SlideShare a Scribd company logo
2
Most read
5
Most read
8
Most read
3D PASSWORD
Presented by:
S.Karishma
CONTENTS
 EXISTING AUTHENTICATION TECHNIQUES
 DRAWBACKS
 3D PASSWORD
 VIRTUAL ENVIRONMENT
 VIRTUAL OBJECT
 SYSTEM IMPLEMENTATION
 WORKING OF 3D PASSWORD SCHEME
 ADVANTAGES
 DISADVANTAGES
 APPLICATION
 CONCLUSION
EXISTING AUTHENTICATION TECHNIQUES
KNOWLEDGE BASED
1. Password
2. Pattern
3. PIN
TOKEN BASED
1. ATM cards
2. Smart cards
BIOMETRICS
1. Thumb impression
2. Iris
3. Voice
4. Face recognition
DRAWBACKS
KNOWLEDGE BASED
 Easy to hack
 Hard to remember
TOKEN BASED
 Availability of duplicate smartcards and ATM cards.
BIOMETRICS
 Exposure of retina in IR rays
3D PASSWORD
 The 3D password is a multifactor authentication scheme that
combines KNOWLEDGE BASED + BIOMETRICS + 3D
PASSWORD in one authentication system.
 It presents a virtual environment containing various virtual
objects.
 The user walks through the environment and interacts with the
objects.
 More customizable and very interesting way of authentication.
VIRTUAL ENVIRONMENT
 The 3D password is a multi factor authentication scheme.
 The 3D password presents a 3D virtual environment containing
various virtual objects.
 The user navigates through this environment and interacts with
the objects.
 The user actions, interactions and inputs towards the objects or
toward the 3D virtual environment creates the user’s 3D
password.
IMAGE OF VIRTUAL ENVIRONMENT
VIRTUAL OBJECTS
Virtual objects can be any objects we encounter in real life such
as:
 A computer with which the user can type
 A light that can be switched on/off
 A television or radio where channels can be selected
 A car that can be driven
 A book that can be moved from one place to another
 Any graphical password scheme
 Any real life object
SYSTEM IMPLEMENTATION
 The action towards an object that exists in location (x1,y1,z1)
is different from action towards an another object at (x2,y2,z2).
 To perform the legitimate 3D password the user must follow
the same scenario performed by the legitimate user.
 This means interacting with the same objects that reside at
exact location and perform the exact actions in the proper
sequence.
WORKING OF 3D PASSWORD SCHEME
ADVANTAGES
1. Provides high security.
2. Flexible, as it provides multifactor authentication ,i.e., token
based, knowledge based, biometrics.
3. Provides infinite number of password possibilities.
4. Ease to change password anytime.
5. Helps to keep lot of personal details.
6. Due to the use of multiple schemes in one scheme password
space is increased to great extent.
DISADVANTAGES
1. Difficult for blind people to use this technology.
2. A lot of program coding is required.
3. Very expensive.
4. Time and memory requirement is large.
APPLICATIONS
1. Critical servers.
2. Nuclear reactors
3. Military facilities.
4. Airplanes
5. Jet fighters
6. Missile guiding.
7. Networking.
8. ATM.
CONCLUSION
 The authentication can be improved with 3D password,
because the unauthorized person may not interact with same
object at a particular location as the legitimate user.
 It is difficult to crack because it has no fixed number of steps
and a particular procedure.
 Added with biometrics and token verification this scheme
becomes almost unbreakable.
THANK YOU!

More Related Content

PPT
3D-Password: A More Secure Authentication
PPTX
3D Password and its importance
PPTX
3D Password
PPTX
3d password ppt
PPTX
3D Password
PPT
3D Password Presentation
PPT
3D PASSWORD
PPTX
3D Password M Sc BHU Sem 1
3D-Password: A More Secure Authentication
3D Password and its importance
3D Password
3d password ppt
3D Password
3D Password Presentation
3D PASSWORD
3D Password M Sc BHU Sem 1

What's hot (20)

PDF
SEMINAR REPORT ON 3D PASSWORD
PPT
3d password ppt
PDF
3d password - Report
PPTX
3D PASSWORD
PPT
3D Password
PPT
graphical password authentication
PPTX
3D-Password
PDF
3D Password PPT
PPT
3 d password
PPTX
3D Password
PPT
Graphical password
PPTX
3d password by suresh
PPT
Steganography presentation
PPTX
3 d password
PPTX
Virtual keyboard
PPTX
3d password 23 mar 14
PPTX
3d passwords
PPTX
Graphical password authentication
PPTX
Steganography and watermarking
SEMINAR REPORT ON 3D PASSWORD
3d password ppt
3d password - Report
3D PASSWORD
3D Password
graphical password authentication
3D-Password
3D Password PPT
3 d password
3D Password
Graphical password
3d password by suresh
Steganography presentation
3 d password
Virtual keyboard
3d password 23 mar 14
3d passwords
Graphical password authentication
Steganography and watermarking
Ad

Similar to 3D PASSWORD SEMINAR (20)

PPTX
3dpassword by janapriya
PPTX
3D - password
DOCX
3d pass words
PPTX
3dpassword11.pptx.......................
PDF
A Novel Revolutionary highly secured Object authentication schema
DOCX
New era of authentication
PDF
C0361419
PPTX
3d authentication system
DOCX
3dpassword.doc
PPTX
3D Password by Kuldeep Dhakad
PPTX
3D PASSWORD
PPTX
3d authentication
PPTX
3DPassword_AakashTakale
PPTX
3d pswdbysuresh-120112091037-phpapp02
PPTX
3d password ppt presentation innovative idea
PPT
Ppt on 3d password (2)
PPT
3D Password ppt
3dpassword by janapriya
3D - password
3d pass words
3dpassword11.pptx.......................
A Novel Revolutionary highly secured Object authentication schema
New era of authentication
C0361419
3d authentication system
3dpassword.doc
3D Password by Kuldeep Dhakad
3D PASSWORD
3d authentication
3DPassword_AakashTakale
3d pswdbysuresh-120112091037-phpapp02
3d password ppt presentation innovative idea
Ppt on 3d password (2)
3D Password ppt
Ad

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Well-logging-methods_new................
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
Internet of Things (IOT) - A guide to understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech
UNIT 4 Total Quality Management .pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lesson 3_Tessellation.pptx finite Mathematics
CH1 Production IntroductoryConcepts.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mechanical Engineering MATERIALS Selection
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Structs to JSON How Go Powers REST APIs.pdf
Well-logging-methods_new................
Model Code of Practice - Construction Work - 21102022 .pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Lecture Notes Electrical Wiring System Components
Embodied AI: Ushering in the Next Era of Intelligent Systems
Arduino robotics embedded978-1-4302-3184-4.pdf

3D PASSWORD SEMINAR

  • 2. CONTENTS  EXISTING AUTHENTICATION TECHNIQUES  DRAWBACKS  3D PASSWORD  VIRTUAL ENVIRONMENT  VIRTUAL OBJECT  SYSTEM IMPLEMENTATION  WORKING OF 3D PASSWORD SCHEME  ADVANTAGES  DISADVANTAGES  APPLICATION  CONCLUSION
  • 3. EXISTING AUTHENTICATION TECHNIQUES KNOWLEDGE BASED 1. Password 2. Pattern 3. PIN TOKEN BASED 1. ATM cards 2. Smart cards BIOMETRICS 1. Thumb impression 2. Iris 3. Voice 4. Face recognition
  • 4. DRAWBACKS KNOWLEDGE BASED  Easy to hack  Hard to remember TOKEN BASED  Availability of duplicate smartcards and ATM cards. BIOMETRICS  Exposure of retina in IR rays
  • 5. 3D PASSWORD  The 3D password is a multifactor authentication scheme that combines KNOWLEDGE BASED + BIOMETRICS + 3D PASSWORD in one authentication system.  It presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  More customizable and very interesting way of authentication.
  • 6. VIRTUAL ENVIRONMENT  The 3D password is a multi factor authentication scheme.  The 3D password presents a 3D virtual environment containing various virtual objects.  The user navigates through this environment and interacts with the objects.  The user actions, interactions and inputs towards the objects or toward the 3D virtual environment creates the user’s 3D password.
  • 7. IMAGE OF VIRTUAL ENVIRONMENT
  • 8. VIRTUAL OBJECTS Virtual objects can be any objects we encounter in real life such as:  A computer with which the user can type  A light that can be switched on/off  A television or radio where channels can be selected  A car that can be driven  A book that can be moved from one place to another  Any graphical password scheme  Any real life object
  • 9. SYSTEM IMPLEMENTATION  The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2).  To perform the legitimate 3D password the user must follow the same scenario performed by the legitimate user.  This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence.
  • 10. WORKING OF 3D PASSWORD SCHEME
  • 11. ADVANTAGES 1. Provides high security. 2. Flexible, as it provides multifactor authentication ,i.e., token based, knowledge based, biometrics. 3. Provides infinite number of password possibilities. 4. Ease to change password anytime. 5. Helps to keep lot of personal details. 6. Due to the use of multiple schemes in one scheme password space is increased to great extent.
  • 12. DISADVANTAGES 1. Difficult for blind people to use this technology. 2. A lot of program coding is required. 3. Very expensive. 4. Time and memory requirement is large.
  • 13. APPLICATIONS 1. Critical servers. 2. Nuclear reactors 3. Military facilities. 4. Airplanes 5. Jet fighters 6. Missile guiding. 7. Networking. 8. ATM.
  • 14. CONCLUSION  The authentication can be improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this scheme becomes almost unbreakable.