3 d password
CONTENTS
 Introduction
 Authentication Schemes
 Functionalities Required
 3D Password selection and Input
 Virtual Environment Design Guidelines
 Applications
 Security Analysis
 Attacks and Countermeasures
 Conclusion
INTRODUCTION
Commonly used authentication schemes are textual
passwords, graphical passwords and biometrics.
3D password is a multifactor authentication scheme.
AUTHENTICATION SCHEMES
KNOWLEDGE BASED
Recall based
Recognition based
TOKEN BASED
eg : smart card
BIOMETRIC BASED
Fingerprint ,palm prints ,hand geometry ,face
recognition
Intrusiveness upon a user’s personal characteristics.
GRAPHICAL PASSWORDS
Recognition based
Recall based
Virtual Computer where user typing a textual password
as a part of user’s 3D Password
Snapshot of a proof-of-concept virtual art
gallery
APPLICATIONS
Critical servers.
Nuclear and military facilities.
Airplanes and jetfighters.
ATMs, PDA’s, desktop computers and laptops.
SECURITY ANALYSIS
3D Password Space Size.
3D Password Distribution Knowledge.
CONCLUSION
Commonly used authentication schemes are
vulnerable to attacks.
3D Password is a multifactor authentication scheme.
Design of 3D virtual environment, selection of objects
inside the environment, and the object type reflects
the resulted password space.
User’s choice and decision to construct the desired
and preferred 3D password
3 d password

More Related Content

PPTX
3 d secure password
PPTX
3d password
PDF
3d password - Report
PPTX
SRAVYA
PPTX
3D Password M Sc BHU Sem 1
PPTX
Authentication scheme for session password using Images and color
PPT
3 d password by M Sangam Subudhi
PPTX
3D Password and its importance
3 d secure password
3d password
3d password - Report
SRAVYA
3D Password M Sc BHU Sem 1
Authentication scheme for session password using Images and color
3 d password by M Sangam Subudhi
3D Password and its importance

What's hot (20)

PPTX
3D PASSWORD
PDF
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
PPT
3D-Password: A More Secure Authentication
PPTX
3d password
PDF
Graphical Password Authentication using image Segmentation for Web Based Appl...
PPTX
Graphical password authentication
PPTX
3D Password
PPTX
3DPassword_AakashTakale
PDF
Graphical password based hybrid authentication system for smart hand held dev...
PPTX
3d password 23 mar 14
PPT
3D Password Presentation
PPT
3D Password
PDF
Authentication Scheme for Session Password using matrix Colour and Text
PPT
3D password
PPTX
3d password by suresh
PPSX
3D PASSWORD
PDF
3D Password PPT
PDF
SEMINAR REPORT ON 3D PASSWORD
PPT
3d password ppt
PPT
3dpassword
3D PASSWORD
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
3D-Password: A More Secure Authentication
3d password
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical password authentication
3D Password
3DPassword_AakashTakale
Graphical password based hybrid authentication system for smart hand held dev...
3d password 23 mar 14
3D Password Presentation
3D Password
Authentication Scheme for Session Password using matrix Colour and Text
3D password
3d password by suresh
3D PASSWORD
3D Password PPT
SEMINAR REPORT ON 3D PASSWORD
3d password ppt
3dpassword
Ad

Similar to 3 d password (20)

PPTX
3D Password
PPTX
3d passwords
PPTX
3D-Password
PPTX
3D PASSWORD
PPTX
3dpassword11.pptx.......................
PPTX
3 d password
DOCX
New era of authentication
PPTX
3d authentication system
PPTX
DOCX
3d pass words
PPTX
3D PASSWORD
PPTX
3 d password
PPTX
3D Passwrd
PPT
3 d password
PPTX
3d password ppt presentation innovative idea
PPTX
3d authentication
PPT
3D Password ppt
3D Password
3d passwords
3D-Password
3D PASSWORD
3dpassword11.pptx.......................
3 d password
New era of authentication
3d authentication system
3d pass words
3D PASSWORD
3 d password
3D Passwrd
3 d password
3d password ppt presentation innovative idea
3d authentication
3D Password ppt
Ad

More from Murlidhar Sarda (13)

PPT
Search engines
PPTX
Motion Capturing Technology
PPTX
PPTX
Human Imaginations
PPTX
Human Cloning
PPT
Goal Line Technology
PPTX
Gesture Recognition
PPT
Face Recognition
PPT
E cash payment
PPTX
Cloud computing
PPT
Silent Sound
PPTX
BITCOIN EXPLAINED
Search engines
Motion Capturing Technology
Human Imaginations
Human Cloning
Goal Line Technology
Gesture Recognition
Face Recognition
E cash payment
Cloud computing
Silent Sound
BITCOIN EXPLAINED

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Five Habits of High-Impact Board Members
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
The various Industrial Revolutions .pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
2018-HIPAA-Renewal-Training for executives
Configure Apache Mutual Authentication
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
Improvisation in detection of pomegranate leaf disease using transfer learni...
Zenith AI: Advanced Artificial Intelligence
A contest of sentiment analysis: k-nearest neighbor versus neural network
sustainability-14-14877-v2.pddhzftheheeeee
The influence of sentiment analysis in enhancing early warning system model f...
Five Habits of High-Impact Board Members
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Build Your First AI Agent with UiPath.pptx
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Comparative analysis of machine learning models for fake news detection in so...
Custom Battery Pack Design Considerations for Performance and Safety
Final SEM Unit 1 for mit wpu at pune .pptx
Module 1.ppt Iot fundamentals and Architecture
2018-HIPAA-Renewal-Training for executives

3 d password