Professional Documents
Culture Documents
Ilovepdf Merged
Ilovepdf Merged
ON
“3-D PASSWORD”
BACHELOR OF ENGINEERING
IN
Submitted By
MOOLIMANI RAJESHWARI 2GO20CS027
Certificate
This is to certify that the Technical Seminar report entitled “3-D PASSWORD” carried out
by Moolimani Rajeshwari, 2G020CS027, are bonafide student of Government Engineering
College, Haveri in partial fulfillment for the award of Bachelor of Engineering in Computer
Science and Engineering of the Visvesvaraya Technological University, Belagavi during the year
2022-2023. The technical seminar report has been approved as it satisfies the academic requirements
in respect of Technical seminar report prescribed for the said Degree.
We would greatly mention the enthusiastic influence provided by Asst. Prof. Shivaraj H Mali
Seminar Guide, for their ideas and co-operation showed on us during venture and making this
project a great success.
I express my sincere thanks to my technical seminar coordinator Prof. Mrs. Ratna, for his valuable
guidance and kind supervision.
I would greatly mention the enthusiastic influence provided by to Prof. Nityananda, HOD,
Department of Computer Science and Engineering, Project Guide, for their ideas and
cooperation showed on us during venture and making this project a great success.
I take this opportunity to the Principal, Dr Jagadish Kori, GEC HAVERI, for being kind
enough to provide us an opportunity to work on a project in this institution.
I also extend our thanks to all the faculty members of Computer Science Department, GEC
Haveri, who have encouraged us throughout the course of bachelor engineering.
MOOLIMANI RAJESHWARI
2GO20CS027
TABLE OF CONTENTS
Title Page no
3.3 Advantages
3.4 Disadvantages
Chapter 6: Application 12
Conclusion 13
References 14
TABLE OF FIGURES
Figure Names Page No
Fig 1: Multi-Password authentication scheme 5
CHAPTER 1
INTRODUCTION
Authentication is the most basic and important service provided to various systems to provide
security using various authentication schemes. A system should only be used the authorized
users to protect the system. There are many authentication schemes available to provide
security to the systems. There are basically two types of authentication schemes available.
They are: Recall Based, Recognition based.
• Recall Based: Recall Based authentication technique is a technique where a user has to
remember the credentials that he/she has created earlier during the registration or signup. It
includes knowledge-based technique is the part of it. For example: Textual Passwords,
graphical passwords etc. Textual passwords are the most used authentication technique
worldwide.
CHAPTER 2
LITERATURE REVIEW
Dhatri Raval, in her paper explains about the various already available password
authentication schemes such as knowledge based, token based, recognition based, biometrics
based.[1] Parul, Neetu Verma, in their paper discuss about the drawbacks of the already
available authentication schemes. They explained that people use textual passwords which are
easy to remember and they can be cracked easily using Brute force attacks. [2] Nayana S, Dr.
Niranjanamurthy, Dr. Dharmendra Chahar, in their paper explains about the advantages and
disadvantages of the 3D password. They explained that the 3D password is better than the other
existing authentication systems but on the other hand it is expensive.[3] Tejal M. Kognule,
Monica G. Gole, Priyanka T. Dabade, Sagar B. Gawade, in their paper explains about the
objects inside the 3D virtual environment. They found that the objects must be clearly visible
and identical to each other. [4] Mrs Ashwini B P, Ms Bhumika J, Ms Chinmayee T S, Mr. G M
Akshay Bhat, Mr Naveen Kumar N, in their paper explain about the goals of the 3D password
scheme. They explained that the 3D password must be the combination of both recall-based
and recognition-based authentication techniques and these are not easy as to write on paper as
they are coordinates. [5] Ganesh Jairam Rajguru, in his paper he focuses on how the 3D
password can be generated. And how they can be represented on a 2D screen.[6] Parag Vade,
Vaidehi Rahangdale, Saurabh Veer, in their paper focuses on the mathematical concepts related
to 3D password scheme. They discuss on the time complexity, space complexity and the class
problem related to the 3D password. [7] Sahana R. Gadagkar, Aditya Pawaskar, Mrs Ranjeeta
B. Pandhare, in their paper discuss about the design of the 3D environment. They also
discussed about the length of the 3D password based on the design of the system. [8] Anagha
Kelkar, Komal Mukadam, in their paper discussed about the devices required to develop the 3
D password authentication systems. They mostly focussed on the input devices through which
the user interacts the 3 D environment. [9] P.K. Dhanya, M. Keerthiga, S Dinakar, in their paper
discussed on the various attacks that are being done on the already available authentication
schemes. They explained about Brute force attack, timing attacks, well studied attacks etc. [10]
There are many authentication schemes already available. They are knowledge based (textual
CHAPTER 3
RELEVANCE OF TECHNOLOGY
Biometrics includes higher costs than other authentication schemes and is efficient for the
shoulder surfing attacks. In other attacks biometrics are more vulnerable than other techniques.
© 2021 JETIR June 2021, Volume 8, Issue 6 www.jetir.org (ISSN-2349-5162) JETIR2106310
Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org c282 In 3D
password scheme the combination of various authentication schemes depends on the interest
of the user. The user has choice to select the combination and the authentication scheme is
developed on that choice.
The virtual environment can be created based on any real-time environment like office, gallery
etc. The 3D virtual environment are made interactive so the user can interact with the objects
in the virtual environment and create his/her 3D password.
• There are number of options available for users to choose sequence of own choice.
• In 3D password user can build a sequence which is easier for him to remember.
• Software like key logger installed in a system it’s difficult to secure your data these
types software’s are stored all text which are pass through thkeyboard. In 3D
password graphical password is also use for authentication.
CHAPTER 4
SYSTEM ARCHITECTURE
CHAPTER 5
METHODOLOGY
Let us consider a 3-D virtual environment space of size G x G x G. The 3-D environment
space is represented by the coordinates (x, y, z) Є [1, . . . , G] x [1, . . . , G] x [1, . . . , G]. The
objects are distributed in the 3-D virtual environment with unique (x, y, z) coordinates. We
assume that the user can navigate into the 3-D virtual environment and interact with the
objects using any input device such as a mouse, keyboard, fingerprint scanner, iris scanner,
stylus, card reader, and microphone. We consider the sequence of those actions and
interactions using the previous input devices as the user’s 3-D password.
FIG 5: (a) Snapshot of a proof-of-concept 3-D virtual environment, where the user is typing a
textual password on a virtual computer as a part of the user’s 3-D password. (b)Snapshot of a
proof- of-concept virtual art gallery, which contains 36 pictures and six computers
The 3-D password is a multifactor authentication scheme. The 3-D password presents a 3-D
virtual environment containing various virtual objects. The user navigates through this
Virtual objects can be any object that we encounter in real life. Any obvious actions and
interactions toward the real-life objects can be done in the virtual 3-D environment toward the
virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual
3-D environment can be considered as a part of the 3-D password. We can have the following
objects:
1. A computer with which the user can type;
2. A fingerprint reader that requires the user’s fingerprint;
3. A biometrical recognition device;
4. A paper or a white board that a user can write, sign, or Draw on;
5. An automated teller machine (ATM) that requests a token;
6. A light that can be switched on/off;
7. A television or radio where channels can be selected;
8. A staple that can be punched;
9. A car that can be driven;
10. A book that can be moved from one place to another;
11. Any graphical password scheme;
12. Any real-life object;.
CHAPTER 6
APPLICATION
Because a 3-D password can have a password space that is very large compared to other
authentication schemes, the 3-D password’s main application domains are protecting critical
systems and resources. Possible critical applications include the following.
1. Critical servers: Many large organizations have critical servers that are usually
protected by a textual password. A 3-D password authentication proposes a sound
replacement for a textual password. Moreover, entrances to such locations are usually
protected by access cards and sometimes PIN numbers. Therefore, a 3-D password can
be used to protect the entrance to such locations and protect the usage of such servers.
2. Nuclear and military facilities: Such facilities should be protected by the most
powerful authentication systems. The 3-D password has a very large probable
password space, and since it can contain token-, biometrics-, recognition-, and
knowledge-based authentications in a single authentication system, it is a sound choice
for high level security locations.
3. Airplanes and jetfighters: Because of the possible threat of misusing airplanes and
jetfighters for religion-political agendas, usage of such airplanes should be protected
by a powerful authentication system. The 3-D password is recommended for these
systems.
In addition, 3-D passwords can be used in less critical systems because the 3-D virtual
environment can be designed to fit any system’s needs. A small 3-D virtual environment can
be used in many systems, including the following:
1. ATMs;
2. Personal digital assistants;
3. Desktop computers and laptop logins;
4. Web authentication.
CONCLUSION
Currently there are many authentication systems available. Some of them are based on the
users’ behaviour, while some of them are based on users’ knowledge. All of them are used
separately. Being used separately the systems becomes vulnerable to the attackers. The
attackers can get to know the textual passwords through Brute force attacks. This may cause
a huge loss to the users. The 3D password is the multi-factor and multi-password
authentication scheme which can combine all the already available authentication schemes.
Its most basic component is the 3D virtual environment. The 3D virtual environment contains
unique and distinct real-time objects on which the user interacts and generates the password.
The password is generated by noticing the coordinates of the sequence of interactions in the
text file. The text file then encrypts and after that gets stored in the database.
REFERENCES
[1] X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annu.
Comput. Security Appl. Conf., Dec. 5–9, 2005, pp. 463–472.
[2] D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,”
in Proc. USENIX Security Workshop, 1990, pp. 5–14. Authorized licensed use limited
to: IEEE Xplore. downloaded on March 5, 2009 at 02:38 from IEEE Xplore.
Restrictions apply. 1938 IEEE TRANSACTIONS ON INSTRUMENTATION AND
MEASUREMENT, VOL. 57, NO. 9, SEPTEMBER 2008
[3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show
[4] BBC news, Cash Machine Fraud up, Say Banks, Nov. 4, 2006.
[5] G. E. Blonder, “Graphical password,” U.S. Patent 5 559 961, Sep. 24, 1996.
[6] R. Dhamija and A. Perrig, “Déjà Vu: A user study using images for authentication,” in
Proc.
9th USINEX Security Symp., Denver, CO, Aug. 2000, pp. 45–58.
[7] Real User Corporation, The Science Behind Passfaces. (2005, Oct.). [Online].
Available:
http://www.realusers.com