Enhancing 3 Level Security using 3D Password
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 6 Issue 4, April 2017

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique. 3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment. 3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication tech-nique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper. Authentication is a technique of providing a system to service in a more secure way. Password authentication can be done in various techniques like OTP, Bio-metrics, Textual Password, Graphical Password, and algorithms. But there are some or the other limitations in every techniques. To overcome those limitations a new improved technique named 3D Password is been developed. Our technique uses textual password, graphical password, bio-metrics, recognition, etc. So 3 Level security provides multi factor facility in authentication technique. 3 Level security exclusively uses a 3-Dimensional virtual environment which contains scenarios of real time objects which are not real objects, but looks like the real ones, an biometric device for finger print scanner, and a textual password. Virtual environment is a user interface which looks like the real life environment. 3Level security is more secure and unbreakable authentication method. In this research paper we have focused upon how this 3 Level security technique can be made more user friendly and more secured. Were also explaining what exactly is 3D password, Why is 3D password said to be as most secured authentication technique, working of 3d password technique, some of its related mathematical concepts briefly section wise in this research paper.

Keywords: Authentication, OTP, Bio-metrics, Multi-password, Virtual Environment, 3d password, 3 Level Security, Finger Print

Edition: Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Share this Article

How to Cite this Article?

Divya Prem Chandran, Sailee Sunil Rajeshirke, "Enhancing 3 Level Security using 3D Password", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172870, Volume 6 Issue 4, April 2017, 1808 - 1811

96 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2313 - 2316

Web Application:(with) HoneyWords and HoneyEncryption

Harish Reddy B, Beatrice Ssowmiya J

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

Similar Articles with Keyword 'OTP'

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1210 - 1213

Big Data ? Road to Smart Cities

R. S. Balaji

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 11, November 2013

Pages: 264 - 269

The Effectiveness of Administration and Co-curriculum in Sport to the Involvement of Students in Vocational College in Malaysia

Melati Binti Yaacob, Hairul Nurasyikin Binti Haron

Share this Article

Similar Articles with Keyword 'Virtual Environment'

M.Tech / M.E / PhD Thesis, Information Technology, Indonesia, Volume 3 Issue 12, December 2014

Pages: 213 - 218

Analysis and Implementation of Data Center Virtualization at the ICT Center Fkip UNS

Puspanda Hatta, Widyawan, Warsun Najib

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article
Top