Samra - Graphical Passwords
Samra - Graphical Passwords
Samra - Graphical Passwords
Specification
For
Prepared by
Samra Afzal
Aimam Naseem
Sept 9, 2016
Software Requirements Specification for Graphical Password by Image segmentation Page ii
Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................1
1.1 Purpose ............................................................................................................................................. 1
1.2 Document Conventions .................................................................................................................... 1
1.3 Intended Audience and Reading Suggestions................................................................................... 1
1.4 Product Scope ................................................................................................................................... 1
1.5 References......................................................................................................................................... 1
2. Overall Description ..................................................................................................................1
2.1 Product Perspective .......................................................................................................................... 2
2.2 Product Functions ............................................................................................................................. 2
2.3 User Classes and Characteristics ...................................................................................................... 2
2.4 Operating Environment .................................................................................................................... 2
2.5 Design and Implementation Constraints ........................................................................................... 2
2.6 User Documentation ......................................................................................................................... 2
2.7 Assumptions and Dependencies ....................................................................................................... 3
3. External Interface Requirements ...........................................................................................3
3.1 User Interfaces .................................................................................................................................. 3
4. System Features .......................................................................................................................5
4.1 System Feature 1 .............................................................................................................................. 4
4.2 System Feature 2 (and so on)............................................................................................................ 4
5. Other Nonfunctional Requirements .......................................................................................6
5.1 Performance Requirements............................................................................................................... 4
5.2 Safety Requirements ......................................................................................................................... 6
5.3 Security Requirements...................................................................................................................... 7
5.5 Business Rules .................................................................................................................................. 7
6. Other Requirements ................................................................................................................7
Appendix A: Glossary....................................................................................................................7
Appendix B: Analysis Models .......................................................................................................8
Software Requirements Specification for Graphical Password by Image Segmentation Page 1
1. Introduction
1.1 Purpose
This software requirement specification (SRS) document describes the functional and non-functional
description of the “Graphical Password by Image Segmentation “. The working and objectives is
briefly summarized followed by detail description of the systems scope. Vision, use case, features
and other related requirement issues. In the project’s later phases, such as
system design, database design, implementation and testing, this document should be referred
as functional model of the system.
1.5 References
[1] IEEE Standard 181-1998]: The standard followed by the current SRS.
[2] Roger S. Pressman, “Software Engineering: A Practitioner’s Approach”, 7 th Edition, McGraw-
Hill, Singapore, 2011.
Software Requirements Specification for Graphical Password by Image Segmentation Page 2
2. Overall Description
• Image Submission
• Authentication
Software Requirement:
• Windows 7 or higher
• Visual studio 2010.
• SQL Server 2008
• User to input an image as its password and only user knows what the image looks
like as a whole.
• An image is used instead of typing password or creating patterns.
Fig-1 Fig-2
Software Requirements Specification for Graphical Password by Image Segmentation Page 4
Fig-3 Fig-4
Fig-5
Software Requirements Specification for Graphical Password by Image Segmentation Page 5
4. System Features
The graphical password by image segmentation allows user to input an image as its password and
only user knows what the image looks like as a whole. Now if next time user logs on the system the
image is shown as in a jumbled order. At this time only the user who provided the image knows
what the actual image looks like and he must the parts in horizontal direction from left to right one
row at a time according to the order in which parts were arranged in the original image. So the user
is granted access after successful attempt.
4.1.1 Description
4.2.1 Description
A Unique graphical password generated by the system in order to provide high security
against hackers. The randomly generated jumbled image is used for authenticating users, as
shown in fig-3.
• Image Fragmentation:
• Part Jumbling:
• Authentication:
After selecting the parts in order of original image a successful authentication is done else
not
4.3 Authentication
4.3.1 Discription
Only authenticated users are able to access the system. The users can be given authorization only
by the system, as shown in fig-5.
create short, simple, insecure passwords. Graphical password have been design to try to make
passwords more memorable and easier for people to use and, therefore, more secure.
6. Other Requirements
The registration of new user requires to provide an image password.
Appendix A: Glossary
START PAGE
IMAGE SUBMISSION
IMAGE
FRAGMENTATION
PART
JUMBLING
IMAGE PARTS
STORAGE
AUTHENTICATION
Software Requirements Specification for Graphical Password by Image Segmentation Page 9
Hierarchical Representation
User
Select graphical
password
Desktop login
Exit