SlideShare a Scribd company logo
1 of 11
ABSTRACT
 Normally the authentication scheme the user undergoes is
particularly very lenient or very strict. Throughout the years
authentication has been a very interesting approach.
 With all the means of technology developing, it can be very easy for
'others' to fabricate or to steal identity or to hack someone’s
password.
 So from here the concept of 3
EXISTING SYSTEM
 Current authentication systems suffer from many weaknesses.
Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or brute
force attacks.
 Many available graphical passwords have a password space that
is less than or equal to the textual password space. Smart cards
or tokens can be stolen. Many biometric authentications have
been proposed.
 However, users tend to resist using biometrics because of their
intrusiveness and the effect on their privacy. Moreover,
biometrics cannot be revoked. The 3Dpassword is a multi factor
authentication scheme.
PROPOSED SYSTEM
 The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes.
 Users have the freedom to select whether the 3D password will be
solely recall, biometrics, recognition, or token based, or a
combination of two schemes or more.
 This freedom of selection is necessary because users are different
and they have different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
BRIEF DESCRIPTION
OF SYSTEM
 The 3D password is a multi factor authentication scheme. The 3D
password presents a 3D virtual environment containing various virtual
objects.
 The user navigates through this environment and interacts with the
objects. The 3D password is simply the combination and the sequence of
user interactions that occur in the 3D virtual environment.
 The 3D password can combine recognition, recall, token, and biometrics
based systems into one authentication scheme. This can be done by
designing a 3D virtual environment that contains objects that request
information to be recalled, information to be recognized, tokens to be
presented, and biometric data to be verified.
3D PASSWORD
AUTHENTICATION
3D PASSWORD
APPLICATION
 Critical server many large organizations have critical servers that are
usually protected by a textual password. A 3D password authentication
proposes a sound replacement for a textual password.
 Nuclear and military facilities such facilities should be protected by the
most
 Powerful authentication systems. The 3D password has a very large
probable password space, and since it can contain token, biometrics,
recognition and knowledge based
 Authentications in a single authentication system, it is a sound choice for
high level security locations.
ADVANTAGES
 Flexibility:3D Passwords allows Multifactor authentication biometric ,
textual passwords can be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited passwords possibility.
 Ease to Memorize: can be remembered in the form of short story.
 Respect of Privacy: Organizers can select authentication schemes that
respect users privacy.
DISADVANTAGES……
 Shoulder Surfing Attacks: Attacker uses camera to record the users
3D passwords.This attack is more succesful.
 Timing Attack: The Attacker observes how long it takes the
legitimate user to perform correct log in using 3D Password.which
gives an indication of 3-D Passwords length.This attack cannot be
succesful since it gives the attacker mere hints.
CONCLUSION
 The 3D password is a multi factor authentication scheme that combines
the various authentication schemes into a single 3D virtual environment.
The virtual environment can contain any existing authentication scheme
or even any upcoming authentication scheme or even any upcoming
authentication schemes by adding it as a response to actions performed
on an object.
 Therefore the resulting password space becomes very large compared to
any existing authentication schemes. The design of the 3D virtual
environment the selection of objects inside the environment and the
object's type reflect the resulted password space. It is the task of the
system administrator to design the environment and to select the
appropriate object that reflects the protected system requirements.
Thanks…!!!!

More Related Content

What's hot

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 

What's hot (20)

3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D password
3D password3D password
3D password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
3D Password
3D Password3D Password
3D Password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
3d internet
3d internet3d internet
3d internet
 
Holography technology
Holography technologyHolography technology
Holography technology
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 

Viewers also liked

Viewers also liked (11)

3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
 
т.г. шевченко
т.г. шевченкот.г. шевченко
т.г. шевченко
 
Hololens-pechakucha
Hololens-pechakuchaHololens-pechakucha
Hololens-pechakucha
 
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart GuideFEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
 
هدف إدارة السلامة والصحة المهنية
هدف إدارة السلامة والصحة المهنيةهدف إدارة السلامة والصحة المهنية
هدف إدارة السلامة والصحة المهنية
 
Iskira starFlash
Iskira starFlashIskira starFlash
Iskira starFlash
 
Thiết kế hệ thống treo cho xe tải 4 tấn
Thiết kế hệ thống treo cho xe tải 4 tấnThiết kế hệ thống treo cho xe tải 4 tấn
Thiết kế hệ thống treo cho xe tải 4 tấn
 
Присоединение Астраханского ханства к Российскому государству. 9-й класс
Присоединение Астраханского ханства к Российскому государству. 9-й классПрисоединение Астраханского ханства к Российскому государству. 9-й класс
Присоединение Астраханского ханства к Российскому государству. 9-й класс
 
Percussion syllabus 2017 2019
Percussion syllabus 2017 2019Percussion syllabus 2017 2019
Percussion syllabus 2017 2019
 
Aparato digestivo2
Aparato digestivo2Aparato digestivo2
Aparato digestivo2
 
Power tool-safety
Power tool-safetyPower tool-safety
Power tool-safety
 

Similar to 3D-Password

wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 

Similar to 3D-Password (20)

3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3d password
3d  password3d  password
3d password
 
3 d
3 d3 d
3 d
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3 d password
3 d password3 d password
3 d password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3d password
3d password3d password
3d password
 
C0361419
C0361419C0361419
C0361419
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password 3D password
3D password
 
3 d password
3 d password3 d password
3 d password
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d
3d3d
3d
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3d pass words
3d pass words3d pass words
3d pass words
 

More from Devyani Vaidya

More from Devyani Vaidya (20)

Hashing
HashingHashing
Hashing
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large files
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
secued cloud
 secued cloud secued cloud
secued cloud
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
Environmental law
Environmental lawEnvironmental law
Environmental law
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwaves
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile
 
Applet programming
Applet programming Applet programming
Applet programming
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directory
 
History of Laptop
History of LaptopHistory of Laptop
History of Laptop
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet
 
Resource management
Resource managementResource management
Resource management
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

3D-Password

  • 1.
  • 2. ABSTRACT  Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach.  With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password.  So from here the concept of 3
  • 3. EXISTING SYSTEM  Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.  Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed.  However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme.
  • 4. PROPOSED SYSTEM  The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.  This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
  • 5. BRIEF DESCRIPTION OF SYSTEM  The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects.  The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment.  The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
  • 7. 3D PASSWORD APPLICATION  Critical server many large organizations have critical servers that are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password.  Nuclear and military facilities such facilities should be protected by the most  Powerful authentication systems. The 3D password has a very large probable password space, and since it can contain token, biometrics, recognition and knowledge based  Authentications in a single authentication system, it is a sound choice for high level security locations.
  • 8. ADVANTAGES  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 9. DISADVANTAGES……  Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesful.  Timing Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D Password.which gives an indication of 3-D Passwords length.This attack cannot be succesful since it gives the attacker mere hints.
  • 10. CONCLUSION  The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.  Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements.