Implementation of Image Based Authentication to Ensure the Security of Mail Server

被引:0
|
作者
Rahim, Abdul M. [1 ]
Anandhavalli, D. [1 ]
机构
[1] Velammal Coll Engn & Technol, Dept Informat Technol, Madurai, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT) | 2014年
关键词
Mail Identity; Threat Level; Level of Execution; Message Digest-5 Algorithm; Pretty Good Privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
引用
收藏
页码:555 / 558
页数:4
相关论文
共 50 条
  • [21] Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices
    Park, Chang-Seop
    BIOMED RESEARCH INTERNATIONAL, 2014, 2014
  • [22] Security Improvement on a Biometrics-Based Authentication Protocol for Multi-server Environment
    Gu, Yi
    Li, Shengqiang
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1322 - 1327
  • [23] Providing Security for NFC-Based Payment Systems Using a Management Authentication Server
    Al-Haj, Ali
    Al-Tameemi, Mayyadah Adnan
    2018 4TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2018), 2018, : 184 - 187
  • [24] Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
    Debiao He
    Shuhua Wu
    Wireless Personal Communications, 2013, 70 : 323 - 329
  • [25] Implementation of Home Network Security System based on Remote Management Server
    Jang, Young Gun
    Choi, Hoon Il
    Park, Chan Kon
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 267 - 274
  • [26] On (in)security of "a robust image authentication method"
    Uehara, T
    Safavi-Naini, R
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 1025 - 1032
  • [27] On the security of the SARI image authentication system
    Radhakrishnan, R
    Memon, N
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 971 - 974
  • [28] An enhanced mutual authentication and security protocol for IoT and cloud server
    Panda, Prabhat Kumar
    Chattopadhyay, Sudipta
    INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 144 - 156
  • [29] Research and implementation of database security application server
    Shao, P.Y.
    2001, Chinese Academy of Sciences (12):
  • [30] Image-Based Authentication Security Improvement by Randomized Selection Approach
    Balajee, R. M.
    Kannan, M. K. Jayanthi
    Mohan, V. Murali
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 61 - 71