It's powered by www.schoolseva.com

3D Graphical Password Schema



In this paper, we propose and evaluate our contribution which is a new scheme of authentication. This scheme is based on a virtual three-dimensional environment. Users navigate through the virtual environment and interact with items inside the virtual three-dimensional environment. The combination of all interactions, actions and inputs towards the items and towards the virtual three-dimensional environment constructs the user's 3D password. The 3D password combines most existing authentication schemes such as textual passwords, graphical passwords, and biometrics into one virtual three-dimensional environment. The 3D password's main application is the protection of critical resources and systems.
INTRODUCTION
Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.
Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we preset our idea, the 3D passwords which are more customizable, and very interesting way of authentication.

Download your Presentation Papers from the following Links.


 
 
Graphical Password.pdf
Graphical Password Paper Ieee.doc
graphical passwords.pdf
Graphical Password Tolerance Image Choice 2005.pdf
Shoulder Surfing attack in graphical password authentication.pdf


Responses

0 Respones to "3D Graphical Password Schema"

Post a Comment

 

Recent Posts

Popular Posts

Total Pageviews

Return to top of page Copyright © 2011 | Kuppam Engineering College Converted into Blogger Template by Mohan Murthy