International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 282

Research Paper | Information Technology | India | Volume 6 Issue 4, April 2017 | Popularity: 6.6 / 10


     

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke


Abstract: Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique.3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment.3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication tech-nique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper. Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique.3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment.3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication technique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper.


Keywords: Authentication, OTP, Bio-metrics, Multi-password, Virtual Environment, 3d password, 3 Level Security, Finger Print


Edition: Volume 6 Issue 4, April 2017


Pages: 1808 - 1811



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Divya Prem Chandran, Sailee Sunil Rajeshirke, "Enhancing 3 Level Security using 3D Password", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 1808-1811, https://www.ijsr.net/getabstract.php?paperid=ART20172870, DOI: https://www.doi.org/10.21275/ART20172870



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 1981 - 1987

Data Center Optimization for Telecom: Implementing Cost-Effective Strategies to Optimize Data Center Operations in Telecom, Focusing on Efficiency Improvements and Cost Reduction Initiatives, Aligned with Your Data Center Optimization Expertise

Jeevan Manda

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Downloads: 111

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Downloads: 116

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1210 - 1213

Big Data - Road to Smart Cities

R. S. Balaji

Share this Article

Downloads: 126

Research Paper, Information Technology, Malaysia, Volume 2 Issue 11, November 2013

Pages: 264 - 269

The Effectiveness of Administration and Co-curriculum in Sport to the Involvement of Students in Vocational College in Malaysia

Melati Binti Yaacob, Hairul Nurasyikin Binti Haron

Share this Article
Top