Research Paper | Information Technology | India | Volume 6 Issue 4, April 2017
Enhancing 3 Level Security using 3D Password
Divya Prem Chandran, Sailee Sunil Rajeshirke
Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique. 3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment. 3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication tech-nique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper. Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique. 3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment. 3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication technique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper.
Keywords: Authentication, OTP, Bio-metrics, Multi-password, Virtual Environment, 3d password, 3 Level Security, Finger Print
Edition: Volume 6 Issue 4, April 2017
Pages: 1808 - 1811
How to Cite this Article?
Divya Prem Chandran, Sailee Sunil Rajeshirke, "Enhancing 3 Level Security using 3D Password", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172870, Volume 6 Issue 4, April 2017, 1808 - 1811
96 PDF Views | 91 PDF Downloads
Similar Articles with Keyword 'Authentication'
Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014
Pages: 747 - 750A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Mokal P. H., Devikar R. N.
Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015
Pages: 1458 - 1459Remote Voting System Using Extended Visual Cryptography
Tridib Chakraborty, Mizan Md Chowdhury
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2313 - 2316Web Application:(with) HoneyWords and HoneyEncryption
Harish Reddy B, Beatrice Ssowmiya J
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1892 - 1895Securing Data in Cloud Using Homomorphic Encryption
Honey Patel, Jasmin Jha
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1043 - 104Comparative Study of MAC Algorithms in Pervasive Computing Environment
P. Bakkiya Lakshmi, K. Kumar
Similar Articles with Keyword 'OTP'
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1892 - 1895Securing Data in Cloud Using Homomorphic Encryption
Honey Patel, Jasmin Jha
Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015
Pages: 2128 - 2131A Comprehensive Survey on CAPTCHA and VRP
Vijayalaxmi Daundkar, Prashant Kumbharkar
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1210 - 1213Big Data ? Road to Smart Cities
R. S. Balaji
Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017
Pages: 1808 - 1811Enhancing 3 Level Security using 3D Password
Divya Prem Chandran, Sailee Sunil Rajeshirke
Research Paper, Information Technology, Malaysia, Volume 2 Issue 11, November 2013
Pages: 264 - 269The Effectiveness of Administration and Co-curriculum in Sport to the Involvement of Students in Vocational College in Malaysia
Melati Binti Yaacob, Hairul Nurasyikin Binti Haron
Similar Articles with Keyword 'Virtual Environment'
M.Tech / M.E / PhD Thesis, Information Technology, Indonesia, Volume 3 Issue 12, December 2014
Pages: 213 - 218Analysis and Implementation of Data Center Virtualization at the ICT Center Fkip UNS
Puspanda Hatta, Widyawan, Warsun Najib
Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017
Pages: 1808 - 1811Enhancing 3 Level Security using 3D Password
Divya Prem Chandran, Sailee Sunil Rajeshirke