3D Password
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
14-10-2010, 10:44 AM


Prepared by:
ANITHA .Y


.docx   Copy of ORGINAL.docx (Size: 2.17 MB / Downloads: 935)



Introduction


Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses.
Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).
In this paper, we present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space.
Reply
N.Vindhya Rani
Active In SP
**

Posts: 2
Joined: Jan 2011
#2
14-01-2011, 09:57 PM

please provide the ppt of 3DPassword
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#3
17-01-2011, 11:09 AM

below thread contains more details on 3DPassword and you can make wonderful ppt from the provided details.
Reply
praveen kumar arune
Active In SP
**

Posts: 1
Joined: Jan 2011
#4
25-01-2011, 06:09 PM

please provide the ppts for 3d password for more authentication
Reply
amrathajshetty
Active In SP
**

Posts: 1
Joined: Feb 2011
#5
06-02-2011, 07:23 PM

hey i nee more details of 3D password and the ppt
Reply
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#6
08-04-2011, 03:07 PM

hi
report on 3D PASSWORD FOR MORE SECURE AUTHENTICATION is posted in
topicideashow-to-3d-password-for-more-secure-authentication-full-report
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=3
topicideashow-to-3d-password--14576
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#7
15-02-2012, 12:40 PM

to get information about the topic 3d password full report ,ppt and related topic refer the link bellow

topicideashow-to-3d-password-for-more-secure-authentication-full-report

topicideashow-to-3d-password--14576

topicideashow-to-3d-password-ppt
Reply
jonssmith
Active In SP
**

Posts: 8
Joined: Feb 2012
#8
18-02-2012, 04:59 PM

3d password is also a simple password .

it does not different from simple password.


daytonabeachquarters.com


hotels in daytona florida
Reply
sandhyarani26
Active In SP
**

Posts: 1
Joined: Feb 2012
#9
26-02-2012, 02:10 PM

hello, i need more info about 3D password....i need its pdf along with ppt...
pls he[/font]lp me out...
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#10
27-02-2012, 01:02 PM

to get information about the topic 3D Password full report ppt and related topic refer the link bellow

topicideashow-to-3d-password-for-more-secure-authentication-full-report
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=3

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=11

topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=12
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=13
topicideashow-to-3d-password-for-more-secure-authentication-full-report?page=15

topicideashow-to-3d-password--14576


Reply
Monty90
Active In SP
**

Posts: 2
Joined: Feb 2012
#11
27-02-2012, 02:35 PM

hello sir / mam,
i want 3d password seminaar report
Reply
project girl
Moderator
*****

Posts: 10,114
Joined: Nov 2012
#12
28-01-2013, 11:06 AM

3D Password


.doc   3D Password.doc (Size: 92.5 KB / Downloads: 24)

INTRODUCTION

Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

EXISTING SYSTEM

Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.

PROPOSED SYSTEM

The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.

BRIEF DESCRIPTION OF SYSTEM

The proposed system is a multi factor authentication scheme. It can combine all existing authentication schemes into a single 3D virtual environment .This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the user’s 3D password. The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password. Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password.

SYSTEM IMPLIMENTATION

The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.

3D PASSWORD SELECTION AND INPUT

Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone. We consider the sequence of those actions and interactions using the previous input devices as the user’s 3D password.
For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130).

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES

The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. The first step in building a 3D password system is to design a 3D environment that reflects the administration needs and the security requirements. The design of 3D virtual environments should follow these guidelines.
1) Real Life Similarity The prospective 3D virtual environment should reflect what people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real life situations. Object responses should be realistic. The target should have a 3D virtual environment that users can interact
2) Object uniqueness and distinction every virtual object or item in the 3D virtual environment is different from any other virtual object. The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. How ever, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3D virtual environment should consider that every object should be distinguishable from other objects. Similarly, in designing a 3D virtual environment, it should be easy for users to navigate through and to distinguish between objects. The distinguishing factor increases the user’s recognition of objects. Therefore, it improves the system usability.

CONCLUSION

The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore the resulting password space becomes very large compared to any existing authentication schemes. The design of the 3D virtual environment the selection of objects inside the environment and the object's type reflect the resulted password space. It is the task of the system administrator to design the environment and to select the appropriate object that reflects the protected system requirements. Designing a simple and easy to use 3D virtual environment is a factor that leads to a higher user acceptability of a 3D password system. The choice of what authentication scheme will be part of user's 3D password reflects the user's preferences and requirements.
Reply
1pradeep1
Active In SP
**

Posts: 3
Joined: May 2014
#13
11-05-2014, 09:25 PM

I have gone through all page mentioned, everytime i just got the report or other docs.

I urgently need the sourcecode of the same.
Please help me, its very urgent....

please mail the same to pradeep1yadav1@gmail.com

Thanks,
Pradeep
Reply
seminar project topic
Super Moderator
******

Posts: 490
Joined: Jan 2014
#14
13-05-2014, 10:28 AM

To get full information or details of 3D Password please have a look on the pages

topicideashow-to-3d-password--14576?highlight=3D+Password

topicideashow-to-3d-password-documentation?highlight=3D+Password

topicideashow-to-3d-password--90967?highlight=3D+Password

topicideashow-to-3d-password-report?highlight=3D+Password

topicideashow-to-3d-password-full-report--82274?highlight=3D+Password

topicideashow-to-abstract-of-3d-password?highlight=3D+Password

if you again feel trouble on 3D Password please reply in that page and ask specific fields in 3D Password
Reply
Guest
Thinking To Register

 
#15
05-09-2014, 01:25 PM

(14-10-2010, 10:44 AM)seminar surveyer Wrote: Prepared by:
ANITHA .Y




Introduction


Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses.
Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).
In this paper, we present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Secure Recognition Based Graphical Password by Watermarking seminar tips 0 983 18-01-2013, 03:37 PM
Last Post: seminar tips
  SAFE & HANDY PASSWORD MANAGER seminar flower 0 699 19-06-2012, 12:06 PM
Last Post: seminar flower
  Picture Password(A Visual Login Technique for Mobile Devices ) seminar class 1 2,027 18-03-2011, 03:27 PM
Last Post: 69.bharath@gmail.com