SlideShare a Scribd company logo
3D PASSWORD
Presented by
S.Banupriya
II MCA
Authentication is an important factor of
security.
There are many authentication are
available such as graphical passwords,
Biometric identification, etc.,
But each of these had some drawbacks.
To overcome the limitations of the
existing authentication techniques, a new
improved authentication scheme is
introduced, i.e. 3D password.
Abstract
Commonly used authentication schemes
are textual passwords, graphical
passwords and biometrics.
3D password is a multifactor
authentication scheme.
To be authenticated, we require a 3D
virtual environment.
Introduction
Authentication
Graphical password
Biometrics
Textual password
3D password
3D virtual environment
Keywords
Knowledge based
Recall based
Recognition based
Token based
e.g. smart card
Biometric based
Fingerprint ,palm prints ,hand
geometry ,face
recognition
Graphical passwords
Recognition based
Recall based
Authentication scheme
Multifactor Authentication
Combine all existing authentication
systems.
Contains several objects or item with
which the user can interact.
It reflects the users performances and
requirements.
Description
Recall based techniques require the user
to repeat our reproduce the secret that
the user created before.
Textual Passwords should be easy to
remember at the same time hard to guess.
One major drawback of textual password
is that Full password space for 8
characters consisting of both numbers
and characters is 2 *1024.
From research 25% of the passwords out
of 15,000 users can guessed correctly by
using brute force dictionary.
Textual Passwords
Graphical password are based on the
idea that a users can recall and recognize
pictures more than words.
But most graphical passwords are
susceptible for shoulder surfing attacks,
where an attacker can observe or record
the valid user’s graphical password by
camera.
 Currently most of the graphical
password are in the research phase and
require more enhancement and usability
studies to develop them in the market.
Graphical Passwords
The 3D Password scheme is a new
authentication scheme that combines
RECOGNITION + RECALL + TOKENS +
BIOMETRIC in one authentication system.
The system of authentication presents a 3D
virtual environment to the user where in the
user navigates and interacts with the multitude
of objects that may be present.
The order in which actions and interactions
are performed with respect to the objects
constitutes the user’s 3D password.
3D Passwords
Flexibility
Strength
Ease to memorize
Respect of privacy
Advantages
Time and memory requirements
Cost of implementations and
maintenance
Disadvantages
Critical servers.
Nuclear and military facilities.
Airplanes and jetfighters.
ATMs, PDAs, Desktop computers and
laptops.
Aerospace, etc.,
Applications
3D password scheme is a very strong
authentication scheme.
It is very difficult to crack the password
which is created using such a strong
authentication scheme.
This paper proposes the mechanism to
make existing 3D password system
stronger against such kind of attacks.
Conclusion
This paper proposes the solution to make
the existing 3D password authentication
system stronger.
 But at the same time it is making the
system more complicated.
Handling lots of image processing and
speech recognition task is the area of
research in future.
Future Enhancement
References
[1] Surabhi Anand, Priya Jain, Nitin and Ravi Rastogi,
“Security Analysis and Implementation of 3-Level
Security System Using Image Based Authentication” the
14th IEEE International Conference on Modeling and
Simulation, Oregon, USA, 2012
[2] Sonia Chiasson, Elizabeth Stobert, Alain Forget,
Robert Biddle and Paul C. van Oorschot , “Persuasive
Cued Click-Points: Design, Implementation, and
Evaluation of a Knowledge-Based Authentication
Mechanism”, IEEE Transactions on Dependable and
Secure Computing, Vol. 9, No. 2 March/April 2012
[3] Chippy.T and R.Nagendran , “Defenses against large
scale online password guessing attacks by using
persuasive click points”, International Journal of
Communications and Engineering Volume 03– No.3,
 Issue: 01 March2012
THANK YOU

More Related Content

What's hot

C0361419
C0361419C0361419
C0361419
iosrjournals
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3d password
3d password3d password
3d password
shivi123456
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
3D password
3D password3D password
3D password
Jaya Sinha
 
3d passwords
3d passwords 3d passwords
3d passwords
Sunanda Bansal
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorNitesh Kumar
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
IOSR Journals
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
3d password
3d  password3d  password
3d password
SHARDA SHARAN
 

What's hot (19)

3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
C0361419
C0361419C0361419
C0361419
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D password
3D password 3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D password
3D password3D password
3D password
 
3d passwords
3d passwords 3d passwords
3d passwords
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
term 2
term 2term 2
term 2
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3d password
3d  password3d  password
3d password
 

Similar to 3 d

wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
3 d password
3 d password3 d password
3 d password
hetal gauswami
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
abhaydevamore1
 
3d password
3d password3d password
3d password
Abhirami P S
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
eSAT Publishing House
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 

Similar to 3 d (20)

wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3 d password
3 d password3 d password
3 d password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
 
3d password
3d password3d password
3d password
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
3 d password
3 d password 3 d password
3 d password
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

3 d

  • 2. Authentication is an important factor of security. There are many authentication are available such as graphical passwords, Biometric identification, etc., But each of these had some drawbacks. To overcome the limitations of the existing authentication techniques, a new improved authentication scheme is introduced, i.e. 3D password. Abstract
  • 3. Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. 3D password is a multifactor authentication scheme. To be authenticated, we require a 3D virtual environment. Introduction
  • 5. Knowledge based Recall based Recognition based Token based e.g. smart card Biometric based Fingerprint ,palm prints ,hand geometry ,face recognition Graphical passwords Recognition based Recall based Authentication scheme
  • 7.
  • 8. Combine all existing authentication systems. Contains several objects or item with which the user can interact. It reflects the users performances and requirements. Description
  • 9. Recall based techniques require the user to repeat our reproduce the secret that the user created before. Textual Passwords should be easy to remember at the same time hard to guess. One major drawback of textual password is that Full password space for 8 characters consisting of both numbers and characters is 2 *1024. From research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary. Textual Passwords
  • 10. Graphical password are based on the idea that a users can recall and recognize pictures more than words. But most graphical passwords are susceptible for shoulder surfing attacks, where an attacker can observe or record the valid user’s graphical password by camera.  Currently most of the graphical password are in the research phase and require more enhancement and usability studies to develop them in the market. Graphical Passwords
  • 11. The 3D Password scheme is a new authentication scheme that combines RECOGNITION + RECALL + TOKENS + BIOMETRIC in one authentication system. The system of authentication presents a 3D virtual environment to the user where in the user navigates and interacts with the multitude of objects that may be present. The order in which actions and interactions are performed with respect to the objects constitutes the user’s 3D password. 3D Passwords
  • 13. Time and memory requirements Cost of implementations and maintenance Disadvantages
  • 14. Critical servers. Nuclear and military facilities. Airplanes and jetfighters. ATMs, PDAs, Desktop computers and laptops. Aerospace, etc., Applications
  • 15. 3D password scheme is a very strong authentication scheme. It is very difficult to crack the password which is created using such a strong authentication scheme. This paper proposes the mechanism to make existing 3D password system stronger against such kind of attacks. Conclusion
  • 16. This paper proposes the solution to make the existing 3D password authentication system stronger.  But at the same time it is making the system more complicated. Handling lots of image processing and speech recognition task is the area of research in future. Future Enhancement
  • 17. References [1] Surabhi Anand, Priya Jain, Nitin and Ravi Rastogi, “Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication” the 14th IEEE International Conference on Modeling and Simulation, Oregon, USA, 2012 [2] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle and Paul C. van Oorschot , “Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism”, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2 March/April 2012 [3] Chippy.T and R.Nagendran , “Defenses against large scale online password guessing attacks by using persuasive click points”, International Journal of Communications and Engineering Volume 03– No.3,  Issue: 01 March2012