SlideShare a Scribd company logo
1
3-D PASSWORD
SECURE
AUTHENTICATION
USING
PRESENTED BY :
ABHISHEK B
LMC21CS005
GUIDED BY :
Ms. ASHA AS
Assistant Professor
Dept of Computer Science
And Engineering
2
1. Password
2. Authentication
3. Drawbacks of Existing Authentication Techniques
4. Proposed System
5. 3D password
6. Virtual Environment
7. Virtual Objects
8. System Implementation
9. Example
10. State Diagram
11. Programming languages
12. Types of Attacks
13. Advantages
14. Disadvantages
15. Applications
16. References
CONTENTS
3
• A password is a string of characters used for
authentication.
• Password is basically an encryption
algorithms.
• It is 8-15 character or slightly more than that.
PASSWORD
4
 Authentication is a process of validating who
are you claiming to be.
 Human authentication techniques are :
1. Knowledge based (What you know)
2. Token based (What you have)
3. Biometrics (What you are)
AUTHENTICATION
5
1. KNOWLEDGE BASED (Pin,Password,Pattern)
(a) Easy to remember -> Easy to break
Hard to guess -> Hard to remember
(b) Vulnerable to attacks like brute force attacks etc.
2. TOKEN BASED(Keys,Smartcard)
(a) Duplicate keys, smart cards, ID proofs are easily
available.
3. BIOMETRICS(Face,Iris,DNA)
(a) exposure of retinas to IR rays.
(b) Hackers implement exact copy of your
biometrics.
DRAWBACKS OF EXISTING AUTHENTICATION TECHNIQUES
6
 The proposed system is a multi factor authentication
scheme that combines the benefits of various
authentication schemes.
 Users have the freedom to select whether the 3D
password will be solely recall, biometrics,
recognition, or token based, or a combination of two
schemes or more.
 Therefore, to ensure high user acceptability, the
user’s freedom of selection is important.
PROPOSED SYSTEM
7
3-D PASSWORD
 The 3D password is a multifactor authentication
scheme that combine KNOWLEDGE BASED + TOKEN
BASED + BIOMETRICS in one authentication system.
 It presents a virtual or real environment containing
various objects.
The user walks through the environment and
interacts with the objects.
 More customizable and very interesting way of
authentication.
8
• A virtual environment is a computer-based simulated
environment.
• The 3D virtual environment consists of many items and
objects.
• Each item has different responses to action.
• The user actions, interactions and inputs towards the objects
or toward the 3D virtual environment creates the user’s 3D
password.
• Communication between users can range from text, graphical
icons, visual gesture, sound, voice command.
VIRTUAL ENVIRONMENT
9
IMAGES OF ENVIRONMENT
10
VIRTUAL OBJECTS
Virtual objects can be any objects we encounter in real life such as:
 A computer on which user can type.
 An ATM machine that requires a token (ATM card).
 A fingerprint reader that requires user fingerprints.
 A paper or white board on which user can write.
 A light that can be switched on/off.
 A television.
 A radio.
 A car that can be driven.
 A graphical password scheme.
11
SYSTEM IMPLEMENTATION
Hardware Requirements:
1. 3D scanning technology (e.g., depth sensors, structured light scanners)
2. High-performance computing hardware
3. Advanced graphics processing units (GPUs)
4. Secure storage devices
Software Requirements:
1. 3D modeling and rendering software
2. Biometric authentication software
3. Gesture recognition software
4. Machine learning algorithms
5. Secure authentication protocols
12
SYSTEM IMPLEMENTATION
Implementation Steps:
1. User Enrollment:
- Capture 3D scan of user's face, hand, or body.
- Record gesture patterns.
- Store 3D model and gesture data securely.
2. 3D Password Creation:
- Use 3D modeling software to create a 3D password model.
- Define gesture-based interactions.
3. Authentication Protocol:
- Implement secure authentication protocols (e.g., SSL/TLS).
- Integrate biometric authentication software.
13
SYSTEM IMPLEMENTATION
4. Gesture Recognition:
- Develop gesture recognition algorithms.
- Integrate with 3D password model.
5. 3D Password Verification:
- Compare input gesture with stored 3D password
model.
- Verify the data.
14
EXAMPLE
• Let us consider a 3D virtual environment space
of size G x G x G. The 3D environment space is
represented by the coordinates (x,y,z) ϵ [1,…,G] x
[1,…,G] x [1,…,G].
• The objects are distributed in the 3D virtual
environment with unique (x,y,z) coordinates. We
assume that the user can navigate into the 3D
virtual environment and interact with the
objects using any input device such as a mouse,
keyboard, fingerprint scanner, iris scanner, card
readers, microphones, stylus, etc.
15
• Let us consider a user who navigates through the 3D virtual
environment that consists of an office and a meeting room.
Let us assume that the user is in the virtual office and the
user turns around the door located in (1,2,3) and opens it.
Then, the user closes the door. The user then finds a
computer to the left, which exists in the position (4,5,6),
and the user types “ABC”. The initial representation of user
actions in the 3D virtual environment can be recorded as
follows:
(1,2,3) action = open the office door
(1,2,3) action = close the office door
(4,5,6) action = typing “A”
(4,5,6) action = typing “B”
(4,5,6) action = typing “C”
16
STATE DIAGRAM
Typical
Textual
Password
Enter User Name
Performing
Graphical Password
Moving Inside
Virtual 3D
Environment
Performing
Biometrics
Changing Item
Status
Verifying
Typing a letter or a number Clicks
Access not
granted
Login
password
Access
granted
Specific
key
password
Click on a
graphical
password
item
Specific key pressed
Biometric item
is checked
Move object,
Turn ON/OFF
17
 C++
 Java and Java3D
 .NET languages such as C# or Visual Basics
 Parrot virtual machine
 OpenGL library :
(i) uses both graphics and CAD programs.
(ii) supported on Windows, UNIX workstations, PCs, X-Box,
Linux, etc.
 GLUT : OpenGL Utility Toolkit
(i) library for using C++ and OpenGL
 Direct 3D :
(i) supported only on Microsoft windows platforms and X-box.
PROGRAMMING LANGUAGES
18
TYPES OF ATTACKS
1. Brute Force Attack: A brute force attack is a trial-and-error
method used to obtain information such as a user password or
personal identification number (PIN). The attack is difficult
because:
(i) Required time to login: Time required to login may vary from
20 seconds to 2 minutes. So, is time consuming.
(ii) Cost of attack: Cost of creating 3D virtual environment is very
high.
2. Shoulder Suffering Attack:
(i) An attacker uses a camera to record the password.
(ii) 3D password contains biometric identifications, so
are difficult to break.
19
3. Timing Attack:
(i) The attacker observes how long it takes a
legitimate user to perform a correct sign-in using 3D
password.
(ii) Helps in determining length of password.
(iii) Effective if the 3D virtual environment is
designed correctly.
20
1. Provides high security.
2. Flexible, as it provides multifactor authentication ,i.e., token
based, knowledge based, biometrics.
3. Provides infinite number of password possibilities.
4. Can be memorized in form of short stories.
5. Ease to change password anytime.
6. Helps to keep lot of personal details.
7. Due to the use of multiple schemes in one scheme password
space is increased to great extent.
ADVANTAGES OF 3D PASSWORD
21
1. Difficult for blind people to use this
technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
DISADVANTAGES OF 3D PASSWORD
22
1. Critical servers.
2. Nuclear reactors and military facilities.
3. Airplanes, jet fighters and missile guiding.
4. A small virtual environment can be used in following
areas:
(i) ATM.
(ii) Desktop computers and laptop logins.
(iii) Web authentication.
APPLICATIONS OF 3D PASSWORD
23
 The authentication can be improved with 3D
password, because the unauthorized person
may not interact with same object at a
particular location as the legitimate user.
 It is difficult to crack because it has no fixed
number of steps and a particular procedure.
 Added with biometrics and token verification
this scheme becomes almost unbreakable.
CONCLUSION
24
REFERENCES
• [1].Sangeetha, & Ijmtst, Editor. (2022). Secure Authentication
Using 3D Password. International Journal for Modern Trends
in Science and Technology. 8. 176-179.
10.46501/IJMTST0802029.
• [2]. Fawaz Alsulaiman and Abdulmotaleb El Saddik “Three
Dimensional Password for more Secure
Authentication” ,IEEETransactions on Instrumentations and
Measurement.
• [3]. Tejal Kognule and Yugandhara Thumbre and Snehal
Kognule,“3D password”, International Journal of Computer
Applications(IJCA),2012.
25
THANK YOU

More Related Content

PPTX
3dpassword by janapriya
janapriyanaidu
 
PPTX
3d password ppt
manisha0902
 
PPTX
3D - password
BhavikParmar24
 
PPTX
3D Password
Ankit Nagar
 
DOCX
New era of authentication
sunil kumar
 
PPTX
3D Password
Devyani Vaidya
 
3dpassword by janapriya
janapriyanaidu
 
3d password ppt
manisha0902
 
3D - password
BhavikParmar24
 
3D Password
Ankit Nagar
 
New era of authentication
sunil kumar
 
3D Password
Devyani Vaidya
 

Similar to 3dpassword11.pptx....................... (20)

PPTX
3d password 23 mar 14
Saddam Ahmed
 
PPTX
3d passwords
shwetaag
 
PPTX
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
PPT
3d password ppt
Gowsalyasri
 
PPT
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
PPTX
3d password by suresh
suresh5c2
 
PPTX
3D Passwrd
Rakshita Paliwal
 
PPTX
3d authentication system
Richa Agarwal
 
PPTX
Vivek
Vivek Gupta
 
PPTX
3DPassword_AakashTakale
Aakash Takale
 
PPTX
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
DOCX
3d pass words
mkanth
 
PPTX
3D Password M Sc BHU Sem 1
Swagato Dey
 
PPTX
3d authentication
sudheerpothu
 
PPT
3D Password ppt
Devyani Vaidya
 
PPTX
3 d password
ASHOK KUMAR PALAKI
 
PPT
3 d password
yogendra mahate
 
DOCX
3dpassword.doc
Ajay Kumar
 
PPT
3D PASSWORD
JYoTHiSH o.s
 
3d password 23 mar 14
Saddam Ahmed
 
3d passwords
shwetaag
 
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
3d password ppt
Gowsalyasri
 
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3d password by suresh
suresh5c2
 
3D Passwrd
Rakshita Paliwal
 
3d authentication system
Richa Agarwal
 
3DPassword_AakashTakale
Aakash Takale
 
3d pswdbysuresh-120112091037-phpapp02
bujjiflute
 
3d pass words
mkanth
 
3D Password M Sc BHU Sem 1
Swagato Dey
 
3d authentication
sudheerpothu
 
3D Password ppt
Devyani Vaidya
 
3 d password
ASHOK KUMAR PALAKI
 
3 d password
yogendra mahate
 
3dpassword.doc
Ajay Kumar
 
3D PASSWORD
JYoTHiSH o.s
 
Ad

Recently uploaded (20)

PDF
Introducing Procurement and Supply L2M1.pdf
labyankof
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
MartinaBurlando1
 
PPTX
Congenital Hypothyroidism pptx
AneetaSharma15
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
Sourav Kr Podder
 
PPTX
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
PDF
High Ground Student Revision Booklet Preview
jpinnuck
 
PPTX
Presentation on Janskhiya sthirata kosh.
Ms Usha Vadhel
 
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Sandeep Swamy
 
PDF
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
Sandeep Swamy
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PDF
Landforms and landscapes data surprise preview
jpinnuck
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Introducing Procurement and Supply L2M1.pdf
labyankof
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
NOI Hackathon - Summer Edition - GreenThumber.pptx
MartinaBurlando1
 
Congenital Hypothyroidism pptx
AneetaSharma15
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
Open Quiz Monsoon Mind Game Final Set.pptx
Sourav Kr Podder
 
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
High Ground Student Revision Booklet Preview
jpinnuck
 
Presentation on Janskhiya sthirata kosh.
Ms Usha Vadhel
 
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Sandeep Swamy
 
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
Sandeep Swamy
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
Landforms and landscapes data surprise preview
jpinnuck
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Ad

3dpassword11.pptx.......................

  • 1. 1 3-D PASSWORD SECURE AUTHENTICATION USING PRESENTED BY : ABHISHEK B LMC21CS005 GUIDED BY : Ms. ASHA AS Assistant Professor Dept of Computer Science And Engineering
  • 2. 2 1. Password 2. Authentication 3. Drawbacks of Existing Authentication Techniques 4. Proposed System 5. 3D password 6. Virtual Environment 7. Virtual Objects 8. System Implementation 9. Example 10. State Diagram 11. Programming languages 12. Types of Attacks 13. Advantages 14. Disadvantages 15. Applications 16. References CONTENTS
  • 3. 3 • A password is a string of characters used for authentication. • Password is basically an encryption algorithms. • It is 8-15 character or slightly more than that. PASSWORD
  • 4. 4  Authentication is a process of validating who are you claiming to be.  Human authentication techniques are : 1. Knowledge based (What you know) 2. Token based (What you have) 3. Biometrics (What you are) AUTHENTICATION
  • 5. 5 1. KNOWLEDGE BASED (Pin,Password,Pattern) (a) Easy to remember -> Easy to break Hard to guess -> Hard to remember (b) Vulnerable to attacks like brute force attacks etc. 2. TOKEN BASED(Keys,Smartcard) (a) Duplicate keys, smart cards, ID proofs are easily available. 3. BIOMETRICS(Face,Iris,DNA) (a) exposure of retinas to IR rays. (b) Hackers implement exact copy of your biometrics. DRAWBACKS OF EXISTING AUTHENTICATION TECHNIQUES
  • 6. 6  The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes.  Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more.  Therefore, to ensure high user acceptability, the user’s freedom of selection is important. PROPOSED SYSTEM
  • 7. 7 3-D PASSWORD  The 3D password is a multifactor authentication scheme that combine KNOWLEDGE BASED + TOKEN BASED + BIOMETRICS in one authentication system.  It presents a virtual or real environment containing various objects. The user walks through the environment and interacts with the objects.  More customizable and very interesting way of authentication.
  • 8. 8 • A virtual environment is a computer-based simulated environment. • The 3D virtual environment consists of many items and objects. • Each item has different responses to action. • The user actions, interactions and inputs towards the objects or toward the 3D virtual environment creates the user’s 3D password. • Communication between users can range from text, graphical icons, visual gesture, sound, voice command. VIRTUAL ENVIRONMENT
  • 10. 10 VIRTUAL OBJECTS Virtual objects can be any objects we encounter in real life such as:  A computer on which user can type.  An ATM machine that requires a token (ATM card).  A fingerprint reader that requires user fingerprints.  A paper or white board on which user can write.  A light that can be switched on/off.  A television.  A radio.  A car that can be driven.  A graphical password scheme.
  • 11. 11 SYSTEM IMPLEMENTATION Hardware Requirements: 1. 3D scanning technology (e.g., depth sensors, structured light scanners) 2. High-performance computing hardware 3. Advanced graphics processing units (GPUs) 4. Secure storage devices Software Requirements: 1. 3D modeling and rendering software 2. Biometric authentication software 3. Gesture recognition software 4. Machine learning algorithms 5. Secure authentication protocols
  • 12. 12 SYSTEM IMPLEMENTATION Implementation Steps: 1. User Enrollment: - Capture 3D scan of user's face, hand, or body. - Record gesture patterns. - Store 3D model and gesture data securely. 2. 3D Password Creation: - Use 3D modeling software to create a 3D password model. - Define gesture-based interactions. 3. Authentication Protocol: - Implement secure authentication protocols (e.g., SSL/TLS). - Integrate biometric authentication software.
  • 13. 13 SYSTEM IMPLEMENTATION 4. Gesture Recognition: - Develop gesture recognition algorithms. - Integrate with 3D password model. 5. 3D Password Verification: - Compare input gesture with stored 3D password model. - Verify the data.
  • 14. 14 EXAMPLE • Let us consider a 3D virtual environment space of size G x G x G. The 3D environment space is represented by the coordinates (x,y,z) ϵ [1,…,G] x [1,…,G] x [1,…,G]. • The objects are distributed in the 3D virtual environment with unique (x,y,z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner, card readers, microphones, stylus, etc.
  • 15. 15 • Let us consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around the door located in (1,2,3) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4,5,6), and the user types “ABC”. The initial representation of user actions in the 3D virtual environment can be recorded as follows: (1,2,3) action = open the office door (1,2,3) action = close the office door (4,5,6) action = typing “A” (4,5,6) action = typing “B” (4,5,6) action = typing “C”
  • 16. 16 STATE DIAGRAM Typical Textual Password Enter User Name Performing Graphical Password Moving Inside Virtual 3D Environment Performing Biometrics Changing Item Status Verifying Typing a letter or a number Clicks Access not granted Login password Access granted Specific key password Click on a graphical password item Specific key pressed Biometric item is checked Move object, Turn ON/OFF
  • 17. 17  C++  Java and Java3D  .NET languages such as C# or Visual Basics  Parrot virtual machine  OpenGL library : (i) uses both graphics and CAD programs. (ii) supported on Windows, UNIX workstations, PCs, X-Box, Linux, etc.  GLUT : OpenGL Utility Toolkit (i) library for using C++ and OpenGL  Direct 3D : (i) supported only on Microsoft windows platforms and X-box. PROGRAMMING LANGUAGES
  • 18. 18 TYPES OF ATTACKS 1. Brute Force Attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). The attack is difficult because: (i) Required time to login: Time required to login may vary from 20 seconds to 2 minutes. So, is time consuming. (ii) Cost of attack: Cost of creating 3D virtual environment is very high. 2. Shoulder Suffering Attack: (i) An attacker uses a camera to record the password. (ii) 3D password contains biometric identifications, so are difficult to break.
  • 19. 19 3. Timing Attack: (i) The attacker observes how long it takes a legitimate user to perform a correct sign-in using 3D password. (ii) Helps in determining length of password. (iii) Effective if the 3D virtual environment is designed correctly.
  • 20. 20 1. Provides high security. 2. Flexible, as it provides multifactor authentication ,i.e., token based, knowledge based, biometrics. 3. Provides infinite number of password possibilities. 4. Can be memorized in form of short stories. 5. Ease to change password anytime. 6. Helps to keep lot of personal details. 7. Due to the use of multiple schemes in one scheme password space is increased to great extent. ADVANTAGES OF 3D PASSWORD
  • 21. 21 1. Difficult for blind people to use this technology. 2. A lot of program coding is required. 3. Very expensive. 4. Time and memory requirement is large. DISADVANTAGES OF 3D PASSWORD
  • 22. 22 1. Critical servers. 2. Nuclear reactors and military facilities. 3. Airplanes, jet fighters and missile guiding. 4. A small virtual environment can be used in following areas: (i) ATM. (ii) Desktop computers and laptop logins. (iii) Web authentication. APPLICATIONS OF 3D PASSWORD
  • 23. 23  The authentication can be improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this scheme becomes almost unbreakable. CONCLUSION
  • 24. 24 REFERENCES • [1].Sangeetha, & Ijmtst, Editor. (2022). Secure Authentication Using 3D Password. International Journal for Modern Trends in Science and Technology. 8. 176-179. 10.46501/IJMTST0802029. • [2]. Fawaz Alsulaiman and Abdulmotaleb El Saddik “Three Dimensional Password for more Secure Authentication” ,IEEETransactions on Instrumentations and Measurement. • [3]. Tejal Kognule and Yugandhara Thumbre and Snehal Kognule,“3D password”, International Journal of Computer Applications(IJCA),2012.