Current time: 30-04-2016, 10:43 AM Hello There, Guest! LoginRegister)
View New Posts | View Today's Posts

Tags: PASSWORD, MORE, SECURE, AUTHENTICATION, full, report, 3D PASSWORD FOR MORE SECURE AUTHENTICATION ppt, 3D PASSWORD FOR MORE SECURE AUTHENTICATION pdf, 3d password for more secure authentication, 3d password sbi, 3d password icici,
 
Thread Rating:
  • 5 Votes - 3.6 Average
  • 1
  • 2
  • 3
  • 4
  • 5
3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
02-03-2011, 09:37 PM
Post: #51
Star RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
plz urgently require d ppt nd more content(algorithm) regarding 3d password authentication.
plz forward d above to mail id-swetasweet17[at]gmail.com
?
Q
04-03-2011, 06:50 PM
Post: #52
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Hii
Can you pls help to do project i am interested to do in this topic..pls i want more details abt this topic a lot.. i am very eager to do project...can any one mail me abt this at happieforever[at]gmail.com

Awaiting for ur reply. pls
?
Q
08-03-2011, 12:19 AM
Post: #53
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Hi,
this thread has the full report of the topic. The thread has almost 11 pages.please go through all the pages to get the complete information
?
Q
11-03-2011, 04:54 PM
Post: #54
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
[attachment=10031]
Sign-up Module:
This module is used to register the user’s 3-D password. After filling the user id the user are allowed to select the 3-D object. Here the user can select the object by giving the values in x, y, z co-ordinates. According to the type of picture the user can give the passwords, it may be either Textual password or Graphical password or Parameter password. These passwords are stored in the database (ie, REGI table). If the user want more security they can register more number of passwords. But the user must remember the type and sequence of password selection. After register the passwords the user must give their user name and register number for application purpose.
Sign-in Module:
The sign-in module is used to validate the person or user. Here also the user first give the user id. After that only the user are allowed to select the password. The user must select the objects in the sequence of they registered during the sign up phase. Here the passwords are stored in the LOGIN table. After that, the values in LOGIN table is compared with the values in REGI table. The user can view the messages, only if the values are in both table. If the order or passwords are not equal then it returns the error message as, ”You are not a valid user” and also the can’t view the messages
Change Password:
If an existing user has to change their password first they have to enter their old password. The old password is compared to already existing registered password. If the passwords are equal, the user is valid user then our system allows the user to register their new password.
?
Q
11-03-2011, 05:49 PM
Post: #55
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
plz send me the ppt and coding. urgently i m in need.
?
Q
15-03-2011, 01:46 AM
Post: #56
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Full doc report on thhis topic..got it from other site dont rem which1 it is...
if any1 got a ppt of this topic do kindly post it over here thank you..
?
Q
15-03-2011, 09:18 PM
Post: #57
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
i want the ppt and pdf
?
Q
17-03-2011, 08:00 AM
Post: #58
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
This concept is so interesting please send more information to me...mail me the total information about it..................
?
Q
18-03-2011, 02:01 PM
Post: #59
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
[attachment=10489]
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
EXISTING SYSTEM
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.
PROPOSED SYSTEM
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
BRIEF DESCRIPTION OF SYSTEM
The proposed system is a multi factor authentication scheme. It can combine all existing authentication schemes into a single 3D virtual environment .This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the user’s 3D password. The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password. Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password.
SYSTEM IMPLIMENTATION
The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.
We can have the following objects:
1) A computer with which the user can type;
2) A fingerprint reader that requires the user’s fingerprint;
3) A biometric recognition device;
4) A paper or a white board that a user can write, sign, or draw on;
5) An automated teller machine (ATM) that requests a token;
6) A light that can be switched on/off;
7) A television or radio where channels can be selected;
8) A staple that can be punched;
9) A car that can be driven;
10) A book that can be moved from one place to another;
11) Any graphical password scheme;
12) Any real life object;
13) Any upcoming authentication scheme.
The action toward an object (assume a fingerprint recognition device) that exists in location (x1, y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ), where x1 = x2 , y1 = y2 , and z1 = z2 . Therefore, to perform the legitimate 3D password, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence.
3D PASSWORD SELECTION AND INPUT
Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone. We consider the sequence of those actions and interactions using the previous input devices as the user’s 3D password.
For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “FALCON.” Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130). The user then presses the login button. The initial representation of user actions in the 3Dvirtual environment can be recorded as follows:
(10, 24, 91) Action = Open the office door;
(10, 24, 91) Action = Close the office door;
(4, 34, 18) Action = Typing, “F”;
(4, 34, 18) Action = Typing, “A”;
(4, 34, 18) Action = Typing, “L”;
(4, 34, 18) Action = Typing, “C”;
(4, 34, 18) Action = Typing, “O”;
(4, 34, 18) Action = Typing, “N”;
?
Q
22-03-2011, 09:37 AM
Post: #60
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
[attachment=10698]
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
EXISTING SYSTEM
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.
PROPOSED SYSTEM
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
BRIEF DESCRIPTION OF SYSTEM
The proposed system is a multi factor authentication scheme. It can combine all existing authentication schemes into a single 3D virtual environment .This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the user’s 3D password. The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password. Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password.
SYSTEM IMPLIMENTATION
The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.
We can have the following objects:
1) A computer with which the user can type;
2) A fingerprint reader that requires the user’s fingerprint;
3) A biometric recognition device;
4) A paper or a white board that a user can write, sign, or draw on;
?
Q
24-03-2011, 12:17 PM
Post: #61
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Presented By
G.PHANINDHER

[attachment=10905]
ABSTRACT:
Secure authentication scheme is one of the most important requirements of current times, considering the fact that more and more activities are being online, let it be shopping, data access from clouds, etc. No doubt there are several authentication schemes already available and being used worldwide, however these preexisting password and authentication schemes have several vulnerabilities. The fact that vulnerabilities exist in preexisting password schemes, researchers are thinking of a password and authentication scheme, which is more efficient in terms of security, the paper “Three-Dimensional Password for More Secure Authentication” is helpful in getting the insight about this mechanism. The paper also talks in-depth about several related topics, like the vulnerabilities in the current authentication schemes, the concept of 3D password scheme, its components, etc..
INTRODUCTION:
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc.Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc.Ten years back Klein performed such tests and he could crack 10-15 passwords per day.Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore 3D passwords are more customizable and very interesting way of authentication.
Drawbacks for Preexisting Password Mechanisms:
Summarily, textual passwords are guessable; drawback of applying biometrics is its intrusiveness upon a user’s personal characteristic, Smart Cards and Tokens can be stolen and duplicated as well for illegal use, weakness of Graphical Passwords is that the server needs to store the seeds of the portfolio images of each user in plain text. Also, the process of selecting a set of pictures from the picture database can be tedious and time consuming for the user.
The fact that vulnerabilities exist in preexisting password schemes, researchers are thinking of a password and authentication scheme, which is more efficient in terms of security, the paper “Three-Dimensional Password for More Secure Authentication” is helpful in getting the insight about this mechanism.
3D password can be recorded this way
Basically a 3D Interactive environment is created, now the way user interacts with any element or object at particular co-ordinate, in this 3D environment, this way of interaction is recorded and becomes a part of his password, now any number of such interactions can be recorded.
This interaction could be, a textual password being entered on a system in 3D environment, or maybe even the walking pattern of the user, all this is the choice of developer.
WORKING:
Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication.
Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage.
Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having a unique property. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x, y, z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication.
Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play.Interestingly,a password can be set as approaching a radio and setting its frequency to number only the user knows. The user can decide his own authentication schemes. If he's comfortable with Recall and Recognition methods then he can choose the 3d authentication just used above.
The authentication can be improved since the unauthorized persons will not interact with the same object as a legitimate user would. We can also include a timer. Higher the security higher the timer. Say after 20 seconds a weak password will be thrown out.
Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo. More the confidentiality more the complexity. In that scenario a virtual environment can be developed as a globe, a city or simply a garage.
Authentication and security have been major issues right from the beginning of the computer age. One of the emerging and efficient keys to security problem is Biometrics-a technology that strives towards identifying the identity of a living person based on biological characteristics. Biometrics possesses many advantages over conventional user authentication processes. Because a biometric is an intrinsic property of some individual they are difficult to duplicate and impossible to share. Examples of automated biometrics include fingerprints, faces, iris and speech. Even though biometric based system is more reliable and secure than conventional authentication methods, it is still possible to hack into a biometric system. There are 8 possible weak links in a generic biometric system.. Two techniques are proposed. One method involves hiding messages in the image and works in conjunction with the image compression method (WSQ). Other method involves checking the liveliness of the signal acquired from an intelligent sensor using a challenge/response strategy. Two key issues associated with a biometric system are privacy concern and re-issuance of identity tokens. A new technique has been proposed called cancelable biometrics in which the biometric signals are distorted using well defined transformations. The techniques proposed enhance the security of a biometric system.
?
Q
26-03-2011, 03:40 PM
Post: #62
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
send ppt and report on this topic
?
Q
31-03-2011, 09:59 AM
Post: #63
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
[attachment=11378]
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
EXISTING SYSTEM
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.
PROPOSED SYSTEM
The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
BRIEF DESCRIPTION OF SYSTEM
The proposed system is a multi factor authentication scheme. It can combine all existing authentication schemes into a single 3D virtual environment .This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the user’s 3D password. The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password. Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password.
SYSTEM IMPLIMENTATION
The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.
We can have the following objects:
1) A computer with which the user can type;
2) A fingerprint reader that requires the user’s fingerprint;
3) A biometric recognition device;
4) A paper or a white board that a user can write, sign, or draw on;
5) An automated teller machine (ATM) that requests a token;
6) A light that can be switched on/off;
7) A television or radio where channels can be selected;
8) A staple that can be punched;
9) A car that can be driven;
10) A book that can be moved from one place to another;
11) Any graphical password scheme;
12) Any real life object;
13) Any upcoming authentication scheme.
?
Q
05-04-2011, 07:58 AM
Post: #64
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
pls send me the full full report to fahadvmjri[at]gmail.com
?
Q
05-04-2011, 11:53 AM
Post: #65
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
hey fahad read each page (from 13 page now ) ...
and most pages included report (as attached file )
for eg read http://www.seminarprojects.org/t-3d-pass...rt?page=13
http://www.seminarprojects.org/t-3d-pass...ull-report
?
Q
05-04-2011, 03:57 PM
Post: #66
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
cn u plz mail me d report and ppt for this topic... it is vey urgent...'ve to give seminars....
?
Q
08-04-2011, 12:32 PM
Post: #67
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
PLEASE SEND ME PPT AND REPORT ON 3D PASSWORD
?
Q
08-04-2011, 03:04 PM
Post: #68
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
hi
report on 3D PASSWORD FOR MORE SECURE AUTHENTICATION is posted in
http://www.seminarprojects.org/t-3d-pass...ull-report
http://www.seminarprojects.org/t-3d-pass...ort?page=3
http://www.seminarprojects.org/t-3d-password--14576
?
Q
15-04-2011, 02:18 PM
Post: #69
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
heyi want ppt and full seminars report
?
Q
18-04-2011, 11:29 AM
Post: #70
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
Presented By
Shilpa.M

[attachment=12286]
3D PASSWORD FOR MORE SECURE AUTHENTICATION
Aim

We propose the 3D passwords for more secure authentications, which are more customizable and very interesting way of authentication.
Introduction
 Multifactor authentication scheme.
 3D virtual environment.
 Selection of objects.
 System administrator.
 Higher user acceptability.
 Choice of authentication scheme.
 Existing system
 Current authentication.
 Textual password.
 Graphical password.
 Smart cards or token.
 Biometric authentication.
 Proposed system
 Multi factor.
 Freedom to select.
 Provides secrets
 Difficult to share with others.
 Easily revoked or share.
typing letter or number clicks
sp

specific key pressed
clicking specific key pressed
graphical
password item

biometric item
is clicked

login pressed
move object
turn on/off
access access granted
not granted
Advantages
 Several authentication schemes.
 Designed according to protected system.
 Decide own authentication.
 Used in critical areas.
 3D environment can be changed.
 Difficult to crack.
 Added with biometrics and card verification.
Disadvantages
 Determining password space.
 Shoulder surfing attack.
 Timing attack.
 Applications
In critical system:
 Critical server.
 Nuclear and Military.
 Airplanes and Jet fighters.
 Applications in small virtual environment
 ATM.
 Personal Digital Assistance.
 Desktop computer and Laptop logins.
 Web authentications.
 Security Analysis.
?
Q
19-04-2011, 04:29 PM
Post: #71
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
[attachment=12421]
1. INTRODUCTION
Authentication is the process of validating who you are to whom you claimed to be. In general, there are four human authentication techniques:
1. What you know (knowledge based).
2. What you have (token based).
3. What you are (biometrics).
4. What you recognize (recognition based).
Textual passwords are the most common authentication techniques used in the computer world. Textual password has two conflicting requirements: passwords should be easy to remember and hard to guess.
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, birthdates etc. Years back hackers performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.
Therefore I present my idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.
The 3D password gives users the freedom of selecting what type of authentication techniques they want to be performed as their 3D password. The 3D password has a large number of possible passwords because of the high number of possible actions and interactions towards every object and towards the three dimensional virtual environment.
2. DISADVANTAGES OF EXISTING SYSTEM
Current authentication system has many loopholes. Current authentication systems suffer from many weaknesses :
• Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to crack.
• Textual passwords are vulnerable to dictionary or brute force attacks.
• Many available graphical passwords have a password space that is less than or equal to the textual password space.
• Smart cards or tokens can be stolen.
• Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked.
The 3D password is a multi factor authentication scheme. The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more.
3. 3-D PASSWORD MODULE
3.1. PROPOSED SYSTEM

The proposed system is a multi factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, biometrics, recognition, or token based, or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Therefore, to ensure high user acceptability, the user’s freedom of selection is important.
The following requirements are satisfied in the proposed scheme
1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess.
2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others.
3. The new scheme provides secrets that can be easily revoked or changed.
4.It fails all the attacks like brute force attacks , dictionary attacks, etc. Hence security is enhanced
3.2. BRIEF DESCRIPTION OF SYSTEM
The proposed system is a multi factor authentication scheme. It can combine all existing authentication schemes into a single 3D virtual environment .This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the user’s 3D password. The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password. Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password.
The idea is simply outlined as follows. The user navigates through a three dimensional virtual environment. The combination and the sequence of the user’s actions and interactions towards the objects in the three dimensional virtual environment constructs the user’s 3D password. Therefore, the user can walk in the virtual environment and type something on a computer that exist in (x1, y1, z1) position, then walk into a room that has a white board that exist in a position (x2, y2, z2) and draw something on the white board. The combination and the sequence of the previous two actions towards the specific objects construct the user’s 3D password. Users can navigate through a three dimensional virtual environment that can contain any virtual object. Virtual objects can be of any type. We will list some possible objects to clarify the idea.
An object can be:
1. A computer that the user can type in
2. A white board that a user can draw on
3. An ATM machine that requires a smart card and PIN
4. A light that can be switched on/off
5. Any biometric device
6. Any Graphical password scheme
7. Any real life object
8. Any upcoming authentication scheme
Moreover, in the virtual three-dimensional environment we can have two different computers in two different locations. Actions and interactions with the first computer is totally different than actions towards the second computer since each computer has a (x,y,z) position in the three-dimensional virtual environment. Each object in the virtual three-dimensional environment has its own (x,y,z) coordinates, speed, weight and responses toward actions.
3.3. SYSTEM IMPLEMENTATION
The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified.
For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual 3D environment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3D environment can be considered as a part of the 3D password.


?
Q
23-04-2011, 06:44 PM
Post: #72
Star RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
It seems everybody needs a ppt of this topic.....Once I needed it myself but couldn't get it from here, but I downloaded the doc files uploaded here of this topic and created a powerpoint presentation for my General Presentation Subject........

I have shared my ppt here to help others who are in need of the ppt of this topic...
To download it, go to the link:
http://www.seminarprojects.org/downloads...inalGp.ppt


Enjoy............
?
Q
13-07-2011, 03:02 PM
Post: #73
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
please send me a full seminars report on 3d password for more secure authentication
?
Q
13-07-2011, 03:11 PM
Post: #74
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
can you tell me about 3dpassword space
?
Q
13-07-2011, 03:30 PM
Post: #75
RE: 3D PASSWORD FOR MORE SECURE AUTHENTICATION full report
sir,
i need the full report on the topic "3d-password" .
i want to learn more about the topic.
i will be thankful to u if u send me the report as soon as possible.
?
Q

Call Cloud: 3d password for more secure authenticationppt, password authentication touchscreen, saminar report on 3d password, power point presentation on 3g passwords for more secure authentication, authentications, gmail secure authentication, secure authentication 3d password ppt,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Optical Computer Full Seminar Report Download computer science crazy 43 32,460 Yesterday 09:16 AM
Last Post: dhanyavp
  ethical hacking full report computer science technology 41 43,268 18-03-2016 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 1,748 27-02-2016 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 18,708 11-02-2016 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 11,847 16-09-2015 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 11,071 01-05-2015 03:36 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 6,035 27-04-2015 01:48 PM
Last Post: seminar report asees
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 6,455 10-02-2015 05:52 PM
Last Post: seminar report asees
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 18,245 07-10-2014 07:57 PM
Last Post: seminar report asees
  IRIS SCANNING Full Seminar Report download Computer Science Clay 27 20,851 17-08-2014 05:49 PM
Last Post: ewpltnbbq