3D password Umesh ECE.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

Password Cracking Lesson 10. Why crack passwords?
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
L.O. Today you will learn how to play chess. How to Play Chess.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
 INTRODUCTION  STEPS OF GESTURE RECOGNITION  TRACKING TECHNOLOGIES  SPEECH WITH GESTURE  APPLICATIONS.
3d ..
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Biometrics and Authentication Shivani Kirubanandan.
Standard Grade Computing COMPUTER STUDIES Standard Grade INPUT DEVICES Chapter 16.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
You are going to work in pairs to produce a Maths board game.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Textual Password How to use the Textual Authentication Model (AC)
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Willing to coordinate DS : Access Control Argus: multi-factor authentication Professor Hui Wang, Dr Omar Nibouche Computer Science Research Institute,
3D PASSWORD FOR SECURE AUTHENTICATION
Jawaharlal Nehru National College of Engineering, Shimoga – Department of Computer Science & Engineering Technical Seminar on, Under the guidance.
Clue-less Human Computer Interface Synergy. Login Screen Drop down menu for character selection. Selected characters will be grayed out These are players.
ICS 463, Intro to Human Computer Interaction Design: 5. Design Processes Dan Suthers.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Different Types of HCI CLI Menu Driven GUI NLI
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Input Devices. Input devices allow us to enter data into the computer system –Mouse –Keyboard –Graphics Tablet –TrackPad –Touch-sensitive screen - Scanner.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Technical Devices for Security Management Kathryn Hockman COSC 481.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (1) The Operating System.
Computer Security Set of slides 8 Dr Alexei Vernitski.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
System Software (1) The Operating System
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Time-base One-time Password Eddy Kleinjan, Data Access Europe.
Information Systems Design and Development Security Precautions Computing Science.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
An Introduction to Biometrics
3D Password.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Towards Another Step from 3D Password to 4D Password:
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
System Access Authentication
Authentication Schemes for Session Passwords using Color and Images
SECURITY in IT ~Shikhar Agarwal.
Authentication.
Two Way Authentication
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
COEN 351 Authentication.
machine learning algorithms RSA Sales Enablement animation
Presentation transcript:

3D password Umesh ECE

Introduction 3D password is a multifactor authentication scheme. Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm . To be authenticated, werequirea3Dvirtualenvironment. Combines recognition-,recall-,token-,and biometrics-based systems.

Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc.  Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let's say a virtual garage.

Example The user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user's 3D password.

3D password authentication The 3D password authentication generally there are four types of authentication techniques are available such as: Knowledge based: means what you know. Textual password is the best example of this authentication scheme. Token based: means what you have. This includes Credit cards, ATM cards, etc as an example. Biometrics: means what you are. Includes Thumb impression, etc. Recognition Based: means what you recognize. Includes graphical password, iris recognition, face recognition, etc.

State diagram for 3D password

Comparison: Text and 3D password The comparison is between the length of textual password and the action and interactions with 3-D objects in virtual environment. In the following table, the textual password length has been taken as one character and a single action which is present in enviornment1 and enviornment2. The following table shows the comparison between the length of text and 3-D password for virtual environment1 and enviornment2

Environment 1 In the suggested scheme we are calculating the password space taking into consideration that the user wants to move a single chess piece at a time when the environment is in view. Assume that we are starting with a chess board that is set up for the start of a game. . Each player has 16 pieces. Consider the scenario where white starts first, white has a total number of 20 moves that he/she can possible make. 1. The white player may move any pawn forward by one or two positions. 2. The white player can move either knight in two different ways. The white player chooses one of those 20 moves and makes it. The equation for calculating the password space is [1]: n=Lmax П (Lmax, G) = Σ (m + g (AC)) n n=l Here, m → All possible actions and interaction towards all existing objects.

Environment 2 In environment-2 the suggested scheme creates the password by moving, rotating and performing zoom operations on the cube. In order to create the codeword there are four different actions i.e., moving cube, rotating cube, moving camera, rotating camera along the x, y, z axis. And for each action user can perform the six different interactions. The terms to calculate password space for environment -2 G – (G ×G×G) → number of actions, interactions and International Journal of Advanced Technology & Engineering Research (IJATER) ISSN No: 2250-3536 Volume 2 inputs. Number of actions = 4 (moving cube, rotating cube, moving camera, rotating camera) Number of interactions = 6 Number of inputs = 6 (Placing an image on each side of cube) So, G = G×G×G = 4×6×6 = 144 m → All possible actions and interactions towards all existing objects in environment.

Thank you www.dreamyproject.com