Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT
Post: #1

THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT


.pdf  THREE DIMENSIONAL PASSWORD .pdf (Size: 292.54 KB / Downloads: 31)

ABSTRACT

Current authentication systems suffer from many weaknesses. Textual passwords are com-
monly used; however, users do not follow their requirements. Users tend to choose mean-
ingful words from dictionaries, which make textual passwords easy to break and vulnerable
to dictionary or brute force attacks. Many available graphical passwords have a password
space that is less than or equal to the textual password space. Smart cards or tokens can be
stolen. Many biometric authentications have been proposed; however, users tend to resist
using biometrics because of their intrusiveness and the effect on their privacy. Moreover,
biometrics cannot be revoked. In this project, we present and evaluate our contribution, i.e.,
the 3-D password.
The 3-D password is a multifactor authentication scheme. To be authenticated, we present
a 3-D virtual environment where the user navigates and interacts with various objects. The
sequence of actions and interactions toward the objects inside the 3-D environment con-
structs the users 3-D password. The 3-D password can combine most existing authentica-
tion schemes such as textual passwords, graphical passwords, and various types of biomet-
rics into a 3-D virtual environment. The design of the 3-D virtual environment and the type
of objects selected determine the 3-D password key space.

An Overview

The project entitled Three Dimensional Password for More Secure Authentication
aims at developing a multi-factor authentication scheme. The project has been developed
with Android as the Front End and SQLite as the Back End. The project is prepared to
implement in Windows XP platform.

Objective of the Project

The dramatic increase of computer usage has given rise to many security concerns.
One major security concern is authentication, which is the process of validating who you
are to whom you claimed to be. In general, human authentication techniques can be clas-
sified as knowledge based (what you know), token based (what you have), and biometrics
(what you are). Knowledge-based authentication can be further divided into two categories
Recall based and Recognition based. Recall-based techniques require the user to repeat or
reproduce a secret that the user created before. Recognition-based techniques require the
user to identify and recognize the secret, or part of it, that the user selected before. One
of the most common recall-based authentication schemes used in the computer world is
textual passwords. One major drawback of the textual password is its two conflicting re-
quirements: the selection of passwords that are easy to remember and, at the same time,
are hard to guess.

Application Framework

By providing an open development platform, Android offers developers the ability to
build extremely rich and innovative applications. Developers are free to take advantage of
the device hardware, access location information, run background services, set alarms, add
notifications to the status bar, and much, much more.
Developers have full access to the same framework APIs used by the core applications. The
application architecture is designed to simplify the reuse of components; any application
can publish its capabilities and any other application may then make use of those capabil-
ities (subject to security constraints enforced by the framework). This same mechanism
allows components to be replaced by the user.

SYSTEM ANALYSIS

System analysis deals with the study of the current system. System analysis is the most
critical process of information development. It can be defined as problem solving which
consist of our phases they can be successfully completed by applying appropriate each
dimensions of the information system.
System analysis is a logical process; the objective of this phase is not actually to
solve the problem but to determine what must be done to solve the problem. The basic
objective of the analysis stage is to develop the logical model of the system using tools
such as the data flow diagram and elementary data description of the elementary algorithm.
The logical model is subject to review by both the management and the user who agree that
the model does in fact reflect what should be done to solve the problem.
System analysis is not a precise science. It is in fact more of an art, aided by scientific
approach to find definition and recording data, gathering traditional structures is only one
part of the system analysis, the next step is to examine the data, assess the situation and
looking at the alternatives.
Post: #2
Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful dictionary words, which make text passwords easy to break and vulnerable to dictionary attacks or brute force attacks. Many graphic passwords available have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentication has been proposed; however, users tend to resist the use of biometrics because of their intrusion and the effect on their privacy. In addition, biometrics can not be revoked. In this article, we present and evaluate our contribution, ie the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a virtual environment in 3-D where the user navigates and interacts with several objects. The sequence of actions and interactions towards objects within the 3D environment builds the user's 3-D password. The three-dimensional password can combine most of the existing authentication schemes, such as textual passwords, graphical passwords, and various types of biometric data in a three-dimensional virtual environment. The three-dimensional virtual environment design and the type of objects selected determine the three-dimensional password key space.
 

Marked Categories : authontication, major project report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Mini project report on SHADOW ALARM project girl 6 11,060 Today 02:07 PM
Last Post: Austinfloro
  water cooler project report Guest 2 0 Today 10:21 AM
Last Post: Guest
  tcp ip pocket controlling monitor java project Guest 1 0 Yesterday 10:31 AM
Last Post: dhanabhagya
  hydroforming full report project report tiger 5 25,174,535 Yesterday 01:37 AM
Last Post: Guest
  nrega project report er diagram Guest 1 0 18-01-2018 03:31 PM
Last Post: dhanabhagya
  COST EFFECTIVENESS OF MINERAL WOOL INSULATION Vs PERLITE INSULATION full report project report tiger 2 11,770,843 18-01-2018 11:53 AM
Last Post: dhanabhagya
  Solar pond technology full report seminar girl 2 782 18-01-2018 10:08 AM
Last Post: dhanabhagya
  suggestion for informative report of public deposits invited by company Guest 1 0 18-01-2018 10:06 AM
Last Post: dhanabhagya
  Ultrasonic Trapping In Capillaries For Trace-Amount Bi (Download Full Seminar Report) Computer Science Clay 2 6,426,949 17-01-2018 11:59 AM
Last Post: dhanabhagya
  project ideas for diploma students in mechanical Guest 1 0 17-01-2018 11:19 AM
Last Post: dhanabhagya
This Page May Contain What is THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT And Latest Information/News About THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT,If Not ...Use Search to get more info about THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT Or Ask Here

Options: