4-D Authentication System Using Mouse Gesture
DOI:
https://doi.org/10.53555/nncse.v2i3.491Keywords:
Authentication, Bio-metrics, 3d environment, Graphical password, Textual password, Virtual Environment, 4D passwordsAbstract
Computer technology is reaching new milestones with every passing day but authentication schemes are still weak in their approach. Many cases of forgeries, hacked accounts are coming up every day. Many authentication schemes have been proposed but each has some drawbacks. Hence, the 3D authentication scheme has been introduced. The 3D password is a multi-layer, multifactor authentication mechanism. It consists of a 3D virtual environment on which a user has to perform certain actions. The sequence of user interactions determines the user’s 3D password. It combines all existing authentication schemes like textual, graphical and bio-metrics into a single 3D virtual environment. This report presents a study of the 3D password and an approach to strengthen it by way of adding a Fourth dimension (4D), that deals with gesture recognition and time recording, and that would help strengthen the authentication paradigm altogether. Hence we attempt to propose a 4D password as a super class of 3D password.
References
International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-2012.
A. Adamsand M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
A. Gilbert, "Phishing attacks take a new twist," in CNET News.com, May 04, 2005.
A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Basic results,” in Proc. Human Comput. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005.
Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,“Three-Dimensional Password for More Secure Authentication,” IEEE, http://ieeexplore.ieee.org, Last Updated –6 Feb 2008J.
Thorpe, P.C. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. USENIX Security 2004, San Diego, August 9-13, 2004. J. Williams, “Narrow-Band Analyzer,” PhD dissertation, Dept. of Electrical Eng., Harvard Univ., Cambridge, Mass., 1993. (Thesis or dissertation)
D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical password schemes,” in Proc. 13th USENIX.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.