SlideShare a Scribd company logo
3D- PASSWORD
PRESENTED BY:-
PRITI PATHAK
SHARDA SHARAN
ABHISHEK KUMAR
Abstract
 Authentication of any system means providing a
security to that system.
 There are number of authentication techniques like
textual, biometrics etc. Each of these techniques has
some limitations and drawbacks.
 To overcome the drawbacks, a new authenticate
technique is now available, That is known as 3D
Password.
 The advantage of the 3D password is that combine
the authentication of existing system and providing
high security to user.
General Terms
• Security, authentication.
Keywords
• 3D Password, Virtual Environment.
Type of authentication techniques
3D Password
 3D password is combination of recall based
scheme and recognition based scheme.
 3D password is multifactor password & multi-
password authentication scheme.
 3D password provides a virtual environment for
containing various virtual objects. Through this
virtual environment, the user interacts with virtual
object.
Virtual environment
 A virtual environment is a computer-based
simulated environment.
 The 3D virtual environment consists of many
items and objects.
 Each item has different responses to action.
Cycle of 3D password
3D password working scheme
Advantage of 3D password
It provides user options to choose the type
of authentication of his/her own choice.
It eliminates a brute force attack.
Provides high level security to the system.
Secure against a software like key logger.
Disadvantage of 3D password
Shoulder attack.
More time and memory.
It’s expensive.
Complexity.
Applications for 3D Password
1. Critical servers.
2. Nuclear reactions and military facilities.
3. Airplane, jet fighters and missile guiding.
4. A small virtual environment can be used in
following areas:-
ATM, Desktop computers and laptop logins,
Security analysis, Web authentication.
Conclusion
3D Password mechanism is more secure and
reliable compare to other authentication
mechanism. By using 3D password we can
make any system more secure and it will be
beneficial for applications used in cooperate
world, govt. sector and in personal use.
Thank You
3d  password

More Related Content

What's hot

3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D password
3D password3D password
3D password
anuradha srivastava
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3d password
3d password3d password
3d password
shivi123456
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
Jai Chaudhary
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
ASIM MIRZA
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 

What's hot (20)

3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D password
3D password3D password
3D password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password
3d password3d password
3d password
 
3d passwords
3d passwords3d passwords
3d passwords
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D Password
3D Password3D Password
3D Password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 

Similar to 3d password

3 d
3 d3 d
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
C0361419
C0361419C0361419
C0361419
iosrjournals
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
Rakshita Paliwal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
abhaydevamore1
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
KumudhaKumar1
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 

Similar to 3d password (20)

3 d
3 d3 d
3 d
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3D password
3D password 3D password
3D password
 
C0361419
C0361419C0361419
C0361419
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d authentication
3d authentication3d authentication
3d authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx3D Password PRESENTATION - Copy.pptx
3D Password PRESENTATION - Copy.pptx
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 

More from SHARDA SHARAN

Password protected diary
Password protected diaryPassword protected diary
Password protected diary
SHARDA SHARAN
 
Library management system
Library management systemLibrary management system
Library management system
SHARDA SHARAN
 
Contact management system
Contact management systemContact management system
Contact management system
SHARDA SHARAN
 
Book management system
Book management systemBook management system
Book management system
SHARDA SHARAN
 
Narindra singh kapany
Narindra singh kapanyNarindra singh kapany
Narindra singh kapany
SHARDA SHARAN
 
Android vs windows
Android vs windowsAndroid vs windows
Android vs windows
SHARDA SHARAN
 

More from SHARDA SHARAN (6)

Password protected diary
Password protected diaryPassword protected diary
Password protected diary
 
Library management system
Library management systemLibrary management system
Library management system
 
Contact management system
Contact management systemContact management system
Contact management system
 
Book management system
Book management systemBook management system
Book management system
 
Narindra singh kapany
Narindra singh kapanyNarindra singh kapany
Narindra singh kapany
 
Android vs windows
Android vs windowsAndroid vs windows
Android vs windows
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

3d password

  • 1. 3D- PASSWORD PRESENTED BY:- PRITI PATHAK SHARDA SHARAN ABHISHEK KUMAR
  • 2. Abstract  Authentication of any system means providing a security to that system.  There are number of authentication techniques like textual, biometrics etc. Each of these techniques has some limitations and drawbacks.  To overcome the drawbacks, a new authenticate technique is now available, That is known as 3D Password.  The advantage of the 3D password is that combine the authentication of existing system and providing high security to user.
  • 3. General Terms • Security, authentication. Keywords • 3D Password, Virtual Environment.
  • 5. 3D Password  3D password is combination of recall based scheme and recognition based scheme.  3D password is multifactor password & multi- password authentication scheme.  3D password provides a virtual environment for containing various virtual objects. Through this virtual environment, the user interacts with virtual object.
  • 6. Virtual environment  A virtual environment is a computer-based simulated environment.  The 3D virtual environment consists of many items and objects.  Each item has different responses to action.
  • 7. Cycle of 3D password
  • 9. Advantage of 3D password It provides user options to choose the type of authentication of his/her own choice. It eliminates a brute force attack. Provides high level security to the system. Secure against a software like key logger.
  • 10. Disadvantage of 3D password Shoulder attack. More time and memory. It’s expensive. Complexity.
  • 11. Applications for 3D Password 1. Critical servers. 2. Nuclear reactions and military facilities. 3. Airplane, jet fighters and missile guiding. 4. A small virtual environment can be used in following areas:- ATM, Desktop computers and laptop logins, Security analysis, Web authentication.
  • 12. Conclusion 3D Password mechanism is more secure and reliable compare to other authentication mechanism. By using 3D password we can make any system more secure and it will be beneficial for applications used in cooperate world, govt. sector and in personal use.