SlideShare a Scribd company logo
3D Password
A SECURE AUTHENTICATION
Submitted By
Rakshita Paliwal
2013UCS023
CONTENTS
• INTRODUCTION
• AUTHENTICATION
• EXISTING SYSTEM
• DRAWBACKS OF EXISTING SYSTEM
• 3D PASSWORD
• USE OF 3D PASSWORD
• ADVANTAGE & DISADVANTAGE
• ATTACKS ON 3D PASSWORD
• APPLICATION AREA
INTRODUCTION
• The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes.
• Users have the freedom to select whether the 3D password will be
solely recall, biometrics, recognition, or token based, or a combination
of two schemes or more.
• This freedom of selection is necessary because users are different and
they have different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
AUTHETICATION
Authentication is a process of validating who are you to whom you
claimed to be.
• Human authentication techniques are as follows:
1.Knowledge Base (What you know)
2.Token Based(what you have)
3.Biometrics(what you are)
Human
Authentication
Techniques
Knowledge Base
( What you know )
Token Based
( What you have )
Biometrics
( What you are)
Textual Password
Graphical Password
ATM Card
Keys
ID Cards
Fingerprints,Palmprint
Hand Geometry
Face,iris,voice,retina
EXISTING SYSTEM
• Textual Password
• Graphical Password
• Token-Based Password
• Biometric Password
Textual Password Graphical Password
Something I Know
•PIN
•Password
Something I Recognize
•Graphical Password
Token-Based Password Biometric Password
Something I Have
ATM Card
Key
ID Card
Something I Am
Fingerprint
Face
Iris
Drawbacks of Existing System
Textual Password:
• Textual Passwords should be easy to remember at the same time hard to guess.
• Full password space for 8 characters consisting of both numbers and characters is at
most 2 X 10¹⁴.
• From an research 25% of the passwords out of 15,000 users can guessed correctly by
using brute force dictionary.
Graphical Password :
• Graphical passwords can be easily recorded but some schemes take a long time to perform.
Token Password: Most unsecured one, if stolen can breech through any security levels.
Biometric Password:
• One main drawback of applying biometric is its intrusiveness upon a user’s personal
characteristic .
• Retina biometrical recognition schemes require the user to willingly subject their eyes to a
low-intensity infrared light so specified environment is required.
• In addition, most biometric systems require a special scanning device to authenticate users,
which is not applicable for remote and Internet users.
3D Password
The 3D Password scheme is a new authentication scheme that combine
RECOGNITION
+ RECALL
+ TOKENS
+ BIOMETRIC
In one authentication system
• The 3D password presents a virtual environment containing various virtual objects.
• The user walks through the environment and interacts with the objects .
• The 3d Password is simply the combination and sequence of user interactions that
occur in the 3D environment.
Examples of 3D Password
3D Password Selection & Input
Virtual objects can be any object we encounter in real life:
• A computer with which the user can type;
• A fingerprint reader that requires the user’s fingerprint;
• A biometrical recognition device;
• A paper or a white board that a user can write, sign, or Draw on;
• An automated teller machine (ATM) that requests a token;
• A light that can be switched on/off;
• A television or radio where channels can be selected;
• A staple that can be punched;
• A car that can be driven;
• A book that can be moved from one place to another;
• Any graphical password scheme;
• Any real-life object;
• Any upcoming authentication scheme
3D Password Example
 Let us consider a 3-D virtual environment space of size G x G x G.
 The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . , G] x
[1, . . . , G] x [1, . . . , G].
 The objects are distributed in the 3-D virtual environment with unique (x, y, z)
coordinates.
 We assume that the user can navigate into the 3-D virtual environment and interact with
the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris
scanner, stylus, card reader, and microphone.
For Example :
Let us assume the user enters a virtual office then performs the following action:
 (10,24,91) Action=Open office door
 (10,24,91) Action=Close office door
 (4,34,18) Action=Typing,”C”
 (4,34,18) Action=Typing,”O”
 (4,34,18)Action=Typing,”N”
 (10,24,80)Action=Pick up the pen
 (1,18,80)Action=Draw point=(330,130)
Snapshot of the concept of 3d-Virtual
Environment
(a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is
typing a textual password on a virtual computer as a part of the user’s 3-D
password. (b) Snapshot of a proof-of-concept virtual art gallery, which
contains 36 pictures and six computers
(a) (b)
Advantage & Disadvantage
Advantages
 Flexibility:3D Passwords allows Multifactor authentication biometric , textual
passwords can be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited passwords possibility.
 Ease to Memorize: can be remembered in the form of short story.
 Respect of Privacy: Organizers can select authentication schemes that respect
users privacy.
Disadvantages
 Difficult for blind people to use this technology.
 Requires sophisticated computers technology expensive.
 A lot of program coding is required.
Attacks On 3D Password
Brute Force Attack Well Studied Attack

Shoulder Surfing Attack
Application Area
• Critical Servers
• Nuclear and military Stations
• Airplanes and Jet Fighters
• ATMs, Desktop and Laptop Logins, Web
Authentication
QUERIES ???

More Related Content

Similar to 3D Passwrd

3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
JYoTHiSH o.s
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02bujjiflute
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
Vivek
VivekVivek
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
3d password
3d password3d password
3d password
shivi123456
 
3 d ppt
3 d ppt3 d ppt
3dpassword
3dpassword3dpassword
3dpassword
Belal Ahmad
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 
3D password
3D password3D password
3D password
anuradha srivastava
 

Similar to 3D Passwrd (20)

3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3d passwords
3d passwords3d passwords
3d passwords
 
Vivek
VivekVivek
Vivek
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D password
3D password3D password
3D password
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

3D Passwrd

  • 1. 3D Password A SECURE AUTHENTICATION Submitted By Rakshita Paliwal 2013UCS023
  • 2. CONTENTS • INTRODUCTION • AUTHENTICATION • EXISTING SYSTEM • DRAWBACKS OF EXISTING SYSTEM • 3D PASSWORD • USE OF 3D PASSWORD • ADVANTAGE & DISADVANTAGE • ATTACKS ON 3D PASSWORD • APPLICATION AREA
  • 3. INTRODUCTION • The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. • Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. • This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
  • 4. AUTHETICATION Authentication is a process of validating who are you to whom you claimed to be. • Human authentication techniques are as follows: 1.Knowledge Base (What you know) 2.Token Based(what you have) 3.Biometrics(what you are) Human Authentication Techniques Knowledge Base ( What you know ) Token Based ( What you have ) Biometrics ( What you are) Textual Password Graphical Password ATM Card Keys ID Cards Fingerprints,Palmprint Hand Geometry Face,iris,voice,retina
  • 5. EXISTING SYSTEM • Textual Password • Graphical Password • Token-Based Password • Biometric Password
  • 6. Textual Password Graphical Password Something I Know •PIN •Password Something I Recognize •Graphical Password
  • 7. Token-Based Password Biometric Password Something I Have ATM Card Key ID Card Something I Am Fingerprint Face Iris
  • 8. Drawbacks of Existing System Textual Password: • Textual Passwords should be easy to remember at the same time hard to guess. • Full password space for 8 characters consisting of both numbers and characters is at most 2 X 10¹⁴. • From an research 25% of the passwords out of 15,000 users can guessed correctly by using brute force dictionary. Graphical Password : • Graphical passwords can be easily recorded but some schemes take a long time to perform. Token Password: Most unsecured one, if stolen can breech through any security levels. Biometric Password: • One main drawback of applying biometric is its intrusiveness upon a user’s personal characteristic . • Retina biometrical recognition schemes require the user to willingly subject their eyes to a low-intensity infrared light so specified environment is required. • In addition, most biometric systems require a special scanning device to authenticate users, which is not applicable for remote and Internet users.
  • 9. 3D Password The 3D Password scheme is a new authentication scheme that combine RECOGNITION + RECALL + TOKENS + BIOMETRIC In one authentication system • The 3D password presents a virtual environment containing various virtual objects. • The user walks through the environment and interacts with the objects . • The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment.
  • 10. Examples of 3D Password
  • 11. 3D Password Selection & Input Virtual objects can be any object we encounter in real life: • A computer with which the user can type; • A fingerprint reader that requires the user’s fingerprint; • A biometrical recognition device; • A paper or a white board that a user can write, sign, or Draw on; • An automated teller machine (ATM) that requests a token; • A light that can be switched on/off; • A television or radio where channels can be selected; • A staple that can be punched; • A car that can be driven; • A book that can be moved from one place to another; • Any graphical password scheme; • Any real-life object; • Any upcoming authentication scheme
  • 12. 3D Password Example  Let us consider a 3-D virtual environment space of size G x G x G.  The 3-D environment space is represented by the coordinates (x, y, z) Є [1, . . . , G] x [1, . . . , G] x [1, . . . , G].  The objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates.  We assume that the user can navigate into the 3-D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, stylus, card reader, and microphone. For Example : Let us assume the user enters a virtual office then performs the following action:  (10,24,91) Action=Open office door  (10,24,91) Action=Close office door  (4,34,18) Action=Typing,”C”  (4,34,18) Action=Typing,”O”  (4,34,18)Action=Typing,”N”  (10,24,80)Action=Pick up the pen  (1,18,80)Action=Draw point=(330,130)
  • 13. Snapshot of the concept of 3d-Virtual Environment (a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a textual password on a virtual computer as a part of the user’s 3-D password. (b) Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers (a) (b)
  • 14. Advantage & Disadvantage Advantages  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy. Disadvantages  Difficult for blind people to use this technology.  Requires sophisticated computers technology expensive.  A lot of program coding is required.
  • 15. Attacks On 3D Password Brute Force Attack Well Studied Attack  Shoulder Surfing Attack
  • 16. Application Area • Critical Servers • Nuclear and military Stations • Airplanes and Jet Fighters • ATMs, Desktop and Laptop Logins, Web Authentication
  • 17.