4-D Authentication System Using Mouse Gesture
DOI:
https://doi.org/10.53555/nncse.v2i3.491Keywords:
Authentication, Bio-metrics, 3d environment, Graphical password, Textual password, Virtual Environment, 4D passwordsAbstract
Computer technology is reaching new milestones with every passing day but authentication schemes are still weak in their approach. Many cases of forgeries, hacked accounts are coming up every day. Many authentication schemes have been proposed but each has some drawbacks. Hence, the 3D authentication scheme has been introduced. The 3D password is a multi-layer, multifactor authentication mechanism. It consists of a 3D virtual environment on which a user has to perform certain actions. The sequence of user interactions determines the user’s 3D password. It combines all existing authentication schemes like textual, graphical and bio-metrics into a single 3D virtual environment. This report presents a study of the 3D password and an approach to strengthen it by way of adding a Fourth dimension (4D), that deals with gesture recognition and time recording, and that would help strengthen the authentication paradigm altogether. Hence we attempt to propose a 4D password as a super class of 3D password.
References
International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012.
A. Adamsand M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
A. Gilbert, "Phishing attacks take a new twist," in CNET News.com, May 04, 2005.
A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Basic results,” in Proc. Human Comput. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005.
Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,“Three-Dimensional Password for More Secure Authentication,” IEEE, http://ieeexplore.ieee.org, Last Updated –6 Feb 2008J.
Thorpe, P.C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security 2004, San Diego, August 9-13, 2004. J. Williams, “Narrow-Band Analyzer,” PhD dissertation, Dept. of Electrical Eng., Harvard Univ., Cambridge, Mass., 1993. (Thesis or dissertation)
D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical password schemes,” in Proc. 13th USENIX.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.