Implementation of Image Based Authentication to Ensure the Security of Mail Server

被引:0
|
作者
Rahim, Abdul M. [1 ]
Anandhavalli, D. [1 ]
机构
[1] Velammal Coll Engn & Technol, Dept Informat Technol, Madurai, Tamil Nadu, India
关键词
Mail Identity; Threat Level; Level of Execution; Message Digest-5 Algorithm; Pretty Good Privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
引用
收藏
页码:555 / 558
页数:4
相关论文
共 50 条
  • [41] Content-based control of HTTPs mail for implementation of IT-convergence security environment
    Young Ran Hong
    Dongsoo Kim
    Journal of Intelligent Manufacturing, 2014, 25 : 231 - 239
  • [42] A robust NIfTI image authentication framework to ensure reliable and safe diagnosis
    Basheer, Shakila
    Singh, Kamred Udham
    Sharma, Vandana
    Bhatia, Surbhi
    Pande, Nilesh
    Kumar, Ankit
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [43] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [44] AUTHENTICATION AND ENCRYPTION FOR MEDICAL IMAGE SECURITY SYSTEM
    Kannammal, A.
    Rani, S. Subha
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2014, 29 (04): : 448 - 455
  • [45] Image Steganography for Increasing Security of OTP Authentication
    Arokiasamy, Aldrin Wilfred
    Skarbek, Wladyslaw
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2018, 2018, 10808
  • [46] Server-less RFID authentication and searching protocol with enhanced security
    Lee, Chin-Feng
    Chien, Hung-Yu
    Laih, Chi-Sung
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) : 376 - 385
  • [47] Biometric authentication and image encryption for image security in cloud framework
    Vishruti Kakkad
    Meshwa Patel
    Manan Shah
    Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019, 2 : 233 - 248
  • [48] Authentication and encryption for medical image security system
    20151700771893
    1600, Acta Press, Building B6, Suite 101, 2509 Dieppe Avenue S.W., Calgary, AB, T3E 7J9, Canada (29):
  • [49] Biometric authentication and image encryption for image security in cloud framework
    Kakkad, Vishruti
    Patel, Meshwa
    Shah, Manan
    MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2019, 2 (04) : 233 - 248
  • [50] Implementation of the Image Logging Server for Web Forensics
    Yoo, Seunghee
    Mun, Yilhyeong
    Cho, Dongsub
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 61 - 64