3D Graphical Password Authentication System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this paper, we present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space.
Authors and Affiliations
Mr. Rakesh Prakash Kumawat, Mr. Sachin Sampat Bhosale, Mr. Prashant Prabhakar Ratnaparkhi
Design of Content Based Image Retrieval Technique(S) Based on Gabor Color Correlation Feature
The rapid growth in the internet and multimedia technology has produced a huge amount of data in the category of images, videos, and audio. This has issued the demand of systems which can store and retrieve multimedia d...
PC Monitoring using Android over Internet
Since there are much application available for remote monitoring between computer to computer but In this application we are doing remote monitoring between mobile phone and computer. Basically nowadays we see that in m...
Survey on Biomedical Image Retrieval System
With the increasing use of Social media thousands of images are being downloaded & uploaded every day. Contentbased image retrieval (CBIR) was in research for the last few years. In particular, there has been growing int...
slugAnalysis and Comparison of Spatial Domain Digital Image Inpainting Techniques
Digital Image Inpainting is an interesting research topic in image processing. Digital Image Inpainting uses spatial or frequency information to restore partially damaged images and paintings. Digital Image Inpainting A...
Investigation on Openstack Nova Scheduler for Customizing Enterprise Private Cloud
Cloud computing is a concept which includes the disciplines like, business models and technologies together to deliver IT capabilities with minimum effort and easy to manage. Cloud is commonly divided into two types, pu...