SlideShare a Scribd company logo
1 of 29
Multi-Factor Authentication using
3D password
St. John College of Engineering and Management
Presented by:
Pratik Prasad (2162035)
Aakash Kamble (1132084)
Nirzar Bhaidkar (1132043)
Guided by:
Ms. Snehal D’mello
Contents:
• Abstract
• Introduction to Domain
• Problem Statement
• Literature Survey
• System Design
• Proposed Methodology
Department of ComputerEngineering 2
Abstract:
Department of ComputerEngineering 3
The design of secure authentication is quite challenging. Text
passwords need to be stored or remembered. Generally simple
passwords are set so as to quickly recall them. The proposed
system will replace this with a 3D password. Once implemented
and you log in to a secure site, the 3D password GUI opens up.
There is an additional textual password which the user can simply
put. Once he goes through the first authentication, a 3D virtual
room will open on the screen.
Introduction to Domain:
• The 3-D password is a multi-factor authentication scheme.
• It can combine all existing authentication schemes into a single 3-D
virtual environment.
• The sequence of actions and interaction towards the objects inside
the 3-D environment constructs the users 3-D password.
Department of ComputerEngineering 4
Problem Statement:
• The existing authentication system takes more than enough amount
of details from user.
• Also, user has to remember considerable amount of login details and
large passwords which are difficult to memorize.
• Graphical password can be easily recorded as it takes long time to
scan.
• Combination of QR code and 3D password will increase the security
as compared to other login processes.
Department of ComputerEngineering 5
Literature Survey I:
3D Password Based Authentication System using Multiple Layers by Dr. Dinesh Goyal
• Graphical passwords is designed to make passwords more memorable
and easier for the end users to use.
• Using a graphical password or 3D password, user clicks on images
rather than type alphanumeric characters.
• Designed a secure multi-layer password framework for textual, bio
metric as well as graphical password.
Department of ComputerEngineering 6
Literature Survey I:
3D Password Based Authentication System using Multiple Layers by Dr. Dinesh Goyal
Advantages:
• The security of the system is very high.
• Graphical password schemes provide a way of making more human-
friendly passwords.
• Dictionary attacks and brute force search are infeasible.
Disadvantages:
• Require much more space than text based passwords.
• Password registration and login-process take too long.
• Shoulder Surfing is possible.
Department of ComputerEngineering 7
Literature Survey II:
Study on Three Dimensional(3D) Password Authentication byFawaz
• When the 3D password is implemented and user log in to a protected
site, the 3D password GUI opens up.
• Initially user can combine the earlier existing schemes for example,
textual passwords, bio-metrics, etc. In a single 3D virtual
environment.
• The user is given the permission for choosing the type of
authentication strategy which he is comfortable.
Department of ComputerEngineering 8
Literature Survey II:
Study on Three Dimensional(3D) Password Authentication byFawaz
Advantages:
• 3D password is easy to be changed.
• This password is better and more secure when compared to existing
techniques.
• 3D password cant be hacked by any other person easily.
Disadvantages:
• Lot of time and memory consuming.
• 3D scheme is expensive when compared to others.
• Vision-less person find it hard to use this technique.
Department of ComputerEngineering 9
Literature Survey III:
A novel 3D Graphical passwordschema by A.E.Saddik
• The projected system is a multi-factor authentication scheme which
combines the advantages of other authentication schemes.
• User can choose whether the 3D password will be only recall , bio
metrics , recognition, or token based, or a combination of two
schemes or more.
• This choice of selection is necessary because user are different and
they have different requirements.
Department of ComputerEngineering 10
Literature Survey III:
A novel 3D Graphical passwordschema by A.E.Saddik
Advantages:
• Difficult to Crack.
• 3D graphical password are easy to remember.
Disadvantages:
• Lot of program coding is necessary.
• Requires computer expertise.
• It is very expensive.
Department of ComputerEngineering 11
Proposed Methodology:
Department of ComputerEngineering 12
System Design:
• ER Diagram
• Control Flow Diagram
• Use Case Diagram
• Sequence Diagram
• DFD Level 0,1&2
Department of ComputerEngineering 13
Implementation:
THANK YOU!

More Related Content

What's hot (20)

3D-Password
3D-Password 3D-Password
3D-Password
 
3D password
3D password 3D password
3D password
 
3d password
3d password3d password
3d password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3 d password
3 d password3 d password
3 d password
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3 d password
3 d password 3 d password
3 d password
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d  password3d  password
3d password
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
3D Password
3D Password3D Password
3D Password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 

Similar to Multi Factor Authentication using 3D password

A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationnuruladnan11
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @heregadisagemechu1
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...SamruddhiGorhe1
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android projectMuthukumaranM13
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriyajanapriyanaidu
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdfGirishKA4
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptxabhaydevamore1
 

Similar to Multi Factor Authentication using 3D password (20)

A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
3 d password
3 d password3 d password
3 d password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
3D Password
3D Password3D Password
3D Password
 
GADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @hereGADISA GEMECHUGOOD POWERPOINT .pptx @here
GADISA GEMECHUGOOD POWERPOINT .pptx @here
 
3d password
3d password3d password
3d password
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
Whatscrypt Messenger for android project
Whatscrypt Messenger for android projectWhatscrypt Messenger for android project
Whatscrypt Messenger for android project
 
3 d
3 d3 d
3 d
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Technical.pdf
Technical.pdfTechnical.pdf
Technical.pdf
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3D Password
3D Password3D Password
3D Password
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
 

Recently uploaded

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 

Recently uploaded (20)

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 

Multi Factor Authentication using 3D password

  • 1. Multi-Factor Authentication using 3D password St. John College of Engineering and Management Presented by: Pratik Prasad (2162035) Aakash Kamble (1132084) Nirzar Bhaidkar (1132043) Guided by: Ms. Snehal D’mello
  • 2. Contents: • Abstract • Introduction to Domain • Problem Statement • Literature Survey • System Design • Proposed Methodology Department of ComputerEngineering 2
  • 3. Abstract: Department of ComputerEngineering 3 The design of secure authentication is quite challenging. Text passwords need to be stored or remembered. Generally simple passwords are set so as to quickly recall them. The proposed system will replace this with a 3D password. Once implemented and you log in to a secure site, the 3D password GUI opens up. There is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen.
  • 4. Introduction to Domain: • The 3-D password is a multi-factor authentication scheme. • It can combine all existing authentication schemes into a single 3-D virtual environment. • The sequence of actions and interaction towards the objects inside the 3-D environment constructs the users 3-D password. Department of ComputerEngineering 4
  • 5. Problem Statement: • The existing authentication system takes more than enough amount of details from user. • Also, user has to remember considerable amount of login details and large passwords which are difficult to memorize. • Graphical password can be easily recorded as it takes long time to scan. • Combination of QR code and 3D password will increase the security as compared to other login processes. Department of ComputerEngineering 5
  • 6. Literature Survey I: 3D Password Based Authentication System using Multiple Layers by Dr. Dinesh Goyal • Graphical passwords is designed to make passwords more memorable and easier for the end users to use. • Using a graphical password or 3D password, user clicks on images rather than type alphanumeric characters. • Designed a secure multi-layer password framework for textual, bio metric as well as graphical password. Department of ComputerEngineering 6
  • 7. Literature Survey I: 3D Password Based Authentication System using Multiple Layers by Dr. Dinesh Goyal Advantages: • The security of the system is very high. • Graphical password schemes provide a way of making more human- friendly passwords. • Dictionary attacks and brute force search are infeasible. Disadvantages: • Require much more space than text based passwords. • Password registration and login-process take too long. • Shoulder Surfing is possible. Department of ComputerEngineering 7
  • 8. Literature Survey II: Study on Three Dimensional(3D) Password Authentication byFawaz • When the 3D password is implemented and user log in to a protected site, the 3D password GUI opens up. • Initially user can combine the earlier existing schemes for example, textual passwords, bio-metrics, etc. In a single 3D virtual environment. • The user is given the permission for choosing the type of authentication strategy which he is comfortable. Department of ComputerEngineering 8
  • 9. Literature Survey II: Study on Three Dimensional(3D) Password Authentication byFawaz Advantages: • 3D password is easy to be changed. • This password is better and more secure when compared to existing techniques. • 3D password cant be hacked by any other person easily. Disadvantages: • Lot of time and memory consuming. • 3D scheme is expensive when compared to others. • Vision-less person find it hard to use this technique. Department of ComputerEngineering 9
  • 10. Literature Survey III: A novel 3D Graphical passwordschema by A.E.Saddik • The projected system is a multi-factor authentication scheme which combines the advantages of other authentication schemes. • User can choose whether the 3D password will be only recall , bio metrics , recognition, or token based, or a combination of two schemes or more. • This choice of selection is necessary because user are different and they have different requirements. Department of ComputerEngineering 10
  • 11. Literature Survey III: A novel 3D Graphical passwordschema by A.E.Saddik Advantages: • Difficult to Crack. • 3D graphical password are easy to remember. Disadvantages: • Lot of program coding is necessary. • Requires computer expertise. • It is very expensive. Department of ComputerEngineering 11
  • 12. Proposed Methodology: Department of ComputerEngineering 12
  • 13. System Design: • ER Diagram • Control Flow Diagram • Use Case Diagram • Sequence Diagram • DFD Level 0,1&2 Department of ComputerEngineering 13
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.