SlideShare a Scribd company logo
1 of 23
INTRODUCTION
ī‚—Current Authentification suffer from many
weakness.Textual passwords are commonly used,users do
not follow their requirements.Users tends to choose
meaningful words from dictionaries,which makes the
textual passwords easy to break and vulnerable to
dictionary or brute force attacks.In this paper,we present
and evaluate our contribution i.e. the 3D password
Existing System
īļTextual password
īļGraphical Password
īļBiometrics
īļToken Based
â€ĸHow secure is your password?
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Ten years back Klein performed
such tests and he could crack 10-15
passwords per day.
PASSWORD
3D PASSWORD
â€ĸThe 3D passwords3D passwords which are more customizable,
and very interesting way of authentication.
â€ĸA 3D password is a multifactor
authentication scheme that
combine
RECOGNITIONRECOGNITION
++RECALLRECALL
++TOKENSTOKENS
++BIOMETRICSBIOMETRICS
in one authentication system.
ī‚—The 3D password presents a virtual environmentvirtual environment
containing various virtual objects.
ī‚— The user walks through the environment and
interacts with the objects.
ī‚—It is the combination and sequence of user
interactions that occur in the 3D environment.
Brief Description of System
ī‚—The user is presented with this 3d virtual environment where
the user navigates and interacts with various objects.
ī‚—The sequence of actions and interactions towards the
objects inside the 3d environment constructs the user’s 3d
password.
System Implementation
ī‚—For example, the user can enter the virtual environment
and type something on a computer that exists in (x1 , y1 ,
z1 ) position, then enter a room that has a fingerprint
recognition device that exists in a position (x2 , y2 , z2 )
and provide his/her fingerprint. Then, the user can go to
the virtual garage, open the car door, and turn on the radio
to a specific channel. The combination and the sequence
of the previous actions toward the specific objects
construct the user’s 3D password
Virtual objects
ī‚—Virtual objects can be any object we encounter in real life:
īƒŧ A computer on which the user can type in
īƒŧ A fingerprint reader that requires users fingerprint
īƒŧ A paper or white board on which user can type
īƒŧ An Automated teller(ATM) machine that requires a
token
īƒŧ A light that can be switched on/off
īƒŧ A television or radio
īƒŧ A car that can be driven
īƒŧ A graphical password scheme
Snapshot of a proof - of - concept virtualSnapshot of a proof - of - concept virtual
art gallery , which contains 36art gallery , which contains 36
pictures and six computerspictures and six computers
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
â€ĸ3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
â€ĸ 3-D environment reflects the administration needs and the security
requirements.
3D Virtual Environment
The design of 3D virtual
environments should follow
these guidelines:
īąReal Life Similarity
īąObject Uniqueness & Distinction
īą3D Virtual Environment Size
īąNumber of objects & their types
īąSystem Importance
Advantages
īƒ˜ Flexibility
īƒ˜ Strength
īƒ˜ Ease to Memorize
īƒ˜ Respect of Privacy
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
ī‚§ Critical Servers
ī‚§ Nuclear Reactors & military Facilities
ī‚§ Airplanes and missile Guiding
A small virtual environment can be used in the following
systems like-
īļAtm
īļPersonal digital assistance
īļDesktop computers & laptops
īļWeb authentication etc.
State Diagram
Attacks and Countermeasures
īļBrute Force Attack
īļWell studied Attack
īļ Shoulder-surfing Attack
â€ĸThe authentication can be improved with 3d
password ,because the unauthorized person may not
interact with same object at a particular location as
the legitimate user.
â€ĸIt is difficult to crack ,because it has no fixed
number of steps and a particular procedure.
â€ĸAdded with biometrics and token verification this
schema becomes almost unbreakable.
Conclusion
QUERIES
3D Password ppt

More Related Content

What's hot

3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam SubudhiM Sangam Subudhi
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDKarishma Khan
 
3 d secure password
3 d secure password3 d secure password
3 d secure passwordJai Chaudhary
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report Sunanda Bansal
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
3dpassword
3dpassword3dpassword
3dpasswordBelal Ahmad
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINARKarishma Khan
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPTSeminar Links
 
3d password ppt
3d password ppt3d password ppt
3d password pptmanisha0902
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3D password
3D password3D password
3D passwordJaya Sinha
 
3D Password
3D Password3D Password
3D PasswordAnkit Nagar
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 

What's hot (20)

3 d password
3 d password3 d password
3 d password
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D Password
3D Password3D Password
3D Password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D password
3D password3D password
3D password
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 

Viewers also liked

Which Console will take over
Which Console will take overWhich Console will take over
Which Console will take overFred Sosa
 
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein Chahine
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein ChahineFuture of Gaming: Synchronous & Multiplayer Gameplay | Hussein Chahine
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein ChahineJessica Tams
 
3D Internet
3D Internet3D Internet
3D Internetnandu888
 
The Future of Gaming, er, Culture
The Future of Gaming, er, CultureThe Future of Gaming, er, Culture
The Future of Gaming, er, CultureTim Samoff
 
First Semester Exam: Building a Bionic Arm
First Semester Exam: Building a Bionic ArmFirst Semester Exam: Building a Bionic Arm
First Semester Exam: Building a Bionic Armahsengineering
 
The Dawn of the Cyborgs
The Dawn of the CyborgsThe Dawn of the Cyborgs
The Dawn of the CyborgsAmnon Carmel
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum ComputerTowfiqul Islam
 
Why ml and ai are the future of gaming david sachs @ tomobox
Why ml and ai are the future of gaming david sachs @ tomoboxWhy ml and ai are the future of gaming david sachs @ tomobox
Why ml and ai are the future of gaming david sachs @ tomoboxIdo Shilon
 
3D Internet
3D Internet3D Internet
3D InternetDev Sharma
 
Xbox 360
Xbox 360Xbox 360
Xbox 360TbSk121
 
Gaming console technology 2017 ppt
Gaming console technology 2017 ppt Gaming console technology 2017 ppt
Gaming console technology 2017 ppt keshav kumar
 
Guiding Digital Transformation
Guiding Digital TransformationGuiding Digital Transformation
Guiding Digital TransformationJim Wilt
 
Cyborg presentation
Cyborg presentationCyborg presentation
Cyborg presentationsunnyjhakumar
 
Bionic Arm Using EMG Processing
Bionic Arm Using EMG ProcessingBionic Arm Using EMG Processing
Bionic Arm Using EMG Processingbiomedicz
 

Viewers also liked (20)

OPTICALQuantum
OPTICALQuantumOPTICALQuantum
OPTICALQuantum
 
Which Console will take over
Which Console will take overWhich Console will take over
Which Console will take over
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein Chahine
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein ChahineFuture of Gaming: Synchronous & Multiplayer Gameplay | Hussein Chahine
Future of Gaming: Synchronous & Multiplayer Gameplay | Hussein Chahine
 
3D Internet
3D Internet3D Internet
3D Internet
 
The Future of Gaming, er, Culture
The Future of Gaming, er, CultureThe Future of Gaming, er, Culture
The Future of Gaming, er, Culture
 
First Semester Exam: Building a Bionic Arm
First Semester Exam: Building a Bionic ArmFirst Semester Exam: Building a Bionic Arm
First Semester Exam: Building a Bionic Arm
 
3 D Internet
3 D Internet3 D Internet
3 D Internet
 
The Dawn of the Cyborgs
The Dawn of the CyborgsThe Dawn of the Cyborgs
The Dawn of the Cyborgs
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Why ml and ai are the future of gaming david sachs @ tomobox
Why ml and ai are the future of gaming david sachs @ tomoboxWhy ml and ai are the future of gaming david sachs @ tomobox
Why ml and ai are the future of gaming david sachs @ tomobox
 
3D Internet
3D Internet3D Internet
3D Internet
 
Future of Gaming
Future of Gaming Future of Gaming
Future of Gaming
 
Xbox 360
Xbox 360Xbox 360
Xbox 360
 
Gaming console technology 2017 ppt
Gaming console technology 2017 ppt Gaming console technology 2017 ppt
Gaming console technology 2017 ppt
 
Guiding Digital Transformation
Guiding Digital TransformationGuiding Digital Transformation
Guiding Digital Transformation
 
Bionics
BionicsBionics
Bionics
 
Cyborg presentation
Cyborg presentationCyborg presentation
Cyborg presentation
 
Bionic Arm Using EMG Processing
Bionic Arm Using EMG ProcessingBionic Arm Using EMG Processing
Bionic Arm Using EMG Processing
 

Similar to 3D Password ppt

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3d authentication
3d authentication3d authentication
3d authenticationsudheerpothu
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak Choudhary
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schemaIOSR Journals
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriyajanapriyanaidu
 
3d pass words
3d pass words3d pass words
3d pass wordsmkanth
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
3d authentication system
3d authentication system3d authentication system
3d authentication systemRicha Agarwal
 

Similar to 3D Password ppt (20)

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d authentication
3d authentication3d authentication
3d authentication
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
C0361419
C0361419C0361419
C0361419
 
3dpassword
3dpassword3dpassword
3dpassword
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d
3d3d
3d
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3D Password
3D Password3D Password
3D Password
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3 d
3 d3 d
3 d
 
3d pass words
3d pass words3d pass words
3d pass words
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3d password
3d password3d password
3d password
 

More from Devyani Vaidya

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage systemDevyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousingDevyani Vaidya
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Resource management
Resource managementResource management
Resource managementDevyani Vaidya
 
telephone directory
 telephone directory telephone directory
telephone directoryDevyani Vaidya
 
Data as a service
Data as a service Data as a service
Data as a service Devyani Vaidya
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyDevyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issuesDevyani Vaidya
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver systemDevyani Vaidya
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt Devyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousingDevyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issuesDevyani Vaidya
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door pptDevyani Vaidya
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud pptDevyani Vaidya
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops pptDevyani Vaidya
 

More from Devyani Vaidya (17)

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Resource management
Resource managementResource management
Resource management
 
telephone directory
 telephone directory telephone directory
telephone directory
 
Data as a service
Data as a service Data as a service
Data as a service
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver system
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

3D Password ppt

  • 1.
  • 2. INTRODUCTION ī‚—Current Authentification suffer from many weakness.Textual passwords are commonly used,users do not follow their requirements.Users tends to choose meaningful words from dictionaries,which makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks.In this paper,we present and evaluate our contribution i.e. the 3D password
  • 3. Existing System īļTextual password īļGraphical Password īļBiometrics īļToken Based
  • 4. â€ĸHow secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. PASSWORD
  • 5.
  • 7. â€ĸThe 3D passwords3D passwords which are more customizable, and very interesting way of authentication. â€ĸA 3D password is a multifactor authentication scheme that combine RECOGNITIONRECOGNITION ++RECALLRECALL ++TOKENSTOKENS ++BIOMETRICSBIOMETRICS in one authentication system.
  • 8. ī‚—The 3D password presents a virtual environmentvirtual environment containing various virtual objects. ī‚— The user walks through the environment and interacts with the objects. ī‚—It is the combination and sequence of user interactions that occur in the 3D environment.
  • 9. Brief Description of System ī‚—The user is presented with this 3d virtual environment where the user navigates and interacts with various objects. ī‚—The sequence of actions and interactions towards the objects inside the 3d environment constructs the user’s 3d password.
  • 10. System Implementation ī‚—For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password
  • 11. Virtual objects ī‚—Virtual objects can be any object we encounter in real life: īƒŧ A computer on which the user can type in īƒŧ A fingerprint reader that requires users fingerprint īƒŧ A paper or white board on which user can type īƒŧ An Automated teller(ATM) machine that requires a token īƒŧ A light that can be switched on/off īƒŧ A television or radio īƒŧ A car that can be driven īƒŧ A graphical password scheme
  • 12. Snapshot of a proof - of - concept virtualSnapshot of a proof - of - concept virtual art gallery , which contains 36art gallery , which contains 36 pictures and six computerspictures and six computers
  • 14. 3D Virtual Environment â€ĸ3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. â€ĸ 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
  • 15. The design of 3D virtual environments should follow these guidelines: īąReal Life Similarity īąObject Uniqueness & Distinction īą3D Virtual Environment Size īąNumber of objects & their types īąSystem Importance
  • 16. Advantages īƒ˜ Flexibility īƒ˜ Strength īƒ˜ Ease to Memorize īƒ˜ Respect of Privacy
  • 17. Applications The 3D password’s main application domains are protecting critical systems and resources. ī‚§ Critical Servers ī‚§ Nuclear Reactors & military Facilities ī‚§ Airplanes and missile Guiding
  • 18. A small virtual environment can be used in the following systems like- īļAtm īļPersonal digital assistance īļDesktop computers & laptops īļWeb authentication etc.
  • 20. Attacks and Countermeasures īļBrute Force Attack īļWell studied Attack īļ Shoulder-surfing Attack
  • 21. â€ĸThe authentication can be improved with 3d password ,because the unauthorized person may not interact with same object at a particular location as the legitimate user. â€ĸIt is difficult to crack ,because it has no fixed number of steps and a particular procedure. â€ĸAdded with biometrics and token verification this schema becomes almost unbreakable. Conclusion