This document contains a list of figures and their corresponding page numbers. There are 7 figures related to user registration, login, encryption/decryption processes and implementing a 3D password on pages 5-6 and 8-10. Additionally, there are 6 figures on pages 14-16 related to secret key generation, graphical key generation and specification, fingerprint verification, and encryption/decryption processes for sending and receiving files.
This document contains a list of figures and their corresponding page numbers. There are 7 figures related to user registration, login, encryption/decryption processes and implementing a 3D password on pages 5-6 and 8-10. Additionally, there are 6 figures on pages 14-16 related to secret key generation, graphical key generation and specification, fingerprint verification, and encryption/decryption processes for sending and receiving files.
This document contains a list of figures and their corresponding page numbers. There are 7 figures related to user registration, login, encryption/decryption processes and implementing a 3D password on pages 5-6 and 8-10. Additionally, there are 6 figures on pages 14-16 related to secret key generation, graphical key generation and specification, fingerprint verification, and encryption/decryption processes for sending and receiving files.
This document contains a list of figures and their corresponding page numbers. There are 7 figures related to user registration, login, encryption/decryption processes and implementing a 3D password on pages 5-6 and 8-10. Additionally, there are 6 figures on pages 14-16 related to secret key generation, graphical key generation and specification, fingerprint verification, and encryption/decryption processes for sending and receiving files.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 1
LIST OF FIGURES
Sl.no Title Page No.
4.1 User Registration Process...5 4.2 User Login & Key Generator.6 4.3 Encryption & Decryption...6 5.1 Snapshot of 3D Virtual Environment.8 6.1 User Entering Textual Password in 3d Environment..9 7.1 State Diagram showing the implementation of 3D password..10 11.1 Secret Key generation for sender & receiver..14 11.2 Graphical key generation for sender and receiver14 11.3 Specification of graphical key15 11.4 Finger print verification..15 11.5 Sender side encryption process...16 11.6 Receiver side decryption process16 11.7 Save file16