The document discusses a proposed 3D password authentication scheme. It begins with an introduction to common authentication techniques and their drawbacks. It then describes the concept of a 3D virtual environment for creating multi-factor passwords combining recall and recognition. The document outlines the objective to develop a more secure and user-friendly authentication system. It further explains the 3D password scheme, potential attacks and countermeasures, applications, advantages and disadvantages, and future scope.
A biometric technology is use full for authentication process in nowadays.In this presentation i have explained the use of 3d finger authentication, face recognisation,tokens authentication and knowledge authentication.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned aboveBiometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning). Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
A biometric technology is use full for authentication process in nowadays.In this presentation i have explained the use of 3d finger authentication, face recognisation,tokens authentication and knowledge authentication.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned aboveBiometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning). Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
This ppt gives a perfect description about 3d passwords.There is not much known about it ,but i have tried my best to bring the most of the concepts to the front regarding this topic
The 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single 3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes.
An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
The graphical-password approach is sometimes called graphical user authentication (GUI).
3-D PASSWORD is a way of more secured authentication in which password is created in 3d environment.
3d password is a combination of recognition, recall, token, and biometrics based systems.
3D password is a multifactor authentication scheme in which we require a 3D virtual environment for authentication.
Users have choice to select the type of authentication technique.This freedom of selection is necessary because users are different and they have different requirements.
The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects .
3D Password have authentication than other system.
This ppt gives a perfect description about 3d passwords.There is not much known about it ,but i have tried my best to bring the most of the concepts to the front regarding this topic
The 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single 3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes.
An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
The graphical-password approach is sometimes called graphical user authentication (GUI).
3-D PASSWORD is a way of more secured authentication in which password is created in 3d environment.
3d password is a combination of recognition, recall, token, and biometrics based systems.
3D password is a multifactor authentication scheme in which we require a 3D virtual environment for authentication.
Users have choice to select the type of authentication technique.This freedom of selection is necessary because users are different and they have different requirements.
The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects .
3D Password have authentication than other system.
note: A slide for any presentation should not contain more than 4-5 sentences but this presentation has more than the requirement.So, i suggest you to edit as per your requirement and to make it more effective, you can add animations as well.
a study on various techniques on graphical password authentication.
A key area in security research is authentication. Access to system is mostly based on the use of alpha numeric passwords. User felt difficult in remembering the password as that is long and randomly selected and how many passwords will user remember?, it made a complex procedure.
It presents comparison between Persuasive Cued Click Point Graphical Password scheme and Improved Persuasive Cued Click Points. One such category is click-based graphical passwords where a password is composed of a series of clicks on one or more pixel-based images .To log in, user re-select their click-points in the correct order. Click-points that fall within some acceptable tolerance of the original points should be accepted by the system since it is unrealistic to expect users to accurately target individual pixels.
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force
attacks. However, a strong textual password is hard to memorize and recollect .Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.
Various graphical password authentication schemes
were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically.
The human actions such as choosing bad passwords for
new accounts and inputting passwords in an insecure way for later logins are regarded as the weakest link in the authentication chain [16]. Therefore, an authentication scheme should be designed to overcome these vulnerabilities.
In this paper, we present a secure graphical authentication system named Pass Matrix that protects users from becoming victims of shoulder surfing attacks when inputting passwords in public through the usage of one-time login indicators. A login indicator is randomly generated for each pass-image and will be useless after the session terminates. The login indicator provides better security against shoulder surfing attacks, since users use a dynamic pointer to point out the position of their passwords rather than clicking on
the password object directly.
Graphical Password by Watermarking for securityIJERA Editor
The most common authentication method is to use alphanumerical usernames and passwords. This method has
been shown to have considerable disadvantage. For example, users tend to pick passwords that can be easily
guessed. On the other hand, if a password is very difficult to guess, then it is often difficult to remember. To
address this problem, some researchers have developed authentication methods that use pictures as passwords.
Graphical Password based on the fact that humans tend to remember images better. In this paper, we will
propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and
using the random character set generation for each image for resistance to shoulder surfing attack to provide
better system security. All the information images in registration phase will be process by copy right protection
of watermarking where the login page will check this information for security purposes.
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
Today, a large number of people access internet through their smart phones to login to their bank accounts, social networking accounts and various other blogs. In such a scenario, user authentication has emerged as a major security issue in mobile internet. To date, password based authentication schemes have been extensively used to provide authentication and security. The password based authentication has always been cumbersome for the users because human memory is transient and remembering a large number of long and complicated passwords is impossible. Also, it is vulnerable to various kinds of attacks like brute force, rainbow table, dictionary, sniffing, shoulder surfing and so on. As the main contribution of this paper, a new passwordless authentication scheme for smart phones is presented which not only resolves all the weaknesses of password based schemes but also provide robust security. The proposed scheme relieves users from memorizing and storing long and complicated passwords. The proposed scheme uses ECDSA which is based on Elliptic Curve Cryptography (ECC). ECC has remarkable strength and efficiency advantages in terms of bandwidth, key sizes and computational overheads over other public key cryptosystems. It is therefore suitable for resource constraint devices like smart phone. Furthermore, the proposed scheme incorporate CAPTCHA which play a very important role in protecting the web resources from spamming and other malicious activities. To the best of our knowledge, until now no passwordless user authentication protocol based on ECC has been proposed for smart phones. Finally, the security and functionality analysis shows that compared with existing password based authentication schemes, the proposed scheme is more secure and efficient.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. Introduction
Authentication Techniques.
Authentication Schemes.
Drawbacks Of Common Use Authentication Techniques.
3D-Password.
Virtual Environment.
Objective Of 3d Password
Short Video.
3D-Password Secure Authentication Scheme
• Attacks & Countermeasures
• Applications
• Advantages And Disadvantages
Future Scope.
Conclusion.
Acknowledgement.
References.
3. Authentication is one of the most important security service provided to system by the different authentication
schemes or algorithms.
To protect any system authentication must be provided, so that only authorized persons can have right to use or
handle that system & data related to that system securely.
There are many authentication algorithms are available some are effective & secure but having some drawback.
Previously there are many authentication techniques were introduced such as Graphical password, Text
password, Biometric authentication, etc.
5/1/2014 3
4. 1. Knowledge based: means what you know.
Textual password is the best example of this
authentication scheme.
2. Token based: means what you have.
This includes Credit cards, ATM cards, etc
as an example.
GENERALLY, There Are Four Types Of AUTHENTICATION TECHNIQUES
Are Available Such As:
5/1/2014 4
5. Types Continued…
3. Biometrics: means what you are.
Includes Thumb impression, etc.
4. Recognition Based: means what you
recognize. Includes graphical password,
iris recognition, face recognition, etc
5/1/2014
5
6. Ideally there are two types of Authentication schemes are available according
to nature of scheme & techniques used, those types are :-
1) Recall based:
User need to recall or remember his/her password which is created before. Knowledge
based authentication is a part of this technique, E.g. Textual password, graphical
password etc. this technique is commonly used all over the world where security needed.
2) Recognition based:
User need to identify, recognize password created before. Recognition based
authentication can be used in graphical password.
Generally this technique is not use much more as Recall based is used.
5/1/2014 6
7. Still both recall based & recognition based authentication techniques having some drawbacks
& limitations when they are used separately or used single authentication scheme at a time.
Drawbacks:- Current authentication systems suffer from many
weaknesses
Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or
brute force attacks.
Smart cards or tokens can be stolen.
We don‘t use biometric scheme because biometric
having some major drawbacks (like h/w cost is more).
5/1/2014 7
11. For authentication with 3D password a new virtual environment is introduced called as
3D virtual environment where user navigate , moving in 3D virtual environment to create
a password which is based on both the schemes.
There is a 3D Virtual Environment:-
snapshot of Art Gallery snapshot of study room snapshot of weather forecasting office
11
12. To provide more secure authentication technique than existing one.
To design & develop more user friendly & easier authentication scheme
and giving user to freedom of selecting more than one password scheme as
single system.
To overcome the drawbacks & limitations of previously existing systems
(textual password, graphical password etc. )
New scheme should be combination of recall-, recognition -, biometrics-,
and token based authentication schemes.
Objective Of 3D Password?
5/1/2014 12
13. By: Fawaz A.
Alsulaiman, PhD
Researcher
&
Abdulmotaleb El
Saddik, Director
MCRLAb
Document
of
University
of
Ottawa
5/1/2014 13
15. A. Attacks & Countermeasures:
1) Timing Attacks:
This attack is based on how much time required completing successful sign-in using
3D password scheme.
2) Brute force Attacks
In this kind of attacks the attacker has to try n number of possibilities of 3D Password.
5/1/2014 15
16. A. Attacks & Countermeasures:……………continued
3) Well-studied attacks
• In this attack attacker has to study whole password scheme.
• After studied about scheme the attacker tries combination of different attacks on
scheme.
• As 3d password scheme is multi-factor & multi-password authentication scheme,
attacker fail to studied whole scheme. this attacks also not much effective against
3D password scheme
5/1/2014 16
17. 4) Key logger
• In this attack attacker install as software called key logger on system where
authentication scheme is used.
• This software stores text entered through keyboard & those text are stored in text
file.
• In this way this attacks is more effective & useful for only textual password, but as
3D password is multi password authentication scheme.
• So that this kind of attacks are not much effective in this case
A. Attacks & Countermeasures:……………continued
5/1/2014 17
18. A. Attacks & Countermeasures:……………continued
5) Shoulder Surfing attacks
• Attacker uses camera for capturing & recording of 3D password.
• This attack is more effective than any other attacks on 3D password.
• So that 3D password must be performed in a secure place where this attack can‘t
be performed.
• Shoulder surfing attacks is still effective & easily possible against 3D password
5/1/2014 18
19. 1) Networking
Networking involves many areas of computer networks like client-server architecture,
critical servers, etc. To provide more security to server of this architecture 3D password can
be used. It very efficient & more secure way to keep data or important information secure
from unauthorized people. For email applications 3D password is most secure & easier
scheme to used.
2) Nuclear & military areas
3) Airplane & jetfighters
4) Other areas :we can use 3d password authentication scheme to areas such as ATM, Cyber
cafes, Industries (for data security), Laptop‘s or PC‘s, critical servers, web services, etc. &
many more
B. APPLICATIONS
5/1/2014 19
20. 3D Password scheme is combination of re-call based, recognized based into single
authentication technique.
Due to use of multiple schemes into one scheme password space is increased to great
extend.
3D graphical password has no limit.
Password can remember easily.
More secure authentication scheme over currently available schemes.
C . Advantages And Disadvantages
Advantages :
5/1/2014 20
21. Time and memory requirement is large.
Shoulder-suffering attack is still can affect the schema.
More Expensive
Difficult for blind people to use this technology.
Requires sophisticated computer technology.
A lot of program coding is required.
C . Advantages And Disadvantages
…continued
Disadvantages :
5/1/2014 21
22. Future
Scope Time and memory requirement can reduce.
Shoulder-suffering attack is still can be remove.
More Expensive to less expensive
Allow the blind people to use this technology.
A lot of program coding can be reduce.
5/1/2014 22
23. Commonly used authentication schemes are vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects inside the
environment, and the object type reflects the resulted password
space.
User’s choice and decision to construct the desired and preferred
3D password.
5/1/2014 23
24. ACKNOWLEDGEMENT
I would like to that adroit person who gave us the word “Thank” , if he would not then
how would I thank to my friends ,faculties and family for their motivation and
encouragement.
I would like to thank ABES Engineering College to provide me the facilities and resources
to complete this presentation.
Thanks to Engineers and Inventors for bringing us to meet the modern tactics and
techniques.
I would like thank the Almighty God without whose grace this paper would not have
achieved success. 5/1/2014 24
25. [1].Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D Graphical Password
Schema‖, IEEE International Conference on Virtual Environments, Human-Computer
Interfaces, and Measurement Systems, July 2006.
[2].Duhan Pooja, Gupta Shilpi , Sangwan Sujata, & Gulati Vinita, ―SECURED
AUTHENTICATION: 3D PASSWORD‖, I.J.E.M.S., VOL.3(2),242 – 245, 2012.
[3].Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar & Pranjal Rathod, Secure Authentication
with 3D Password‖ , IJESIT, Volume 2, Issue 2, ISSN: 2319-5967 ISO 9001:2008
[4].Tejal Kognule, Yugandhara Thumbre, Snehal Kognule-3D PASSWORD, ICACACT,
IJCA
[5].en.wikipedia.org/wiki/3-D_Secure
[6] www.google.com
5/1/2014 25