Realtime Authentication using 3D Password

被引:0
|
作者
Chakraborty, Supriya [1 ]
Kundu, Rahul [1 ]
Paramanik, Saikat [1 ]
Kumari, Annu [2 ]
Mukherjee, Ushoshee [1 ]
机构
[1] Amity Univ Kolkata, AIITK, Kolkata, India
[2] Global Logo, Software Serv, Gurugram, India
关键词
Authentication; 3D password; Biometrics; Virtual Environment; Textual password; Multi-password;
D O I
10.1109/IPRECON55716.2022.10059508
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The complex advancement of the computing world makes access to confidential information more vulnerable. The daily activities like banking, official back-office activities and etc. are performed completely online. The sustainable and successful practice for authentication is One Time Password. However, it needs end-user interaction and either internet or phone connection. In this regard, a new alternative scheme with less requirement of resources- 3D password is proposed that uses real-time features of end-users for accessing the confidential data/services. In this work, facial expression, eye-ball movement, and keyboard values are collated and normalize to form the 3D password and subsequently validated. The exhaustive experimental results exhibit around 80
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Automatic 3D face authentication
    Beumier, C
    Acheroy, M
    IMAGE AND VISION COMPUTING, 2000, 18 (04) : 315 - 321
  • [22] Stronger password authentication using browser extensions
    Ross, B
    Jackson, C
    Miyake, N
    Boneh, D
    Mitchell, JC
    USENIX Association Proceedings of the 14th USENIX Security Symposium, 2005, : 17 - 31
  • [23] PASSWORD AUTHENTICATION USING NEWTON INTERPOLATING POLYNOMIALS
    LIN, CH
    CHANG, CC
    WU, TC
    LEE, RCT
    INFORMATION SYSTEMS, 1991, 16 (01) : 97 - 102
  • [24] PassDB: A password database with strict privacy protocol using 3D Bloom filter
    Patgiri, Ripon
    Nayak, Sabuzima
    Borgohain, Samir Kumar
    INFORMATION SCIENCES, 2020, 539 (539) : 157 - 176
  • [25] Protecting Password Piracy using Authentication Protocol
    Subhashini, K.
    Bhuvaneswari, M. S.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 116 - 119
  • [26] Password authentication using Hopfield neural networks
    Wang, Shouhong
    Wang, Hai
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (02): : 265 - 268
  • [27] Realtime 3D Segmentation for Human-Robot Interaction
    Ueckermann, Andre
    Haschke, Robert
    Ritter, Helge
    2013 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2013, : 2136 - 2143
  • [28] Realtime 3D stress measurement in curing epoxy packaging
    Richter, J.
    Hyldgard, A.
    Birkelund, K.
    Hansen, O.
    Thomsen, E. V.
    TRANSDUCERS '07 & EUROSENSORS XXI, DIGEST OF TECHNICAL PAPERS, VOLS 1 AND 2, 2007,
  • [29] A device for realtime 3D image-guided IMRT
    Dempsey, JF
    Benoit, D
    Fitzsimmons, JR
    Haghighat, A
    Li, JG
    Low, DA
    Mutic, S
    Palta, JR
    Romeijn, HE
    Sjoden, GE
    INTERNATIONAL JOURNAL OF RADIATION ONCOLOGY BIOLOGY PHYSICS, 2005, 63 (02): : S202 - S202
  • [30] Octree-based fusion for realtime 3D reconstruction
    Zeng, Ming
    Zhao, Fukai
    Zheng, Jiaxiang
    Liu, Xinguo
    GRAPHICAL MODELS, 2013, 75 : 126 - 136