4-D Authentication System Using Mouse Gesture

Authors

  • Nilima Nikam Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering andTechnology, Bhivpuri Road, Karjat, Maharastra, India
  • Karishma Mane Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering andTechnology, Bhivpuri Road, Karjat, Maharastra, India
  • Minal Kalkute Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering andTechnology, Bhivpuri Road, Karjat, Maharastra, India
  • Ankita Sankhe Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering andTechnology, Bhivpuri Road, Karjat, Maharastra, India
  • Leena Mondkar Department of Computer Engineering, Yadavrao Tasgaonkar Institute of Engineering andTechnology, Bhivpuri Road, Karjat, Maharastra, India

DOI:

https://doi.org/10.53555/nncse.v2i3.491

Keywords:

Authentication, Bio-metrics, 3d environment, Graphical password, Textual password, Virtual Environment, 4D passwords

Abstract

Computer technology is reaching new milestones with every passing day but authentication schemes are still weak in their approach. Many cases of forgeries, hacked accounts are coming up every day. Many authentication schemes have been proposed but each has some drawbacks. Hence, the 3D authentication scheme has been introduced. The 3D password is a multi-layer, multifactor authentication mechanism. It consists of a 3D virtual environment on which a user has to perform certain actions. The sequence of user interactions determines the user’s 3D password. It combines all existing authentication schemes like textual, graphical and bio-metrics into a single 3D virtual environment. This report presents a study of the 3D password and an approach to strengthen it by way of adding a Fourth dimension (4D), that deals with gesture recognition and time recording, and that would help strengthen the authentication paradigm altogether. Hence we attempt to propose a 4D password as a super class of 3D password.

References

International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012.

A. Adamsand M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.

K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.

R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.

M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.

A. Gilbert, "Phishing attacks take a new twist," in CNET News.com, May 04, 2005.

A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.

S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Basic results,” in Proc. Human Comput. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005.

Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,“Three-Dimensional Password for More Secure Authentication,” IEEE, http://ieeexplore.ieee.org, Last Updated –6 Feb 2008J.

Thorpe, P.C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security 2004, San Diego, August 9-13, 2004. J. Williams, “Narrow-Band Analyzer,” PhD dissertation, Dept. of Electrical Eng., Harvard Univ., Cambridge, Mass., 1993. (Thesis or dissertation)

D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical password schemes,” in Proc. 13th USENIX.

Downloads

Published

2015-03-31

How to Cite

Nikam, N., Mane, K., Kalkute, M., Sankhe, A., & Mondkar, L. (2015). 4-D Authentication System Using Mouse Gesture. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 2(3), 71-80. https://doi.org/10.53555/nncse.v2i3.491