Sie sind auf Seite 1von 20

ABM SPs

Anantrao Paw ar College O f Engineering and Research,


Parvati, Pune 09.
D epartm ent of Inform ation Technology
Secure Authentication System : 3D

PASSW O RD

S CH EM E
Presented by :Omkar M. Joshi
Pratik A. Kale
Rohit V. Aru

Guided by :PROF. RANKHAMBE D.P.

IN TRO D U CTIO N

Secure Authentication Using 3D Password

4/13/16

M O TIVATIO N B EH IN D PRO JECT TO PIC


Problems with Existing System
Highly Secure System

Secure Authentication Using 3D Password

4/13/16

O BJECTIVES O F PRO JECT TO PIC


To provide more secure authentication technique than
existing one.
To design & develop more user friendly & easier
authentication scheme and giving user to freedom of
selecting more than one password scheme as single
system.
To overcome the drawbacks & limitations of previously
existing systems (textual password, graphical password
etc.).
New scheme should be combination of recall,
4/13/16
4
recognition, biometrics,
and token based authentication
Secure Authentication Using 3D Password

LITERATU RE S ERVEY
Sr.
No.

Author Name

Paper Name

Description

Salvatore
Catanese,
Emilio Ferrara,
Giacomo
Fiumara,
Francesco
Pagano

A Framework for
Designing 3D Virtual
Environment.

In this paper the


introduction about 3d
virtual environment is
explained.

Mrs. Vidya
Mhaske Dhamdhere.

3-D Graphical
Password Used For
Authentication

A simple 3d objects are use


to authenticate the system.

Vishal Kolh,
Secure
Vipul Gunjal,
Authentication with
Sayali Kalasakar, 3D Password.
Pranjal Rathod

Secure Authentication Using 3D Password

Grover Aman,

4-D Password:

In this paper the very


complex system of 3d
password with 3d virtual
environment is introduced
4/13/16

In this paper the gesture

EXISTIN G S YSTEM
Authentication
Techniques

Knowledge Based
Token Based
Biometrics
Recognition Based

Authentication
Schemes

Recall Based
Recognition Based

Secure Authentication Using 3D Password

4/13/16

TYPES O F A TTACKES
Timing Attacks
Brute force Attacks
Well-Studied Attacks
Key Logger
Shoulder Surfing Attacks

Secure Authentication Using 3D Password

4/13/16

PRO PO SED S YSTEM


3D Password

Fig. 2 (a) snapshot of Art Gallery, (b) snapshot of study room, (c) snapshot of weather forecasting office
Secure Authentication Using 3D Password

4/13/16

R EQ U IREM EN TS S PECIFICATIO N
Hardware
Requirements

Knowledge
SPECIFICATION
Token Based
Biometrics
Recognition Based
Software

Requirements

Open GL
Java or c++

Secure Authentication Using 3D Password

4/13/16

A RCH IECTU RAL S TU D Y

Click
Typing letter or number

Typing a
Textual
Password

Click on textual
password item
Filling
User
Form

Access not
Granted

Finished typing
Specific key is
pressed

Moving into 3D virtual


environment

Login password
Verifying

Performing a
Graphical
Password

Specific key pressed


Biometric item is clicked
Performin
g
Biometrics

Move object , turn on/off etc

Access
Granted

Changing
Object Status

Fig. 3 Architectural Study


Secure Authentication Using 3D Password

4/13/16

10

W O RKIN G O F 3D PASSW O RD S CH EM E

Fig. 4 Working of 3D Password


Secure Authentication Using 3D Password

4/13/16

11

W O RKIN G O F 3D PASSW O RD S CH EM E
(Cont. )
A

User get
Access to
Application
s
Like email,
files etc.

Database

Fig. 4 Working of 3D Password


Secure Authentication Using 3D Password

4/13/16

12

A D VAN TAG ES
3D Password scheme is combination of re-call based,
recognized based, Biometrics etc. into single
authentication technique.
Due to use of multiple schemes into one scheme
password space is increased to great extent.
More secure authentication scheme over currently
available schemes.

Secure Authentication Using 3D Password

4/13/16

13

D ISAD VAN TAG ES


Time and memory requirement is large.
Shoulder-suffering attack is still can affect the schema.
More expensive as cost required is more than other
schemes.

Secure Authentication Using 3D Password

4/13/16

14

A PPLICATIO N S
Networking
Nuclear & Military areas
Airplane & Jetfighters
Other Areas.

Secure Authentication Using 3D Password

4/13/16

15

C O N CLU SIO N

Secure Authentication Using 3D Password

4/13/16

16

EXISTIN G S YSTEM

VS PRO PO SED S YSTEM

Existing System

Proposed System

Different schemes

Combination of all schemes

Problems with Textual Password,


Graphical Password, Biometrics.

In this System all the Drawbacks


of Existing System are Overcome

Cost efficient

High Cost as Compare to


Traditional Password

Secure Authentication Using 3D Password

4/13/16

17

Q U ESTIO N S ????????????

Secure Authentication Using 3D Password

4/13/16

18

R EFEREN CES
[1]
Alsulaiman, F.A., El Saddik, A., Three- for Secure, IEEE Transactions on Instrumentation
and measurement, vol.57, no.9, pp 1929-1938.Sept. 2008.
[2]Vidya Mhaske, 3-D Graphical Password Used For Authentication, International Journal of
Computer Technology & Applications, Vol.3 (2), ISSN: 2229-6093, 510-519.
[3]Tejal Kognule, Yugandhara Thumbre, Snehal Kognule, 3D password, International
Journal of Computer Applications (IJCA), 2012.
[4]A.B.Gadicha, V.B.Gadicha, Virtual Realization using 3D Password, in International Journal
of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N2-216-222.
[5]Fawaz A. Alsulaiman, Abdulmotaleb El Saddik, A Novel 3D Graphical Password Schema,
IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and
Measurement Systems, July 2006.
[6]Duhan Pooja, Gupta Shilpi, Sangwan Sujata, Gulati Vinita, SECURED AUTHENTICATION: 3D
PASSWORD, I.J.E.M.S., VOL.3 (2), 242 245, 2012.
[7]Grover Aman, Narang Winnie, 4-D Password: Strengthening the Authentication Scene,
International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October- 2012.
Secure Authentication Using 3D Password

4/13/16

19

TH AN K YO U

Secure Authentication Using 3D Password

4/13/16

20

Das könnte Ihnen auch gefallen