Implementation of Image Based Authentication to Ensure the Security of Mail Server

被引:0
|
作者
Rahim, Abdul M. [1 ]
Anandhavalli, D. [1 ]
机构
[1] Velammal Coll Engn & Technol, Dept Informat Technol, Madurai, Tamil Nadu, India
关键词
Mail Identity; Threat Level; Level of Execution; Message Digest-5 Algorithm; Pretty Good Privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
引用
收藏
页码:555 / 558
页数:4
相关论文
共 50 条
  • [1] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [2] Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol
    Nitin, Del
    Chauhan, Durg Singh
    Sehgal, Vivek Kumar
    Mahanot, Ankit
    Singh, Pallavi
    Ahuja, Sohit
    Shrivastava, Utkarsh
    Rana, Manisha
    Punjabi, Vineet
    Vinay, Shivam
    Sharma, Nakul
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 575 - +
  • [3] A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server Environments
    Lee, Yun-Seok
    Kim, Eun
    Seok, Seung-Joon
    Jung, Min-Soo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (02) : 619 - 622
  • [5] Image based mutual authentication to enhance the web security
    Suresh Kumar, K. (sureshkumar@saveetha.ac.in), 1600, Science and Engineering Research Support Society (09):
  • [6] Security analysis of and proposal for image-based authentication
    Newman, RE
    Harsh, P
    Jayaraman, P
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 141 - 144
  • [7] PACS image security server
    Cao, F
    Huang, HK
    MEDICAL IMAGING 2004: PACS AND IMAGING INFORMATICS, 2004, 5 (25): : 413 - 417
  • [8] Design and Implementation of Authentication Server with High Concurrency
    Xiong, Qi
    He, Xiaofeng
    Tang, Jie
    RESEARCH IN MATERIALS AND MANUFACTURING TECHNOLOGIES, PTS 1-3, 2014, 835-836 : 1791 - +
  • [9] Improvement of Legitimate Mail Server Detection Method using Sender Authentication
    Sakuraba, Shuji
    Yoda, Minami
    Sei, Yuichi
    Tahara, Yasuyuki
    Ohsuga, Akihiko
    2021 IEEE/ACIS 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2021, : 10 - 14
  • [10] Research and implementation of grid security mode based on identity authentication
    Li, Ma
    Zheng Weimin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 499 - 503