INTRODUCTION
Authentication is one of the most important security service received the different authentication system
schemes or algorithms. To protect each system authentication must be provided, so that only authorized persons
can right to that system and data on this system is safe to use or handle. There are many authentication
algorithms are available some are effective and safe, but with only drawback. Rather, there are many
authentication techniques such as introduced as graphical password, text, password, biometric authentication,
etc. General, there are four types of authentication techniques available such as:
Knowledge-based: means that what you know. Textual password is the best example of this
authentication scheme.
Token based: means that what you have. This also applies to credit cards, ATM cards, etc as a
example.
Biometrics: means that what you are. Including Thumb impression, etc.
recognition based: means what you recognize. With graphic password iris recognition,
face detection, etc. [1] - [7].
Ideally, there are two types of Authentication schemes are available based on nature of the scheme and techniques
used, which types are
1) Recall based:
Require user authentication in this tech. to call or to remember his/her password that is created before [1].
Knowledge-based authentication is a part of this technique, e.g. Textual password, password etc. this graphics
is usually used all over the world where security needed.
2) recognition on the basis of:
In this user needed to identify, recognize before password created. Recognition based authentication can be used
graphical password. In General, this technique no longer as Recall basis is used.
Yet both recall based & recognition based authentication techniques have some drawbacks and limitations
When they are used separately or uses one legitimisatieschema at a time. In order to overcome these disadvantages &
limitations of previously existing authentication systems. We have introduced a new authentication scheme
that is based on the already existing arrangements. This authentication scheme is based on the combination of
passwords named as "3D Password". That is a multifactorial scheme makes use of combination of discussed above
scheme, as well as the biometric and many other programs [1]. All these programs run in virtual 3D
environment during making 3D-password. Where this environment includes several virtual objects through which
user interacts with. Interacting with 3D environment changes as per user changes. The 3-D password
constructed by observing the actions and interactions of the user, and by observing the sequences of such actions