Samra - Graphical Passwords

You are on page 1of 11

Software Requirements

Specification
For

Graphical Password by Image


Segmentation

Version 1.0 approved

Prepared by

Samra Afzal
Aimam Naseem

Aligarh Muslim University, Aligarh

Sept 9, 2016
Software Requirements Specification for Graphical Password by Image segmentation Page ii

Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................1
1.1 Purpose ............................................................................................................................................. 1
1.2 Document Conventions .................................................................................................................... 1
1.3 Intended Audience and Reading Suggestions................................................................................... 1
1.4 Product Scope ................................................................................................................................... 1
1.5 References......................................................................................................................................... 1
2. Overall Description ..................................................................................................................1
2.1 Product Perspective .......................................................................................................................... 2
2.2 Product Functions ............................................................................................................................. 2
2.3 User Classes and Characteristics ...................................................................................................... 2
2.4 Operating Environment .................................................................................................................... 2
2.5 Design and Implementation Constraints ........................................................................................... 2
2.6 User Documentation ......................................................................................................................... 2
2.7 Assumptions and Dependencies ....................................................................................................... 3
3. External Interface Requirements ...........................................................................................3
3.1 User Interfaces .................................................................................................................................. 3
4. System Features .......................................................................................................................5
4.1 System Feature 1 .............................................................................................................................. 4
4.2 System Feature 2 (and so on)............................................................................................................ 4
5. Other Nonfunctional Requirements .......................................................................................6
5.1 Performance Requirements............................................................................................................... 4
5.2 Safety Requirements ......................................................................................................................... 6
5.3 Security Requirements...................................................................................................................... 7
5.5 Business Rules .................................................................................................................................. 7
6. Other Requirements ................................................................................................................7
Appendix A: Glossary....................................................................................................................7
Appendix B: Analysis Models .......................................................................................................8
Software Requirements Specification for Graphical Password by Image Segmentation Page 1

1. Introduction

1.1 Purpose
This software requirement specification (SRS) document describes the functional and non-functional
description of the “Graphical Password by Image Segmentation “. The working and objectives is
briefly summarized followed by detail description of the systems scope. Vision, use case, features
and other related requirement issues. In the project’s later phases, such as
system design, database design, implementation and testing, this document should be referred
as functional model of the system.

1.2 Document Conventions


The typographical conventions used in writing this SRS are:
• SRS main headings: Font=Arial, Bold, Size=18.
• SRS headings: Font=Arial, Bold, Size=14.
• SRS sub headings: Font=Times new roman, size=11.
• SRS body text: Font=Arial, Size=11.
• Header and footer- Font size 10, Bold, italic, Times New Roman.
The document contains header on all pages. The header is the name of the project on the top left
top and the page number on the top right top of the page.

1.3 Intended Audience and Reading Suggestions


The document is intended for different types of readers such as developers, and the authorized
users. The rest of this SRS contains an overall description, external interface requirements,
system features and other non-functional requirements.

• Developers: Developers will develop the functional requirements given in SRS.


• Testers: Testers will validate the requirements of the SRS.
• Users: Users will check that is their requirements are fulfilled or not.

1.4 Product Scope


The main aim of this project, ‘Graphical password by image segmentation’ is to Provides strong
security against bot net attacks or hackers.The system focus on attacks of graphical password
algorithms. Such passwords are easier to remember & hard to guess.

1.5 References
[1] IEEE Standard 181-1998]: The standard followed by the current SRS.
[2] Roger S. Pressman, “Software Engineering: A Practitioner’s Approach”, 7 th Edition, McGraw-
Hill, Singapore, 2011.
Software Requirements Specification for Graphical Password by Image Segmentation Page 2

[3] Graphical password by image segmentation, http://nevonprojects.com/graphical-password-by-


image-segmentation/ , August’2016

2. Overall Description

2.1 Product Perspective


In this project, the main aim is to enhance the security of users using GRAPHICAL passwords.
Enhanced security measures will be taken to improve the security of the system.

2.2 Product Functions


In this product, we are using functions such as:

• Image Submission
• Authentication

2.3 User Classes and Characteristics


Users can use this system to provide security to their system.

2.4 Operating Environment


Hardware Requirement:
• i3 Processor-Based Computer or higher
• Memory: 1 GB RAM
• Hard Drive: 50 GB
• Monitor

Software Requirement:
• Windows 7 or higher
• Visual studio 2010.
• SQL Server 2008

2.5 Design and Implementation Constraints

Input design: This involves:


Software Requirements Specification for Graphical Password by Image Segmentation Page 3

• User to input an image as its password and only user knows what the image looks
like as a whole.
• An image is used instead of typing password or creating patterns.

2.6 Assumptions and Dependencies


There are many dependencies and assumptions associated with the software. They are:
• Every user is expected to have a valid graphical password.
• Every user shall solve the puzzle in the given time/moves.
• The customer shall not provide an image that can be easily predicted by the hackers like an
image of a face or an animal

3. External Interface Requirements

3.1 User Interface


The interface between user and the system include many provisions from where they can access
the whole system. It contains the option list to move one form to another that is as follows :
• Users have to interact with “START PAGE”.
• Pick image from gallery.
• Generate Graphical password.
• Exit

Fig-1 Fig-2
Software Requirements Specification for Graphical Password by Image Segmentation Page 4

Fig-3 Fig-4

Fig-5
Software Requirements Specification for Graphical Password by Image Segmentation Page 5

4. System Features

The graphical password by image segmentation allows user to input an image as its password and
only user knows what the image looks like as a whole. Now if next time user logs on the system the
image is shown as in a jumbled order. At this time only the user who provided the image knows
what the actual image looks like and he must the parts in horizontal direction from left to right one
row at a time according to the order in which parts were arranged in the original image. So the user
is granted access after successful attempt.

4.1 Image Submission

4.1.1 Description

User submits an image to create password, as shown in fig-2.

4.1.2 Functional Requirements

FREQ-1 System should provide path to store image.


FREQ-2 System then fragments the image into the grid/array.
FREQ-3 System then stores them accordingly.

4.2 Generation of graphical password

4.2.1 Description

A Unique graphical password generated by the system in order to provide high security
against hackers. The randomly generated jumbled image is used for authenticating users, as
shown in fig-3.

4.2.2 Stimulus/Response Sequences

The system comprises of 5 major modules as follows:


• Image Submission:

- User can submit image.

• Image Fragmentation:

- System then fragments/ divides the image into an 8*8 grid.


Software Requirements Specification for Graphical Password by Image Segmentation Page 6

• Image Parts Storage:

- The image parts are separated and stored accordingly.

• Part Jumbling:

- The parts are then providing to user in a jumbled order.

• Authentication:
After selecting the parts in order of original image a successful authentication is done else
not

4.1.3 Functional Requirements

FREQ-1: System should provide a window for graphical password generation.


FREQ-2: System should be able to save the generated graphical password

4.3 Authentication

4.3.1 Discription

Only authenticated users are able to access the system. The users can be given authorization only
by the system, as shown in fig-5.

4.3.2 Functional Requirements

FREQ-1: System should provide a jumbled/puzzle image.


FREQ-2: System should provide necessary validation for input data.
FREQ-3: System should respond with appropriate moves.
FREQ-4: User image should be compare securely .

4.3.3 Non Functional Requirements

NFREQ-1: Solving of jumble image should be in given time/moves.

5. Other Nonfunctional Requirements

5.1 Safety Requirements


Access to computer systems is most often based on the use of alphanumeric passwords. However,
users have difficulty remembering a passwor that is long and random appearing. Instead, they
Software Requirements Specification for Graphical Password by Image Segmentation Page 7

create short, simple, insecure passwords. Graphical password have been design to try to make
passwords more memorable and easier for people to use and, therefore, more secure.

5.2 Security Requirements


Any unauthorized user should be prevented from accessing the system.

5.3 Business Rules


This Graphical password by image segmentation system is having priority role in keeping the
secrecy of user’s system. It helps in securing/protecting user’s system, important folders, and
applications in a manner nobody can directly access. Thus the project is having a big scope and
space in today’s society

6. Other Requirements
The registration of new user requires to provide an image password.

Appendix A: Glossary

FREQ: Functional Requirement


NFREQ: Non Functional Requirement
SRS: Software Requirement Specification
Software Requirements Specification for Graphical Password by Image Segmentation Page 8

Appendix B: Analysis Models

START PAGE

IMAGE SUBMISSION

IMAGE
FRAGMENTATION

PART
JUMBLING

IMAGE PARTS
STORAGE

AUTHENTICATION
Software Requirements Specification for Graphical Password by Image Segmentation Page 9

Hierarchical Representation

Graphical Password System by Image Segmentation

User

Select graphical
password

Desktop login

Exit

You might also like