Beruflich Dokumente
Kultur Dokumente
PASSW O RD
S CH EM E
Presented by :Omkar M. Joshi
Pratik A. Kale
Rohit V. Aru
IN TRO D U CTIO N
4/13/16
4/13/16
LITERATU RE S ERVEY
Sr.
No.
Author Name
Paper Name
Description
Salvatore
Catanese,
Emilio Ferrara,
Giacomo
Fiumara,
Francesco
Pagano
A Framework for
Designing 3D Virtual
Environment.
Mrs. Vidya
Mhaske Dhamdhere.
3-D Graphical
Password Used For
Authentication
Vishal Kolh,
Secure
Vipul Gunjal,
Authentication with
Sayali Kalasakar, 3D Password.
Pranjal Rathod
Grover Aman,
4-D Password:
EXISTIN G S YSTEM
Authentication
Techniques
Knowledge Based
Token Based
Biometrics
Recognition Based
Authentication
Schemes
Recall Based
Recognition Based
4/13/16
TYPES O F A TTACKES
Timing Attacks
Brute force Attacks
Well-Studied Attacks
Key Logger
Shoulder Surfing Attacks
4/13/16
Fig. 2 (a) snapshot of Art Gallery, (b) snapshot of study room, (c) snapshot of weather forecasting office
Secure Authentication Using 3D Password
4/13/16
R EQ U IREM EN TS S PECIFICATIO N
Hardware
Requirements
Knowledge
SPECIFICATION
Token Based
Biometrics
Recognition Based
Software
Requirements
Open GL
Java or c++
4/13/16
Click
Typing letter or number
Typing a
Textual
Password
Click on textual
password item
Filling
User
Form
Access not
Granted
Finished typing
Specific key is
pressed
Login password
Verifying
Performing a
Graphical
Password
Access
Granted
Changing
Object Status
4/13/16
10
W O RKIN G O F 3D PASSW O RD S CH EM E
4/13/16
11
W O RKIN G O F 3D PASSW O RD S CH EM E
(Cont. )
A
User get
Access to
Application
s
Like email,
files etc.
Database
4/13/16
12
A D VAN TAG ES
3D Password scheme is combination of re-call based,
recognized based, Biometrics etc. into single
authentication technique.
Due to use of multiple schemes into one scheme
password space is increased to great extent.
More secure authentication scheme over currently
available schemes.
4/13/16
13
4/13/16
14
A PPLICATIO N S
Networking
Nuclear & Military areas
Airplane & Jetfighters
Other Areas.
4/13/16
15
C O N CLU SIO N
4/13/16
16
EXISTIN G S YSTEM
Existing System
Proposed System
Different schemes
Cost efficient
4/13/16
17
Q U ESTIO N S ????????????
4/13/16
18
R EFEREN CES
[1]
Alsulaiman, F.A., El Saddik, A., Three- for Secure, IEEE Transactions on Instrumentation
and measurement, vol.57, no.9, pp 1929-1938.Sept. 2008.
[2]Vidya Mhaske, 3-D Graphical Password Used For Authentication, International Journal of
Computer Technology & Applications, Vol.3 (2), ISSN: 2229-6093, 510-519.
[3]Tejal Kognule, Yugandhara Thumbre, Snehal Kognule, 3D password, International
Journal of Computer Applications (IJCA), 2012.
[4]A.B.Gadicha, V.B.Gadicha, Virtual Realization using 3D Password, in International Journal
of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N2-216-222.
[5]Fawaz A. Alsulaiman, Abdulmotaleb El Saddik, A Novel 3D Graphical Password Schema,
IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and
Measurement Systems, July 2006.
[6]Duhan Pooja, Gupta Shilpi, Sangwan Sujata, Gulati Vinita, SECURED AUTHENTICATION: 3D
PASSWORD, I.J.E.M.S., VOL.3 (2), 242 245, 2012.
[7]Grover Aman, Narang Winnie, 4-D Password: Strengthening the Authentication Scene,
International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October- 2012.
Secure Authentication Using 3D Password
4/13/16
19
TH AN K YO U
4/13/16
20