SlideShare a Scribd company logo
3D-Password
ABSTRACT
 Normally the authentication scheme the user undergoes is
particularly very lenient or very strict. Throughout the years
authentication has been a very interesting approach.
 With all the means of technology developing, it can be very easy for
'others' to fabricate or to steal identity or to hack someone’s
password.
 So from here the concept of 3
EXISTING SYSTEM
 Current authentication systems suffer from many weaknesses.
Textual passwords are commonly used. Users tend to choose
meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or brute
force attacks.
 Many available graphical passwords have a password space that
is less than or equal to the textual password space. Smart cards
or tokens can be stolen. Many biometric authentications have
been proposed.
 However, users tend to resist using biometrics because of their
intrusiveness and the effect on their privacy. Moreover,
biometrics cannot be revoked. The 3Dpassword is a multi factor
authentication scheme.
PROPOSED SYSTEM
 The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes.
 Users have the freedom to select whether the 3D password will be
solely recall, biometrics, recognition, or token based, or a
combination of two schemes or more.
 This freedom of selection is necessary because users are different
and they have different requirements. Therefore, to ensure high user
acceptability, the user’s freedom of selection is important.
BRIEF DESCRIPTION
OF SYSTEM
 The 3D password is a multi factor authentication scheme. The 3D
password presents a 3D virtual environment containing various virtual
objects.
 The user navigates through this environment and interacts with the
objects. The 3D password is simply the combination and the sequence of
user interactions that occur in the 3D virtual environment.
 The 3D password can combine recognition, recall, token, and biometrics
based systems into one authentication scheme. This can be done by
designing a 3D virtual environment that contains objects that request
information to be recalled, information to be recognized, tokens to be
presented, and biometric data to be verified.
3D PASSWORD
AUTHENTICATION
3D PASSWORD
APPLICATION
 Critical server many large organizations have critical servers that are
usually protected by a textual password. A 3D password authentication
proposes a sound replacement for a textual password.
 Nuclear and military facilities such facilities should be protected by the
most
 Powerful authentication systems. The 3D password has a very large
probable password space, and since it can contain token, biometrics,
recognition and knowledge based
 Authentications in a single authentication system, it is a sound choice for
high level security locations.
ADVANTAGES
 Flexibility:3D Passwords allows Multifactor authentication biometric ,
textual passwords can be embedded in 3D password technology.
 Strength: This scenario provides almost unlimited passwords possibility.
 Ease to Memorize: can be remembered in the form of short story.
 Respect of Privacy: Organizers can select authentication schemes that
respect users privacy.
DISADVANTAGES……
 Shoulder Surfing Attacks: Attacker uses camera to record the users
3D passwords.This attack is more succesful.
 Timing Attack: The Attacker observes how long it takes the
legitimate user to perform correct log in using 3D Password.which
gives an indication of 3-D Passwords length.This attack cannot be
succesful since it gives the attacker mere hints.
CONCLUSION
 The 3D password is a multi factor authentication scheme that combines
the various authentication schemes into a single 3D virtual environment.
The virtual environment can contain any existing authentication scheme
or even any upcoming authentication scheme or even any upcoming
authentication schemes by adding it as a response to actions performed
on an object.
 Therefore the resulting password space becomes very large compared to
any existing authentication schemes. The design of the 3D virtual
environment the selection of objects inside the environment and the
object's type reflect the resulted password space. It is the task of the
system administrator to design the environment and to select the
appropriate object that reflects the protected system requirements.
Thanks…!!!!

More Related Content

PPT
3 d password
blogger at indiandswad
 
PPTX
3d password 23 mar 14
Saddam Ahmed
 
PPT
3D PASSWORD
JYoTHiSH o.s
 
PPTX
SRAVYA
pvpsit
 
PPTX
3D PASSWORD SEMINAR
Karishma Khan
 
PPTX
3D Password and its importance
shubhangi singh
 
PPTX
3 d password
ASHOK KUMAR PALAKI
 
PPT
3D PASSWORD
Akhi Balakrishnan
 
3 d password
blogger at indiandswad
 
3d password 23 mar 14
Saddam Ahmed
 
3D PASSWORD
JYoTHiSH o.s
 
SRAVYA
pvpsit
 
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password and its importance
shubhangi singh
 
3 d password
ASHOK KUMAR PALAKI
 
3D PASSWORD
Akhi Balakrishnan
 

What's hot (20)

PPTX
3D Password
Ankit Nagar
 
PPTX
3d password
shivi123456
 
PPT
3D Password Presentation
Sambit Mishra
 
PPTX
3d passwords
shwetaag
 
PPT
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
PPTX
3D Password
Preethi AKNR
 
PPT
3D Password
Zishan Mohsin
 
PPTX
3d password by suresh
suresh5c2
 
PDF
3D Password PPT
Seminar Links
 
PPTX
3d password ppt
manisha0902
 
PDF
3d password - Report
Sunanda Bansal
 
PPTX
3D Password M Sc BHU Sem 1
Swagato Dey
 
PPTX
3D PASSWORD
ramyasaikondapi
 
PDF
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
PPT
3d password ppt
Gowsalyasri
 
PPTX
3D password
anuradha srivastava
 
PPTX
Gesture Technology
BugRaptors
 
PPTX
3D Password
Shubham Rungta
 
PPT
3 d password
yogendra mahate
 
PPT
Biometric's final ppt
Ankita Vanage
 
3D Password
Ankit Nagar
 
3d password
shivi123456
 
3D Password Presentation
Sambit Mishra
 
3d passwords
shwetaag
 
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3D Password
Preethi AKNR
 
3D Password
Zishan Mohsin
 
3d password by suresh
suresh5c2
 
3D Password PPT
Seminar Links
 
3d password ppt
manisha0902
 
3d password - Report
Sunanda Bansal
 
3D Password M Sc BHU Sem 1
Swagato Dey
 
3D PASSWORD
ramyasaikondapi
 
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3d password ppt
Gowsalyasri
 
3D password
anuradha srivastava
 
Gesture Technology
BugRaptors
 
3D Password
Shubham Rungta
 
3 d password
yogendra mahate
 
Biometric's final ppt
Ankita Vanage
 
Ad

Viewers also liked (11)

PPTX
3D- Doctor
Devyani Vaidya
 
PPT
т.г. шевченко
Тетяна Шийка
 
PDF
Hololens-pechakucha
Erwan Boyé
 
PDF
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
FEATool Multiphysics
 
PPT
هدف إدارة السلامة والصحة المهنية
ENG.MUSTAFA GAMAL
 
PPTX
Iskira starFlash
bourammani
 
DOC
Thiết kế hệ thống treo cho xe tải 4 tấn
Leovnuf
 
PPTX
Присоединение Астраханского ханства к Российскому государству. 9-й класс
DROFA-VENTANA
 
PDF
Percussion syllabus 2017 2019
wegotguru me
 
DOC
Aparato digestivo2
Paola Garces
 
PPT
Power tool-safety
appleinthailand
 
3D- Doctor
Devyani Vaidya
 
т.г. шевченко
Тетяна Шийка
 
Hololens-pechakucha
Erwan Boyé
 
FEATool Multiphysics Matlab FEM and CFD Toolbox - v1.6 Quickstart Guide
FEATool Multiphysics
 
هدف إدارة السلامة والصحة المهنية
ENG.MUSTAFA GAMAL
 
Iskira starFlash
bourammani
 
Thiết kế hệ thống treo cho xe tải 4 tấn
Leovnuf
 
Присоединение Астраханского ханства к Российскому государству. 9-й класс
DROFA-VENTANA
 
Percussion syllabus 2017 2019
wegotguru me
 
Aparato digestivo2
Paola Garces
 
Power tool-safety
appleinthailand
 
Ad

Similar to 3D-Password (20)

PPTX
3D PASSWORD
Rajashree Swain
 
PPTX
3D Passwrd
Rakshita Paliwal
 
PPTX
3D Password for Secure Authentication
Talion2
 
PPTX
3 d
geethanjali a
 
DOC
Deepak 3 dpassword (2)
Deepak Choudhary
 
PDF
C0361419
iosrjournals
 
PPTX
3d authentication system
Richa Agarwal
 
DOCX
3d pass words
mkanth
 
PPTX
3D PASSWORD
Amrit Sharma
 
PPT
Ppt on 3d password (2)
ASIM MIRZA
 
PPTX
3d password
Abhirami P S
 
DOCX
New era of authentication
sunil kumar
 
PPT
3D password
Muniba Bukhari
 
PDF
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
PPTX
3DPassword_AakashTakale
Aakash Takale
 
PPTX
3d password ppt presentation innovative idea
AmarNath514531
 
PPTX
Multi Factor Authentication using 3D password
Nirzar Bhaidkar
 
PPTX
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
3D PASSWORD
Rajashree Swain
 
3D Passwrd
Rakshita Paliwal
 
3D Password for Secure Authentication
Talion2
 
Deepak 3 dpassword (2)
Deepak Choudhary
 
C0361419
iosrjournals
 
3d authentication system
Richa Agarwal
 
3d pass words
mkanth
 
3D PASSWORD
Amrit Sharma
 
Ppt on 3d password (2)
ASIM MIRZA
 
3d password
Abhirami P S
 
New era of authentication
sunil kumar
 
3D password
Muniba Bukhari
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
3DPassword_AakashTakale
Aakash Takale
 
3d password ppt presentation innovative idea
AmarNath514531
 
Multi Factor Authentication using 3D password
Nirzar Bhaidkar
 
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 

More from Devyani Vaidya (20)

PPT
Hashing
Devyani Vaidya
 
PPT
Fundamental file structure concepts & managing files of records
Devyani Vaidya
 
PPT
Cosequential processing and the sorting of large files
Devyani Vaidya
 
PPT
Introduction to the design and specification of file structures
Devyani Vaidya
 
PPTX
Mobile Phone Cloning
Devyani Vaidya
 
PPTX
Data warehousing
Devyani Vaidya
 
PPTX
secued cloud
Devyani Vaidya
 
PPTX
Cloud Cmputing Security
Devyani Vaidya
 
PPTX
Cloud Security
Devyani Vaidya
 
PPTX
Wireless network
Devyani Vaidya
 
PPT
Environmental law
Devyani Vaidya
 
PPTX
Wireless mobile charging using microwaves
Devyani Vaidya
 
PPTX
Secure Cloud Issues
Devyani Vaidya
 
PPTX
Energy Harvesing Through Reverse Electrowetting
Devyani Vaidya
 
PPT
Wireless Charging Of Mobile
Devyani Vaidya
 
PPTX
Applet programming
Devyani Vaidya
 
PPTX
Seminar on telephone directory
Devyani Vaidya
 
PPTX
History of Laptop
Devyani Vaidya
 
PPTX
Ppt on open and close door using Applet
Devyani Vaidya
 
PPTX
Resource management
Devyani Vaidya
 
Fundamental file structure concepts & managing files of records
Devyani Vaidya
 
Cosequential processing and the sorting of large files
Devyani Vaidya
 
Introduction to the design and specification of file structures
Devyani Vaidya
 
Mobile Phone Cloning
Devyani Vaidya
 
Data warehousing
Devyani Vaidya
 
secued cloud
Devyani Vaidya
 
Cloud Cmputing Security
Devyani Vaidya
 
Cloud Security
Devyani Vaidya
 
Wireless network
Devyani Vaidya
 
Environmental law
Devyani Vaidya
 
Wireless mobile charging using microwaves
Devyani Vaidya
 
Secure Cloud Issues
Devyani Vaidya
 
Energy Harvesing Through Reverse Electrowetting
Devyani Vaidya
 
Wireless Charging Of Mobile
Devyani Vaidya
 
Applet programming
Devyani Vaidya
 
Seminar on telephone directory
Devyani Vaidya
 
History of Laptop
Devyani Vaidya
 
Ppt on open and close door using Applet
Devyani Vaidya
 
Resource management
Devyani Vaidya
 

Recently uploaded (20)

PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 

3D-Password

  • 2. ABSTRACT  Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach.  With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password.  So from here the concept of 3
  • 3. EXISTING SYSTEM  Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.  Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed.  However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme.
  • 4. PROPOSED SYSTEM  The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.  This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
  • 5. BRIEF DESCRIPTION OF SYSTEM  The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects.  The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment.  The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
  • 7. 3D PASSWORD APPLICATION  Critical server many large organizations have critical servers that are usually protected by a textual password. A 3D password authentication proposes a sound replacement for a textual password.  Nuclear and military facilities such facilities should be protected by the most  Powerful authentication systems. The 3D password has a very large probable password space, and since it can contain token, biometrics, recognition and knowledge based  Authentications in a single authentication system, it is a sound choice for high level security locations.
  • 8. ADVANTAGES  Flexibility:3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 9. DISADVANTAGES……  Shoulder Surfing Attacks: Attacker uses camera to record the users 3D passwords.This attack is more succesful.  Timing Attack: The Attacker observes how long it takes the legitimate user to perform correct log in using 3D Password.which gives an indication of 3-D Passwords length.This attack cannot be succesful since it gives the attacker mere hints.
  • 10. CONCLUSION  The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object.  Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements.