Open Access Open Access  Restricted Access Subscription Access

3D Password Enabling Using Gait Technology

BalaSai Charan, Venkat Narayana Rao, Saras Chandra

Abstract


Existing authentication systems is suffering with many weaknesses. In general, textual passwords are used to secure normal user accounts or data. However, these can be cracked by some techniques such as, if the number of characters is being fixed and there will be a finite number of possibilities as the length of the password is fixed (maximum allowed length). The current existing graphical password system uses less space than that of the textual passwords space. Firstly considering a 3D password, it is a combination of more than one authentication systems.. When the user intend to set a 3D password, it redirects into a 3D-virtual environment where in different types of objects navigates. User password will be set in the order in which he/ she selects/ interacts with those objects. Password key will be set based on intended 3D virtual environment and on the objects selected. Combining many systems of certification is an advantage of this 3D technique, providing higher security than the existing arrangement. Human gaits can also be combined with 3D password to provide more security to the users. Textual passwords may be easily ruptured because of fixed maximum possible length and harmfull as there is a chance of losing token based techniques/smart cards such as passports. Graphical passwords can be easily recorded as they take much time. In this paper, the usage of Human gaits face expressions, walk style, smile, etc. are taken into consideration and captured ultimately to attain better secured authenticated system than exiting scenario.


Keywords


Gait, password, attacks, motion, secured, graphical.

Full Text:

PDF

References


X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annu. Comput. Security Appl. Conf., Dec. 5–9, 2005, pp. 463–472.

D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,” in Proc. USENIX Security Workshop, 1990, pp. 5–14.

NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003.

T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). [Online]. Available: ATMMarketPlace.com

BBC news, Cash Machine Fraud up, Say Banks, Nov. 4, 2006.

G. E. Blonder, “Graphical password,” U.S. Patent 5 559 961, Sep. 24, 1996.

R. Dhamija and A. Perrig, “Déjà Vu: A user study using images for authentication,” in Proc. 9th USINEX Security Symp., Denver, CO, Aug. 2000, pp. 45–58.


Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments


 
  
 

 

  


About ASRJETS | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

ASRJETS is published by (GSSRR).