Inspiration
The inspiration for our project came from the increasing need for secure authentication methods in our digital world. Traditional password-based systems are often vulnerable to hacking, phishing, and brute force attacks. We wanted to create a more secure and user-friendly authentication system that leverages the unique capabilities of image-based recognition. This led us to develop a three-level security system using image-based grid authentication, aiming to enhance security without compromising on usability.
What it does
Our project implements a three-level security system that employs image-based grid authentication. Users authenticate themselves by selecting specific images from a grid in a pre-determined sequence. This method adds an additional layer of security by making it difficult for unauthorized users to replicate the authentication sequence. The three levels of security include:
Level 1: Basic password authentication. Level 2: Image grid selection where users select a sequence of images. Level 3: Time-based one-time password (OTP) for dynamic verification.
How we built it
We built our project using a combination of technologies:
Frontend: HTML, CSS, and JavaScript for creating a user-friendly interface. Backend: Python and Flask for handling server-side logic and user authentication processes. Database: SQLite for storing user data, image sequences, and authentication details securely. Security: Implementation of TOTP using the PyOTP library to generate time-based one-time passwords. The development process involved designing the user interface, setting up the server, creating the image grid system, and integrating the TOTP mechanism. We also focused on ensuring secure storage and transmission of data using encryption.
Challenges we ran into
Designing the Image Grid: Creating a user-friendly and secure image grid selection system was challenging. We had to ensure that the grid was intuitive to use while being secure against various types of attacks. Integration of TOTP: Implementing the TOTP mechanism and ensuring it synced correctly with user devices required careful attention to detail and testing. User Data Security: Storing user data securely, including image sequences and passwords, was a significant challenge. We implemented encryption and secure hashing techniques to protect this information. Balancing Security and Usability: Ensuring that the system was both secure and easy to use was a constant balancing act. We had to iterate multiple times to get the right mix of security and user experience.
Accomplishments that we're proud of
Successfully creating a three-level security system that significantly enhances user authentication security. Developing an intuitive and user-friendly image grid selection interface. Implementing a robust OTP mechanism to add an additional layer of security. Ensuring the secure storage and transmission of sensitive user data through encryption and secure hashing.
What we learned
Through this project, we learned a great deal about advanced authentication mechanisms and the complexities involved in creating secure systems. Specifically, we gained insights into:
The importance of user experience in security systems. Various encryption and hashing techniques to protect user data. Implementing multi-factor authentication methods like OTP. The challenges of balancing security with usability.
What's next for the Implementation of three level security system using image
In the future, we plan to enhance our system by:
Improving User Experience: Continuously refining the user interface to make the image selection process even more intuitive and accessible. Adding Biometric Authentication: Integrating biometric authentication methods, such as fingerprint or facial recognition, as an additional layer of security. Enhanced Image Selection: Using AI and machine learning to analyze and enhance the security of image selection patterns. Scalability: Ensuring the system can handle a larger number of users and more complex authentication sequences. Continuous Security Testing: Regularly conducting security audits and testing to identify and address potential vulnerabilities. By continually improving and adapting our system, we aim to provide a robust and user-friendly authentication solution that meets the evolving security needs of users.
Log in or sign up for Devpost to join the conversation.