Three-Level Password System Using Python

Download Project Document/Synopsis

Nevon Python project Ideas
nevon software

Nowadays, we have known that computer security mostly depends on passwords to verify and authenticate users. There are many authentication schemes proposed and most of them still have weaknesses. Some of them are based on the physical and behavioural properties of the user such as voice recognition, and some others are based on knowledge of the user such as textual and graphical passwords. However, these schemes are still not secure enough and allow attackers to steal the data easily.

Our python-based Three-Level Password System is designed to overcome the problem. It is an authentication system that only allows users to access the system if they have entered the correct password. The project includes three levels of user authentication – Textual, Image and Graphical. That way there would be negligible chances of the bot or anyone else cracking the passwords, even if they crack the first or second level it would be impossible to crack the third.

Our python-based consists of 1 module – User. The user can register by adding and entering a conventional alphanumeric password. For second-level authentication, the user can set a password based on color combinations through RGB button combinations. To set the third-level authentication, the user will need to upload their desired image into the system.

To log in, the user will need to enter their email and password. Then they would need to choose the RGB combination password and at the last, they would need to choose the correct pattern or combination of the image, from the top-left arrangement, from the jumbled puzzle.

In this project, the front end involves Html, CSS and JavaScript and the back end involves Python. The database: used is MySQL Database and Django is used for the framework.


  • TThe system is easy to maintain.
  • It is user-friendly.
  • The system is user-friendly and has a simple interface.
  • Provides strong security against bot attacks or hackers.
  • Users can set or upload their own images.
  • Protects systems vulnerable to attacks.