You are on page 1of 2

Methodology

This images-story based authentication system is used to enhance the security of current text
based username-password system. The username and password still used in this system,
additional set of images and two connector words will be used as the authentication process. This
images and words will be the second password for the user. Therefore, the user must remember
the images and words in order to login into the system. On the registration process, the users
required to fill in personal information like usual registration, additionally the user has to choose
and remember three images from the set of images and set their own two words to connect the
images to create a story. The user should choose the images and words that are easy to
remember. This system is only for demo purposes, for better security the set of images can be
generated randomly.

Figure 1: Registration Form

In the login form, the users required to enter their username, password, selected images and
words. The images and words must be in order to be able get into the system. For the demo
purposes, the images and words matching done by passing the variable, each image have a
variable that assigned with the image name. For the words, the words in textbox on the
registration form will be assigned to a variable then passed to login form for the matching. In the
actual implementation, the username, password, images, and words should be stored in the
encrypted database to prevent data leaking to the hacker.

You might also like