3]. Yuxin Meng "Designing Click-Draw Based Graphical 
Password Scheme for Better Authentication" in 2012 IEEE 
Seventh International Conference on Networking, 
Architecture, and Storage. 
[4]. “Image Based Registration and Authentication System” by 
Srinath Akula, Veerabhadram Devisetty from St cloud State 
University, St. Cloud, MN 56301 
[5]. Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile 
web application engine to the Android platform" in 2010 10th 
IEEE International Conference on Computer and Information 
Technology. 
[6]. Don Norman & Bahar Wadia “The Next Touch Evolution. 
Advancing the Consumer Experience in Other Realms: Tasks 
and Tough Environments” in 2013 Society for Information 
Display conference, Vancouver, Canada (May 23, 2013) 
[7]. Fiawoo, S.Y. ; Dept. of Comput. Eng., Univ. of Ghana, 
Accra, Ghana ; Sowah, R.A. “Design and development of an 
Android application to process and display summarized 
corporate data” . 
[8]. Wazir Zada Khan, Mohammed Y Aalsalem and Yang 
Xiang "A Graphical Password Based System for Small Mobile 
Devices ". 
BIOGRAPHIES 
Wafa Waheeda S is an undergraduate in 
Computer Science and Engineering in 
Jeppiaar Engineering College, Anna 
University. She has special interest in 
website and application development. She is 
a Richard E Merwin Scholar in 2013. She 
has taken over various responsibilities in 
IEEE, IEEE WIE, IEEE Computer Society, 
and Computer Society of India. She is placed at Wipro pvt ltd 
and is starting her career this year. She has good social 
concern and involves herself in activities encouraging women 
and students with high interest. 
M. Shunmugapriya is an undergraduate 
student of Computer Science and 
Engineering in Jeppiaar Engineering 
College, Anna University.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 148 
K. Dheephikaa is an undergraduate student of Computer Science and Engineering in Jeppiaar Engineering College, Anna University.

Mais conteúdo relacionado

Mais procurados

Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
A privacy learning objects identity system for smartphones based on a virtu...
A privacy   learning objects identity system for smartphones based on a virtu...A privacy   learning objects identity system for smartphones based on a virtu...
A privacy learning objects identity system for smartphones based on a virtu...ijcsit
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence Athari_1996
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
DNS to Anything - How Securly Works
DNS to Anything - How Securly WorksDNS to Anything - How Securly Works
DNS to Anything - How Securly WorksSecurly
 
User Experience Portfolio. Sushmita Dutt
User Experience Portfolio. Sushmita DuttUser Experience Portfolio. Sushmita Dutt
User Experience Portfolio. Sushmita DuttSushmita Dutt
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging SystemIJERA Editor
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System AuthenticationIJERA Editor
 

Mais procurados (20)

Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
A privacy learning objects identity system for smartphones based on a virtu...
A privacy   learning objects identity system for smartphones based on a virtu...A privacy   learning objects identity system for smartphones based on a virtu...
A privacy learning objects identity system for smartphones based on a virtu...
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android Application
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
Sec16 paper xu
Sec16 paper xuSec16 paper xu
Sec16 paper xu
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
DNS to Anything - How Securly Works
DNS to Anything - How Securly WorksDNS to Anything - How Securly Works
DNS to Anything - How Securly Works
 
User Experience Portfolio. Sushmita Dutt
User Experience Portfolio. Sushmita DuttUser Experience Portfolio. Sushmita Dutt
User Experience Portfolio. Sushmita Dutt
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging System
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 

Destaque

A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)eSAT Publishing House
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
Overall increase in efficiency in raw meals
Overall increase in efficiency in raw mealsOverall increase in efficiency in raw meals
Overall increase in efficiency in raw mealseSAT Publishing House
 
Effect of sb si addition on necking behaviour of mg alloys
Effect of sb si addition on necking behaviour of mg alloysEffect of sb si addition on necking behaviour of mg alloys
Effect of sb si addition on necking behaviour of mg alloyseSAT Publishing House
 
An optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phonesAn optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phoneseSAT Publishing House
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositeseSAT Publishing House
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
Mri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heartMri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole hearteSAT Publishing House
 
Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...eSAT Publishing House
 
Studies on effect of mineral admixtures on durability
Studies on effect of mineral admixtures on durabilityStudies on effect of mineral admixtures on durability
Studies on effect of mineral admixtures on durabilityeSAT Publishing House
 
Mathematical model for an area source and the point
Mathematical model for an area source and the pointMathematical model for an area source and the point
Mathematical model for an area source and the pointeSAT Publishing House
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filterseSAT Publishing House
 
Removal of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedRemoval of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedeSAT Publishing House
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingeSAT Publishing House
 
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...eSAT Publishing House
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Influence of process parameters on depth of
Influence of process parameters on depth ofInfluence of process parameters on depth of
Influence of process parameters on depth ofeSAT Publishing House
 

Destaque (20)

A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Overall increase in efficiency in raw meals
Overall increase in efficiency in raw mealsOverall increase in efficiency in raw meals
Overall increase in efficiency in raw meals
 
Kinematic model of a car
Kinematic model of a carKinematic model of a car
Kinematic model of a car
 
Effect of sb si addition on necking behaviour of mg alloys
Effect of sb si addition on necking behaviour of mg alloysEffect of sb si addition on necking behaviour of mg alloys
Effect of sb si addition on necking behaviour of mg alloys
 
An optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phonesAn optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phones
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced composites
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
Mri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heartMri image registration based segmentation framework for whole heart
Mri image registration based segmentation framework for whole heart
 
Chemread – a chemical informant
Chemread – a chemical informantChemread – a chemical informant
Chemread – a chemical informant
 
Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...
 
Studies on effect of mineral admixtures on durability
Studies on effect of mineral admixtures on durabilityStudies on effect of mineral admixtures on durability
Studies on effect of mineral admixtures on durability
 
Mathematical model for an area source and the point
Mathematical model for an area source and the pointMathematical model for an area source and the point
Mathematical model for an area source and the point
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filters
 
Removal of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derivedRemoval of chromium (vi) by activated carbon derived
Removal of chromium (vi) by activated carbon derived
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna using
 
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
Spatio temporal modeling of snow flake crystals using packard’s cellular auto...
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Influence of process parameters on depth of
Influence of process parameters on depth ofInfluence of process parameters on depth of
Influence of process parameters on depth of
 

Semelhante a Websites using touchless interaction having graphical

Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Automated Media Player using Hand Gesture
Automated Media Player using Hand GestureAutomated Media Player using Hand Gesture
Automated Media Player using Hand GestureIRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...rahulmonikasharma
 
User Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesUser Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesIRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
IRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
IRJET- Finger Gesture Recognition Using Linear Camera
IRJET-  	  Finger Gesture Recognition Using Linear CameraIRJET-  	  Finger Gesture Recognition Using Linear Camera
IRJET- Finger Gesture Recognition Using Linear CameraIRJET Journal
 
Virtual Smart Phones
Virtual Smart PhonesVirtual Smart Phones
Virtual Smart PhonesIRJET Journal
 
Voice Controlled E-commerce Web App
Voice Controlled E-commerce Web AppVoice Controlled E-commerce Web App
Voice Controlled E-commerce Web AppIRJET Journal
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationIRJET Journal
 

Semelhante a Websites using touchless interaction having graphical (20)

Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Automated Media Player using Hand Gesture
Automated Media Player using Hand GestureAutomated Media Player using Hand Gesture
Automated Media Player using Hand Gesture
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
 
User Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile DevicesUser Interface Design for Web and Mobile Devices
User Interface Design for Web and Mobile Devices
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
IRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart Home
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
IRJET- Finger Gesture Recognition Using Linear Camera
IRJET-  	  Finger Gesture Recognition Using Linear CameraIRJET-  	  Finger Gesture Recognition Using Linear Camera
IRJET- Finger Gesture Recognition Using Linear Camera
 
Published_Papers
Published_PapersPublished_Papers
Published_Papers
 
Virtual Smart Phones
Virtual Smart PhonesVirtual Smart Phones
Virtual Smart Phones
 
Voice Controlled E-commerce Web App
Voice Controlled E-commerce Web AppVoice Controlled E-commerce Web App
Voice Controlled E-commerce Web App
 
Conversational Voice Controlled News Application
Conversational Voice Controlled News ApplicationConversational Voice Controlled News Application
Conversational Voice Controlled News Application
 

Mais de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mais de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 

Último (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 

Websites using touchless interaction having graphical

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 142 WEBSITES USING TOUCHLESS INTERACTION HAVING GRAPHICAL PASSWORD AUTHENTICATION AND EMBEDDED ANDROID APPLICATION Wafa Waheeda S1, M. Shunmugapriya2, K. Dheephikaa3, J. Visumathi4 1Department of CSE, Jeppiaar Engineering College, Chennai, India 2Department of CSE, Jeppiaar Engineering College, Chennai, India 3Department of CSE, Jeppiaar Engineering College, Chennai, India 4Department of CSE, Jeppiaar Engineering College, Chennai, India Abstract Living in an era of touch screens and large monitor screens, basic interactions on them have gone uncomfortable and difficult to understand. To overcome this difficulty, we discovered that, operating a device with the help of gestures via touch less interaction. To apply the idea of touch less interaction on a website, web camera facility is required, as the website takes the navigation instructions from a web camera. Henceforth a device which is connected to the internet uses the JavaScript and web camera gestures to enable having a website to navigate through the large monitor screens and also to be easily operated. In this busy world, where users keep forgetting account passwords, this website also allows them to generate graphical passwords for authentication. This will make user accounts sound safer and passwords remember able. In this paper we have developed a website using touch less interaction and also this website has an embedded android application running on it. Keywords: Touch less interaction, Gesture based navigation, Graphical password, Embedded Android application; ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Independent navigation is becoming a bigger challenge with the advances in technology and increasing size of monitor screens. As with growing technology, the digital displays keep on growing in size and they have also found their way into homes, offices and public spaces, more and more. However, in many cases these displays are not yet interactive and they merely present information. An untapped potential is the interactivity of these large displays for which there are diverse application areas: meeting rooms, surgery rooms and shopping centers. And these digital devices will always be connected to the internet. Providing a website, which will be operated based on Gesture based navigation via touch less interaction, will solve the problem faced on large digital screens. Examples include the interactions for navigating e-shopping website or any other website, which can be navigated via touch less interaction on any large sized digital display screens. For the touch less interface to be successful, it is of paramount importance to understand the interactions that take place with it. It was recently shown that touch-sensitive displays can be built cheaply and with ease and, as a result, there has been extensive attention for the interactions with touch-sensitive displays. However, interactions with large displays cannot always be based only on tactile input. Displays might be placed out of reach or behind glass surfaces to prevent vandalism, other users might obstruct the interaction or the display might be too large. The digital display surface or monitor screens may not be touched in touch less, gesture-based interactions. These interactions are a direct extension of touch-based interactions and, as a result, they can and should complement one another. But what makes hand gestures are suited for these touch less interactions is that the choice for gestures in commercial systems and scientific prototypes is driven by technological developments and by the cost, complexity and availability of the sensors that are used to look at the users gesturing. This often entails that seemingly unnatural gestures must be learned by users to accommodate the sensor, for example, using the flat hand in various poses to navigate a menu of website. This contradicts other claims that the interaction should come naturally. However, the extent in which these gestures are really intuitive is mostly ignored; „intuitive‟ meaning how easy users can learn, remember and correctly perform these gestures. Touch less, gesture-based interactions with large displays are best based on intuitive, everyday actions. And providing a graphical password to the touch less website user is becoming of prime importance, because of the busy life. A graphical password system is to provide an authentication system that works by having the user to select from images, in a specific
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 143 order which are presented in a graphical user interface (GUI). Also the most commonly used computer authentication methods, is to use alphanumerical usernames and passwords. But using alphanumeric usernames and passwords have shown drawbacks in terms of security. For example, the user tends to choose a password that can be easily remember able and guessed. On the other hand, it gets hard for the user to guess a password which is often hard to remember and guess. Authentication is the process to allow users to confirm his or her identity to a Web application. The weakest link in a computer security system, where often considered to be human factors. There are three major areas where human-computer interaction is considered very important. They are, 1. Authentication 2. Developing Secure Systems and 3. Secure Operations. And here we focus on the user authentication problem. We know that a a secret form of authentication to data is via a password. The password is known only to the user or in other words. It is kept secret from the unauthorized to prevent their access. And those users who wish to gain access are tested whether they know the password or not and based on that, they are granted or denied access accordingly. And the use of password in ancient times, would allow the person knowing the password. But now a days, in modern times, the passwords control access to a protected computer operating system, ATMs machines, Bank accounts, Mobile phones etc. Generally, a typical computer user will require passwords for a lot of purposes like, logging in to the computer system‟s account, accessing the private files, email accounts, databases, networks, bank accounts and web sites. As most of the things happen online now a days, everything gets stored in a computer by a user from reading newspaper to accessing their highly confidential bank accounts. Passwords are even now a very good and strong authentication method used up to now. But the huge advance in the uses of computer in many applications, such as sharing of data, data transfer, login to emails or internet are some of the drawbacks of conventional password, which appears like the stolen password or even forgetting the password and week password. And so there is a big necessity for the users to have a strong authentication way which is needed to secure their applications. And thus, to avoid the weakness and drawbacks of conventional password, we go for the graphical password authentication methods. The graphical password authentication system is proposed as a possible alternative to the text based password authentication. And is proposed by the fact that all humans cannot remember text as well as they remember pictures better. Especially photos, a form of pictures representing moments, can be easily remembered than random pictures. And this website has an embedded android application, which makes it multi-operational. Here, the user is allowed to access the website via touch less interaction and also create graphical password authentication. Having an android application, which enables the user to run the application, makes the website more interactive and productive. In further sections, we discuss more about the touch less interaction, gesture based navigation, the graphical password authentication and the embedded android application. On whole, the era of touch less technology and touch less websites is being discussed. 2. LITERATURE SURVEY [1] David Lowe, Xiaoying Kong "NavOptim Coding: Supporting Website Navigation Optimisation using Effort Minimisation") put forth the idea of the importance of web applications and also highlighted the problems faced during the web navigation. Also proposed the navigation optimization techniques for it. [2] Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated Gestures for Touchless Interactions from a Distance" highlighted more on the touchless interactions with a device using a gesture based navigation technique. But the proposed system is where a tocuhless interaction will enable navigation in a website on large displays via gesture based navigation. This website will also have a graphical password authentication facility and an embedded android application features in it. Also, [3] Yuxin Meng "Designing Click-Draw Based Graphical Password Scheme for Better Authentication" and [4] Srinath Akula, Veerabhadram Devisetty‟s “Image Based Registration and Authentication System” elaborated more on the authentication of user via images. [5]Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile web application engine to the Android platform" explain the graphical passwords and porting android on web platform in a elaborated manner on different systems. But in this proposed system, they will be deployed on a website accesses via touchless interaction using gesture based navigation facility. [6]Don Norman & Bahar Wadia “The Next Touch Evolution. Advancing the Consumer Experience in Other Realms: Tasks and Tough Environments” highlighted the opportunities and challenges for touch and gesture based systems, which are overcome in this proposed system. [7]“Design and development of an Android application to process and display summarized corporate data” explained the concept of databases in android apps, and the data storage, access in them. 3. LINEAMENT OF SYSTEM This system is provided as a solution to the navigation facility offered by it on large monitor screens. Those digital displays, which are huge, are navigated via touch less interaction based on gestures. The devices have a web camera attached to them, with the help of which navigation through the website takes place.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 144 3.1. Touch less Interaction by Gesture Based Navigation For touch less interaction to take place in a system on a device, there exists a sensing space for the gestures to be taken as input for navigating through the website. The sensing space will detect the gestures which help in navigating through the website via touch less interaction. The space between the web camera and the gestures given by the user, on a device, is sensing space. Fig -1: Device‟s sensing space–gesture detection in website navigation This figure displays the sensing space of a device. Generally, in most of the devices, the web camera is attached on top. And the web navigation facility is obtained by waving the hand (making a gesture) in front of the web camera attached to the large digital display device. Fig -2: Website navigation through gesture based touch less interaction The website having touch less gesture based navigation is used to navigate the menu of the website using the web camera. For the website to use the web camera facility, the java script plug in will be invoked by it. And the user will be allowed to view the option dialog box, to enable the java plug in and navigate the website using the web camera of device. This device will also enable the user to have a login access. And authenticate the user using graphical password authentication scheme. 3.2. Graphical Password Authentication A graphical password scheme is to enable the user remember passwords easily. The graphical password can be in variety of forms. It is by clicking on the sequence of graphical images, and recording the sequence and image as password for user authentication. Generally authentication is of many forms and the graphical password authentication comes under the knowledge based authentication method. And in turn, the knowledge based authentication has two forms, i.e., text based passwords and picture based passwords. The picture-based techniques which come under the graphical password authentication technique, is divided into two categories, 1. Recognition-based graphical technique and 2. Recall-based graphical techniques. Here, using the recognition-based techniques of picture, the user will be presented with a set of images. And the user will pass the authentication by recognizing and identifying the images that he/she has selected during the registration stage of creating an account for user authentication. Whereas in using the recall-based techniques, a user is asked to reproduce something that he/she has created or selected earlier, during the registration stage. Here, in the recognition based technique, the registered pictures are present and displayed as themes, which a user is allowed to select one as theme for password. Fig -3: Selecting theme for graphical password authentication
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 145 When the authentication process is carried, the user must enter the registered images in a correct sequence, as entered in the registration process of account creation. But there is a drawback of this technique. And that is the number of thumb nail images being limited to a number, which corresponds to the small password space. And here, each thumbnail image will be assigned a numerical value. Also, the sequence of selection will generate a numerical password, by which the user will be authenticated. The result will show the image sequence length which was generally shorter than the textural password length. And in turn to address this problem, the idea of combining two pictures to compose a new alphabetical element. Thereby expanding the image alphabet size and having a long secured graphical password to authenticate the user safely. 3.3. Embedding Android Application Embedded android application in the website is the other last feature of it, which helps user run the application and perform the task. Since there are many drawbacks faced by an android application on having database connectivity, running the app on the website will help provide better MySQL connectivity and also test and run the application to perform the application operation. 4. SYSTEM ARCHITECHTURE Fig -4: Architecture of proposed touch less website The architecture of proposed touch less website system is as shown above. The entire website consists of three built in modules which are the touch less interaction using gesture based navigation, graphical password authentication to the user and embedded android application in the website. In the gesture based navigation module, the JS of the website will invoke and enable the web camera, by asking the user whether he wants to enable or skip and use the default method. And once the web camera is enabled, the user will be allowed to navigate through the website via gestures displayed in front of the web camera. Here, the graphical password authentication is used to enable the user to create a authenticated account in the website. Thereby enabling security to the user accounts via graphical password authentication. The graphical passwords are of many types, of which the recognition based technique is implemented in the website. The embedded android application in the website will enable the user to run the android application and perform the basic functionality of the android app embedded in the website. This happens by embedding the .apk file of the android application inside the webpage of the website. 5. IMPLEMENTATION OF THE PROPOSED SYSTEM Working of Proposed System is split into modules for easy explanation. 5.1. Touch less Interaction Our proposed system will comprise of the touchless website, navigating with the help of gesture based navigation. It comprises of 5 steps, which will enable the user to navigate via gestures given by the user through a web camera. Step 1 A touchless website‟s URL is entered by the user where a digital device having internet and web camera facility is navigated using a touchless website by user, giving gestures for navigation Step 2 JavaScript will be invoked and will ask for users permission to access the web camera Step 3 The web camera gets on, and the user is now allowed to make gestures in front of the web camera Step 4 The gestures given by user in front of web camera is identified and taken as the navigation request by the user to the website with the help of the JavaScript Step 5 The user is allowed to navigate via gesture based navigation facility of the website, hence supporting easy navigation. 5.2. Graphical Password Authentication Here, our proposed graphical password authentication system, will comprise of 6 steps. Out of which steps 1-3 are registration steps to enable the user register for a graphical password authenticated account. And steps 4-6 are for
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 146 authentication, which will enable the user to authenticate safely with the graphical password facility. Step 1 The first step is for the user to register and to type the username and a textual password, which will be stored in the database. Step 2 In this second step objects in the form of pictures will be displayed to the user and he/she selects minimum of three objects or spots on a picture, from the set displayed. The selected spots on the picture will be again stored in the database with the specific appropriate username. Step 3 And during the authentication, user selects the registered picture, and clicks on the spots as his password on a touch sensitive screen (or according to the environment) with a mouse. Step 4 The system performs pre-processing where a numerical calculation will be performed by the system, taking in consideration of the numerical value of the spots on picture and the sequence Step 5 In this step, the system compares the numerical value of that in the database Step 6 After crosschecking, the system considers the user to be authenticated and logs in the user successfully 5.3. Embedded Android Application And finally the last module of our proposed system will consist of an android application inside the website, suitable database connectivity. The working of the android application will comprise of the following steps. Step 1 The user, after logging in the website, will be directed to the embedded android application. Where, the apk file of android app, embedded inside the website, allows the user to operate the app. Step 2 User enters values, and interacts with the android application. Step 3 Entered input values get stored in the database. Step 4 The application functions and processes the output on the android application of the web page. 6. PROPOSED SYSTEM OUTPUT 6.1. Touch less Interaction on the Website The enabled JavaScript will display a message to the user, to allow the web camera access of the system. And when the web camera is enabled, the user navigates, by making gestures in front of the web camera. Fig -5: Touch less Website displaying JavaScript Message to User 6.2. Graphical Password Authentication During registration, the user is allowed to select a graphical password for account. Registered images displayed as themes, from which the user is allowed to select one, and create a password by clicking on each part of the image chosen. Fig -6: Login Interface
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 147 Fig -7: Choosing Password 6.3. Embedded Android Application After logging into an account, user can run application and perform task. This application creates connectivity to MySQL database and performs the application. Fig -8: Embedded Android Application in the Website 7. CONCLUSIONS In this paper, we have proposed touch less website with three built in modules enabled in it. With the features of gesture based navigation in front of a web camera, graphical password authentication and an android application embedded in the website, the website proves to be multipurpose. And is also efficient compared to the drawbacks, which were overcome in this proposed system. REFERENCES [1]. David Lowe, Xiaoying Kong "NavOptim Coding: Supporting Website Navigation Optimisation using Effort Minimisation" in 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI‟04). [2]. Wim Fikkert Paul van der Vet Anton Nijholt "User-evaluated Gestures for Touchless Interactions from a Distance" in 2010 IEEE International Symposium on Multimedia 2010 IEEE International Symposium on Multimedia. [3]. Yuxin Meng "Designing Click-Draw Based Graphical Password Scheme for Better Authentication" in 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage. [4]. “Image Based Registration and Authentication System” by Srinath Akula, Veerabhadram Devisetty from St cloud State University, St. Cloud, MN 56301 [5]. Yonghong Wu, Jianchao Luo, Lei Luo "Porting mobile web application engine to the Android platform" in 2010 10th IEEE International Conference on Computer and Information Technology. [6]. Don Norman & Bahar Wadia “The Next Touch Evolution. Advancing the Consumer Experience in Other Realms: Tasks and Tough Environments” in 2013 Society for Information Display conference, Vancouver, Canada (May 23, 2013) [7]. Fiawoo, S.Y. ; Dept. of Comput. Eng., Univ. of Ghana, Accra, Ghana ; Sowah, R.A. “Design and development of an Android application to process and display summarized corporate data” . [8]. Wazir Zada Khan, Mohammed Y Aalsalem and Yang Xiang "A Graphical Password Based System for Small Mobile Devices ". BIOGRAPHIES Wafa Waheeda S is an undergraduate in Computer Science and Engineering in Jeppiaar Engineering College, Anna University. She has special interest in website and application development. She is a Richard E Merwin Scholar in 2013. She has taken over various responsibilities in IEEE, IEEE WIE, IEEE Computer Society, and Computer Society of India. She is placed at Wipro pvt ltd and is starting her career this year. She has good social concern and involves herself in activities encouraging women and students with high interest. M. Shunmugapriya is an undergraduate student of Computer Science and Engineering in Jeppiaar Engineering College, Anna University.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 148 K. Dheephikaa is an undergraduate student of Computer Science and Engineering in Jeppiaar Engineering College, Anna University.