Implementation of Image Based Authentication to Ensure the Security of Mail Server

被引:0
|
作者
Rahim, Abdul M. [1 ]
Anandhavalli, D. [1 ]
机构
[1] Velammal Coll Engn & Technol, Dept Informat Technol, Madurai, Tamil Nadu, India
关键词
Mail Identity; Threat Level; Level of Execution; Message Digest-5 Algorithm; Pretty Good Privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
引用
收藏
页码:555 / 558
页数:4
相关论文
共 50 条
  • [31] E-mail access to NetCME: Implementation of server push paradigm
    McEnery, KW
    Grossman, JE
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1997, : 693 - 697
  • [32] Implementation of Image Encryption based on Chaos-IWT-An Image security
    Banu, Aashiq S.
    Nilofer, Noorul A.
    Harini, M.
    Dhivya, R.
    Rengarajan, Amirtharajan
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 296 - 299
  • [33] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [34] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [35] A client/server implementation of an encryption system for fingerprint user authentication
    Pujol, Francisco A.
    Mora, Higinio
    Luis Sanchez, Jose
    Jimeno, Antonio
    KYBERNETES, 2008, 37 (08) : 1111 - 1119
  • [37] Design and Implementation of Database Security Based on Server SQL Online Course Selection
    Xu, Jingxiu
    Xiong, Jinmeng
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON SENSOR NETWORK AND COMPUTER ENGINEERING, 2016, 68 : 211 - 214
  • [38] PGP-based Security Enhanced Mail gateway (SEMAIL) with POP authentication for large scale organizations
    Chihara, S
    Katagishi, K
    Vasilache, A
    Asami, T
    Murakami, H
    Toraichi, K
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 696 - 699
  • [39] Ensure Privacy and Security in the Process of Medical Image Analysis
    Gomathisankaran, Mahadevan
    Yuan, Xiaohui
    Kamongi, Patrick
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 120 - 125
  • [40] Content-based control of HTTPs mail for implementation of IT-convergence security environment
    Hong, Young Ran
    Kim, Dongsoo
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 231 - 239