Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

A Seminar Report

on

3D Password
Submitted in partial fulfillment of requirements
for the award of the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING

Submitted by
P.Roshnara(17091A05B4)

Under the Guidance of


Mr.P.Naveen Sundar KumarM.Tech(Ph.D).
Professor, Dept. of CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


RAJEEV GANDHI MEMORIAL COLLEGE OF ENGINEERING & TECHNOLOGY
(AUTONOMOUS)
Affiliated to JNTUA Anantapuramu, APPROVED BY A.I.C.T.E., NEW DELHI,
ACCREDITED BY NAAC of UGC, NEWDELHI with “A+” grade,
ACCREDITED BY N.B.A, NEWDELHI,
NANDYAL-518501, (Estd-1995)

YEAR: 2020-2021
Rajeev Gandhi Memorial College of Engineering &Technology
(AUTONOMOUS)
APPROVED BY A.I.C.T.E., NEW DELHI, Affiliated to JNTUA, Anantapuramu,
ACCREDITED BY NAAC of UGC,NEWDELHI with 'A+' Grade,
ACCREDITED BY NBA of AICTE, NEWDELHI
NANDYAL-518501

(ESTD – 1995)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE
This is to certify that the report entitled “3D Password” is a bona fide record of the
technical seminar done by P.Roshnara (17091A05B4) under my supervision and guidance, in
partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in
Computer Science & Engineering from R.G.M. College of Engineering & Technology,
Nandyal for the academic year 2020-21.

Guide

Mr. P. Naveen Sundar Kumar M.Tech(Ph.D)


Professor, Dept. of CSE

HOD

Dr. K. Subba ReddyM.Tech, Ph.D.


Professor and HOD

Place: Nandyal
Date:
Candidate’s Declaration

I hereby declare that the technical seminar entitled “3D Password” was carried out and
written by me under the guidance of Mr. P. Naveen Sundar KumarM.Tech(Ph.D), Professor,
Dept. of Computer Science & Engineering, R.G.M. College of Engineering & Technology, and
this technical seminar report is submitted in the partial fulfillment of the requirements for the
award of the degree of “Bachelor of Technology” in Computer Science & Engineering. I have
not submitted the matter presented in this report anywhere for the award of any other Degree.

P.Roshnara

Roll No.:17091A05B4
Dept. of CSE,
RGMCET.
Preface
I have made this report file on the topic 3D Password, I have tried my best to elucidate all the
relevant detail to the topic to be included in the report. While in the beginning I have tried to give
a general view about this topic.

My efforts and wholehearted co-corporation of each and every one has ended on a successful
note. I express my sincere gratitude to Mr. P. Naveen Sundar Kumar M.Tech(Ph.D). who have
assisted me throughout the preparation of this topic. I thank him for providing me the
reinforcement, confidence and most importantly the track for the topic whenever I needed it.

P.Roshnara

17091A05B4

ii
ABSTRACT

The 3D passwords are more customizable and very interesting way of authentication.
Now the passwords are based on the fact of Human memory. Generally simple passwords are set
so as to quickly recall them. The human memory, in our scheme has to undergo the facts of
Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you
log in to a secure site, the 3D password GUI opens up. This is an additional textual password
which the user can simply put. Once he goes through the first authentication, a 3D virtual room
will open on the screen.

Current authentication systems suffer from many weaknesses. Textual passwords are
commonly used. However, users do not follow their requirements. Users tend to choose
meaningful words from dictionaries, which make textual passwords easy to break and vulnerable
to dictionary or brute force attacks. Many available graphical passwords have a password space
that is less than or equal to the textual password space. Smart cards or tokens can be stolen.
Many biometric authentications have been proposed, however, users tend to resist using
biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics
cannot be revoked. The 3D Password is a multifactor authentication scheme. To be
authenticated, there will be a 3D virtual environment where the user navigates and interacts with
various objects. The sequence of actions and interactions towards the objects inside the 3D
environment constructs the user’s 3D Password. The 3Dpassword can combine most existing
authentication schemes such as textual passwords, graphical passwords, and various types of
biometrics into a 3D virtual environment. The design of the 3D virtual environment and the type
of objects selected determine the 3D password key space.
CONTENTS

Chapter No TITLE Page no.


Abstract iii

List of Figures v

1 INTRODUCTION 1-2
1.1 Authentication 2
2 HISTORY 3
3 WHAT IS 3D PASSWORD 4-9
3.1 Definition 4-5
3.2 Key attributes of 3d password 6-8
3.3 System implementation 9
4 WORKING 10-12
4.1 3D Virtual Environment Design 11
4.6 System Importance 12

5 FEATURES 13
6 APPLICATIONS 14-15
7 ADVANTAGES AND DISADVANTAGES 16
8 FUTURE WORK 17
9 CONCLUSION 18
BIBLIOGRAPHY 19-20

IV
LIST OF FIGURES
FIGNO. FIGURE NAME PAGENO

Fig. 1.1 Classification of Existing Authentication System 2


Fig. 3.1 3D Password 5
Fig. 3.2.1 Text Based Password 6
Fig. 3.2.2 Graphical Based Password 7
Fig. 3.2.3 Token Based Password 7
Fig. 3.2.4 Biometric Based Password 8
Fig. 3.3.1 3D Password Selection & Inputs 9
Fig. 4.1 Working Of 3D Password 10
Fig. 4.2 State Diagram of 3D Password 12

V
3D Password

CHAPTER 1

INTRODUCTION

Users nowadays are provided with major password stereotypes such as textual passwords,
biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an
encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or
Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to
undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays,
are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back
Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology
change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we
present our idea, the 3D passwords which are more customizable and very interesting way of
authentication.
Now the passwords are based on the fact of Human memory. Generally simple passwords are
set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of
Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in
to a secure site, the 3D password GUI opens up. This is an additional textual password which the user
can simply put. Once he goes through the first authentication, a 3D virtual room will open on the
screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of
tools, equipments, etc.each of them having unique properties. The user will then interact with these
properties accordingly.
Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving
attribute of each object. This property is common to all the objects in the space. Suppose a user logs in
and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5))
and moves it 5 places to his right (in XY plane i.e. (10, 5, 5)).That can be identified as an
authentication. Only the true user understands and recognizes the object which he has to choose
among many. This is the Recall and Recognition part of human memory coming into play.
Interestingly, a password can be set as approaching a radio and setting its frequency to number only
the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as
input.

Dept of CSE,RGMCET Page 1


3D Password

1.1 Authentication

Authentication is a process of validating who are you to whom you claimed to be or a process
of identifying an individual, usually based on a username and password. To protect any system,
authentication must be provided, so that only authorized persons can have right to use or handle that
system & data related to that system securely.
There are many authentication algorithms are available some are effective & secure but having
some drawback. Previously there are many authentication techniques were introduced such as
graphical password, text password, Biometric authentication, etc.
Generally there are three types of authentication techniques are available such as:

Fig 1.1 Classification of existing authentication systems

Dept of CSE,RGMCET Page 2


3D Password

CHAPTER 2
HISTORY

3D password is an XML-based protocol designed to be an added security layer for online


transactions. This strategy was initially developed by Arcot Systems, Inc and first deployed by Visa
with the purpose of refining the security of Internet payments and is offered to clients under the name
Verified by Visa.

The 3D password is very userfriendly, and very interesting way of authentication process.
Generally passwords are set on the bases of human memory. Usually simple passwords like pet
names, places and phone numbers are set so as to quickly recall them. But in this 3d scheme human
memory has to undertake the facts of recalling, recognition, token or biometrics based authentication
in one single authentication system. When the 3d password is implemented and we log in to a
protected site, the 3D password GUI opens up. Initially in 3d password system user can combine the
earlier existing schemes for example, textual passwords, biometrics, graphical passwords, and even
token based etc. in a single 3D virtual environment.

The user is given the permission for choosing the type of authentication strategy which he is
comfortable. A user who is good at memorizing the password might prefer to select textual or
graphical password schema as a part of their 3d Password. Moreover, a user who often tends to forget
textual passwords prefers to select biometrics or smart cards as part of their 3D Password. Hence,
users are given full freedom to pick and select how the ideal and desired 3D Password will be
constructed.

Once the user gets through the first authentication process next a 3d virtual environment which
is mostly a virtual room will open on the display. This virtual area contains many virtual objects. The
user initially navigates through this environment and interacts with the objects. The 3Dimensional
password generated is usually the combination of all the sequence of user interactions that occur in the
3 Dimensional virtual environment. For example, the user can enter the virtual environment and type a
textual password .Then select a picture frame on a computer that exists in (x1 , y1 , z1 ) position, then
click on the third window of the building in that picture frame that exists at position(x2,y2,z2), then
enter a room that has a thumbprint recognition device that exists in a position (x3 , y3 , z3 ) and
provide his/her impression. The combination and the sequence of the former actions toward the
specific objects construct the user's 3D password.

Dept of CSE,RGMCET Page 3


3D Password
CHAPTER 3

WHAT IS 3D PASSWORD ?

3.1. Definition:

The 3D password is a multifactor authentication scheme. It can combine all existing


authentication schemes into a single 3D virtual environment. This 3D virtual environment contains
several objects or items with which the user can interact. The type of interaction varies from one item
to another. The 3D password is constructed by observing the actions and interactions of the user and
by observing the sequences of such actions. It is the user’s choice to select which type of
authentication techniques will be part of their 3D password.

In 3D password, the user has to first authenticate with simple textual password (i.e. user need
to provide user name and password). Once authentication successful then user moves in 3D virtual
environment, then user automatically enter into an art gallery, where he/she has to select multiple
point in that gallery or he can do some action in that environment like switching button on/off or
perform action associated with any object like opening door, etc. The sequence in which user has
clicked that sequence of points are stored in text file in the encrypted form. In this way the password is
set for that particular user. Next time when user wants to access his account then he has to select all
the objects which he has selected at the time of creating password with proper sequence. This
sequence is then compared with coordinates which are stored in file. If authentication successful
thereafter access is given to authorized user.

This is achieved through interacting only with the objects that acquire information that the user
is comfortable in providing and ignoring the objects that request information that the user prefers not
to provide. Moreover, giving the user the freedom of choice as to what type of authentication schemes
will be part of their 3D password and given the large number of objects and items in the environment,
the number of possible 3D passwords will increase. Thus, it becomes much more difficult for the
attacker to guess the user’s 3D password.

Dept of CSE,RGMCET Page 4


3D Password

The following necessities are satisfied in proposed scheme:


• The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
• The new scheme should be difficult to share with others.
• The new scheme provides secrets that can be easily revoked or changed

Fig.3.1 3D Password

Dept of CSE,RGMCET Page 5


3D Password

3.2. Key Attributes of 3D Password:


• Textual based:
Recall based practices require the user to reproduce a secret again that the user twisted before.
Identification based methods order the user to classify and be aware of the secret or part of that the
user carefully chosen before. One of the most common recall based schemes used in the mainframe
world is textual passwords. One major disadvantage of the textual password is its too inconsistent
requirements in the selection of passwords that are easy to remember and at the same while are hard to
guess.

Fig.3.2.1: Text based password

• Graphical based:
This technique is for those type of users, who can recall and distinguish films better than
words. Some of the graphical password strategies are time consuming to be performed. Moreover
most of the graphical password strategies are exposed to shoulder surfing attacks. Hence, presently
most graphical password techniques are still in their examine phase and indulge more enhancement‟s
and usability studies .

Dept of CSE,RGMCET Page 6


3D Password

Fig.3.2.2: Graphical based Password

• Token based:
In banking authentication structures, it not only requires a knowledge based authentication
systems like textual based and Graphical based systems but also token based system is required.
However, many reports have shown that tokens are susceptible to loss, fraud or theft by using simple
techniques. Any ATM cards, swipe card are examples of token based authentication systems.

Fig.3.2.3: Token based password

Dept of CSE,RGMCET Page 7


3D Password

• Biometric based:
Various Biometric schemes have been proposed; Finger-Prints, Face-Recognition, Voice
Recognition, Retina-Recognition and Palm-Prints are all different biometric systems. But all schemes
are has its own limitations and drawbacks based on several factors such as acceptability, uniqueness,
and consistency. One of the main drawbacks of applying biometrics is its inappropriateness upon a
user’s personal characteristic . Example of biometric system, if the system uses thumbnail expression
of users for authentication purposes. When the system register the new users, it will initially take the
thumbnail expression of new user using thumb recognition device and store it in image format in
system Database record. Next time when the user logs into the system, user will give the thumbnail
expression by using thumb detection device. Later the system validates that image and checks if its
same or not. If the thumbnail expression is validated to be correct then the system provides permission
for next authentication scheme or if the thumbnail expression is validated to be incorrect then the
system gives an error message.

Fig.3.2.4: Biometric based password

Dept of CSE,RGMCET Page 8


3D Password

3.3. System Implementation:

The system implementation can be done by designing a 3D virtual environment that contains objects
that request information to be recalled, information to be recognized, tokens to be presented, and
biometric data to be verified.

For example, the user can enter the virtual environment and type something on a computer that exists
in (x1, y1, z1) position, then enter a room that has a fingerprint recognition device that exists in a
position (x2, y2, z2) and provide his/her fingerprint. Then, the user can go to the virtual garage, open
the car door, and turn on the radio to a specific channel. The combination and the sequence of the
previous actions toward the specific objects construct the user’s 3D password.

Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions
toward the real life objects can be done in the virtual 3D environment toward the virtual objects.
Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can
be considered as a part of the 3D password. We can have the following objects:

• A computer with which the user can type.


• A fingerprint reader that requires the user’s fingerprint.
• An ATM machine that requires a smart card and PIN.
• A light that can be switched on/off.
• A car that can be driven.

Fig. 3.3.1. 3D password selection and inputs

Dept of CSE,RGMCET Page 9


3D Password

CHAPTER 4

WORKING

Consider a three dimensional virtual environment space that is of the size G×G×G. Each point
in the three dimensional environment space represented by the coordinates (x, y, z) ∈ [1..G] × [1..G] ×
[1..G]. The objects are distributed in the three-dimensional virtual environment. Every object has its
own (x, y, z) coordinates. Assume the user can navigate and walk through the three-dimensional
virtual environment and can see the objects and interact with the objects. The input device for
interactions with objects can be a mouse, a keyboard, stylus, a card reader, a microphone…etc.

For example, consider a user who navigates through the 3D virtual environment that consists of a
ground and a classroom. Let us assume that the user is in the virtual ground and the user turns around
to the door located in (9, 16, 80) and opens it. The user types "ANGEL" into a computer that exists in
the position of (10, 5, 25). The user then walks over and turns off the light located in (15, 6, 20), and
then the user closes the door. The user then presses the login button.

The initial representation of user actions in the 3D virtual environment can be recorded as follows:

(9, 16, 80) Action = Open the office door;


(10, 5, 25) Action = Typing, “A”;
(10, 5, 25) Action = Typing, “N”;
(10, 5, 25) Action = Typing, “G”;
(10, 5, 25) Action = Typing, “E”;
(10, 5, 25) Action = Typing, “L”;
(15, 6, 20) Action = Turning the Light Off;
(9, 16, 80) Action = Close the office door;

Fig.4.1. Working of 3D Password

Dept of CSE,RGMCET Page 10


3D Password

4.1 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES

The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of
3D password. The first step in building a 3D password system is to design a 3D environment that
reflects the administration needs and the security requirements. The design of 3D virtual environments
should follow these guidelines.

4.1.1 REAL LIFE SIMILARITY

The prospective 3D virtual environment should reflect what people are used to seeing in real
life. Objects used in virtual environments should be relatively similar in size to real objects (sized to
scale). Possible actions and interactions toward virtual objects should reflect real life situations.
Object responses should be realistic. The target should have a 3D virtual environment that users can
interact.

4.1.2 OBJECT UNIQUENESS AND DISTINCTION

Every virtual object or item in the 3D virtual environment is different from any other virtual
object. The uniqueness comes from the fact that every virtual object has its own attributes such as
position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2.
However, having similar objects such as 20 computers in one place might confuse the user. Therefore,
the design of the 3D virtual environment should consider that every object should be distinguishable
from other objects. Similarly, in designing a 3D virtual environment, it should be easy for users to
navigate through and to distinguish between objects. The distinguishing factor increases the user’s
recognition of objects. Therefore, it improves the system usability.

4.1.3 THREE DIMENSIONAL VIRTUAL ENVIRONMENT SIZE

A 3D virtual environment can depict a city or even the world. On the other hand, it can depict
a space as focused as a single room or office. A large 3D virtual environment will increase the time
required by the user to perform a 3D password. Moreover, a large 3D virtual environment can contain
a large number of virtual objects. Therefore, the probable 3D password space broadens. However, a
small 3D virtual environment usually contains only a few objects, and thus, performing a 3D
password will take less time.

4.1.4 NUMBER OF OBJECTS AND THEIR TYPES

Part of designing a 3D virtual environment is determining the types of objects and how many
objects should be placed in the environment. The types of objects reflect what kind of responses the
object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an
object response type. Selecting the right object response types and the number of objects affects the
probable password space of a 3D password.

Dept of CSE,RGMCET Page 11


3D Password

4.2 SYSTEM IMPORTANCE

The 3D virtual environment should consider what systems will be protected by a 3D password. The
number of objects and the types of objects that have been used in the 3D virtual environment should
reflect the importance of the protected system.

Fig. 4.2. State diagram of 3D password application

Dept of CSE,RGMCET Page 12


3D Password
CHAPTER 5

FEATURES

3d password scheme is a new strategy recognition patterns, textual passwords, biometrics and
graphical passwords. One of the important concepts of 3d password schema is 3d virtual environment
which contains real time object scenarios. Also 3d password is more secure and hard to break.

In order to determine the password space we have to count all the possible 3D passwords that
will have a certain number of actions and interactions. Every user has different requirements and
preferences while selecting the appropriate 3D password because every 3D password system can be
designed according to the protected system requirements the attacker password system. So we try to
propose countermeasures for such attacks.

• TIMING ATTACK:

Here the attack is based on how much time is required by the legitimate user in completing
successful log in using 3D password scheme which gives the attacker mere hints and with this
observation attacker can get a clue regarding authenticated users 3D password length. Yet this attack
is not very much effective as it gives mere clues to the attacker. Thus, it would perhaps be performed
as a part of either brute force attack or well-studied attack. If 3D virtual environment is poorly
designed then timing attacks can be effective.

• BRUTE FORCE ATTACK:

In this kind of attack the attacker has to try n number of possibilities of a 3D password. As
these attacks considers following two points.
1. Required time to login: In a 3d password, time required for successful login varies and depends on
number of obvious actions and interactions, the size of a 3D virtual environment.
2. Cost required to attack: A 3d password scheme requires 3D virtual environment and cost of creating
such an environment is quite expensive

• WELL STUDIED ATTACK:

In this attack the attacker tries to find the whole password scheme. In order to launch such an
attacker, the attacker has to acquire knowledge of the most probable 3d password distributions and
this is very difficult because the attacker has to study all the existing authentication schemes that will
be used in the 3D virtual environment it also requires a study of the users selection of object for
creating 3d password.

• SHOULDER SURFING ATTACK:

Here an attacker uses a camera to record the users 3 Dimensional password or the attacker tries
to watch the legitimate user creates a 3d password. This kind of attack is the most effective than any
other attacks on 3 Dimensional passwords. Therefore, the 3 Dimensional password must be performed
in a secure place where shoulder surfing attack can’t be performed.

Dept of CSE,RGMCET Page 13


3D Password

CHAPTER 6

APPLICATIONS

A 3 Dimensional password can be used in wide area where more security is needed to the
system. Some of the areas are as follows:

• Critical servers:
Many organizations have critical servers that are normally protected by a textual password.
A password authentication scheme proposes a sound replacement for a regular textual password.
However, entrances to such locations are usually protected by PIN numbers and access cards.
Therefore, a 3 Dimensional password can be used to protect the entrance to such locations and usage
of such critical servers.

• Networking:
This involves many areas of computer networks such as client-server architecture,
critical servers, etc. In order to provide more security to server of this architecture a 3D password
mechanism can be used. It is very efficient and more secure way to keep the data or information that is
important should be secured from unauthorized people. For applications such as email, 3 Dimensional
password is most secure and easier scheme to be used.

• Nuclear and military areas:


These are the important areas where more security is needed. These areas should be
protected by the most powerful authentication systems. The 3 Dimensional password has a large
probable password space, and since it can contains token-, biometrics-, recognition-, and knowledge-
based authentications in a single authentication system, it is a choice for high level security locations.

• Airplane and jetfighters:


There are major chances of misuse of airplanes and jetfighters for religion-political
agendas. In such cases airplanes should be protected by a powerful authentication system and 3-
Dimensional password is recommended for these systems. In addition, 3- D passwords can be used in
less critical systems.

Dept of CSE,RGMCET Page 14


3D Password

• Other areas:
We can make use of 3 Dimensional password authentication scheme to areas such as Cyber cafes,
Critical servers, ATM, web services, Industries and many more.
.

Dept of CSE,RGMCET Page 15


3D Password

CHAPTER 7

ADVANTAGES AND DISADVANTAGES

7.1 ADVANTAGES
• 3D Password is multi-feature and multi-password authentication technique.
• 3D password can’t be hacked by any other person easily.
• 3D password has no specific size limit and larger password key space.
• 3D password is easy to be changed.
• This password is better and more secure when compared to existing techniques.

7.2 DISADVANTAGES
• 3d scheme is expensive when compared to others.
• Requires computer expertise.
• Visionless person find it hard to use this technique.
• Lot of program coding is necessary.
• Lot of time and memory consuming.
• Shoulder-suffering attack is still active and can disturb this scheme.

Dept of CSE,RGMCET Page 16


3D Password

CHAPTER 8
FUTURE WORK

The choice of what authentication schemes will be part of the user’s 3D password
reflects the user’s preferences and requirements. A user who prefers to remember and recall a
password might choose textual and graphical passwords as part of their 3D password. On the
other hand, users who have more difficulty with memory or recall might prefer to choose smart
cards or biometrics as part of their 3D password. Moreover, users who prefer to keep any kind
of biometrical data private might not interact with objects that require biometric information.
Therefore, it is the user’s choice and decision to construct the desired and preferred 3D
password. The 3D password is still in its early stages.

Designing various kinds of 3D virtual environments, deciding on password spaces,


and interpreting user feedback and experiences from such environments will result in enhancing
and improving the user experience of the 3D password. Gathering attackers from different
background and attack made by them and how to overcome them is main future work.

Shoulder surfing attacks are still possible so how to overcome that is a field of
research and development. Inclusion of biometrics leads to in-creasing cost and hardware in
scheme, to reduce this is still field of research. So that 3D password can be used in many
application areas as discussed earlier and also many more area other than those.

Thus this paper tells about our study about 3D password, still it is in early stage.
Future work is needed in 3D password scheme to develop this scheme up to more secure level.

“Implementing 3D password for mobile handset is the another important future work.”

Dept of CSE,RGMCET Page 17


3D Password

CHAPTER 7
CONCLUSION

• The 3D password is a multi factor authentication scheme that combines the various
authentication schemes into a single 3D virtual environment.

• The virtual environment can contain any existing authentication scheme or even any
upcoming authentication scheme or even any upcoming authentication schemes by
adding it as a response to actions performed on an object. Therefore the resulting
password space becomes very large compared to any existing authentication schemes.

• The design of the 3D virtual environment the selection of objects inside the environment
and the object's type reflect the resulted password space. It is the task of the system
administrator to design the environment and to select the appropriate object that reflects
the protected system requirements.

• Designing a simple and easy to use 3D virtual environment is a factor that leads to a
higher user acceptability of a 3D password system. The choice of what authentication
scheme will be part of user's 3D password reflects the user's preferences and
requirements

Dept of CSE,RGMCET Page 18


3D Password

CHAPTER 10

BIBLIOGRAPHY

• A.B.Gadicha, V.B.Gadicha-"Virtual Realization using 3D Password" International


Journal of Electronics and Computer Science Engineering, ISSN: 2277-1956, pp216-
223, 2016.

• A.B.Gadicha, V.B.Gadicha-"Virtual Realization using 3D Password" International


Journal of Electronics and Computer Science Engineering, ISSN: 2277-1956, pp216-
223, 2016.

• V.Sindhuja, S.Shiyamaladevi, S.Vinitha-“A Review of 3D Protected Password”


International Journal of Innovative Research in Computer and Communication
Engineering, ISSN: 2320-9801, pp3995-4001, 2016.

• Pooja M. Shelke, F. M. Shelke, Mr. B. G. Pund-“Advance Authentication Technique:


3D Password” International Journal on Recent and Innovation Trends in Computing and
Communication, ISSN: 2321-8169, pp632-635, 2016.

• Vishal Kolhe, VipulGunjal, SayaliKalasakar, PranjalRathod-“ Secure Authentication


with 3D Password” International Journal of Engineering Science and Innovative
Technology, ISSN: 2319-5967, pp99-105, 2013.

• SmritiKhurana, Mili Patel, Prateek Kumar Singh-“ Study of 3D and 4D password


Security” International Journal for Research in Computer Science, pp49-56, 2016.

• AnaghaKelkar, KomalMukadam-” 3D PASSWORD MODERN APPROACH TO


SECURITY” International Journal of Computer Engineering and Applications, ISSN
2321-3469, pp31-38, 2015

• Shivani A. Patil, Shamli A. Hage-“Improving ATM Security Using 3D Password”


International Journal of Advanced Research in Electrical, Electronics and
Instrumentation Engineering, ISSN: 2278 – 8875, pp8308-8312, 2015.

• Mr. Rakesh Prakash Kumawat, Mr. SachinSampatBhosale, Mr. PrashantPrabhakar


Ratnaparkhi-“3D Graphical Password Authentication System” International Journal for
Research in Applied Science & Engineering Technology, ISSN: 2321-9653, pp319-325,
2015.

• NishaSalian, SayaliGodbole, ShalakaWagh-“Advanced Authentication Using 3D


Passwords in Virtual World” International Journal of Engineering and Technical
Research, ISSN: 2321-0869, pp120-125, 2015. [11] DhatriRaval, Abhilash Shukla-
“Security using 3D Password” International Journal of Computer Applications, pp36-38,
2015.

Dept of CSE,RGMCET Page 19


3D Password

• Ms. Swati Bilapatte, Prof. Sumit Bhattacharjee-“3D Password: A novel approach for
more secure authentication” International Journal of Computer Science & Engineering
Technology, ISSN: 2229-3345, pp150-156, 2014.

• KalpanaRathi, Nidhi Sharma, Urmila Jangid-“The survey paper: 3d password”


International Journal of Innovative Computer Science & Engineering, ISSN: 2393-8528,
2014.

Dept of CSE,RGMCET Page 20

You might also like