Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. This techniques has some limitations and drawbacks. When users choose meaningful words from dictionaries, by using brute force attacks, it makes textual passwords vulnerable to dictionary and easy to break. To overcome the drawbacks, a new authenticate technique is proposed in this paper in order to provide for more security authentication system. In this paper the textual password will be hidden in an i...
As a significant verification method, digital signature algorithm introduces a technique to endorse ...
Security and confidentiality are important aspects needed in the exchange of messages through the ne...
The Internet as a whole does not use secure links,thus information in transit may be vulnerable to i...
Sending messages in the form of image files among the public or business people using the SMS featur...
Steganography is the process of hiding a secret message within a larger one in such a way that someo...
With the development of means of communication and the exchange of information over the Internet, an...
In today's fast-paced world of technology, the use of smartphones or iPhones has become so widesprea...
Steganography is the science of invisible communication. Apart from the sender and intended recipien...
With the development of means of communication and the exchange of information over the Internet, an...
In one of the most emerging technologies for automatic people recognition is Signature-based authent...
Increase in the number of attack recorded during electronic exchange of information between the sour...
Abstract- Security has become major issue in all online services. Strong authentication is provided ...
The Internet as a whole does not use secure links, thus information in transit may be susceptible to...
Hiding data is a very important thing nowadays as the data travels over various unsecure networks. T...
Abstract: Steganography is fetching attraction because of rapid growth & use of internet as a co...
As a significant verification method, digital signature algorithm introduces a technique to endorse ...
Security and confidentiality are important aspects needed in the exchange of messages through the ne...
The Internet as a whole does not use secure links,thus information in transit may be vulnerable to i...
Sending messages in the form of image files among the public or business people using the SMS featur...
Steganography is the process of hiding a secret message within a larger one in such a way that someo...
With the development of means of communication and the exchange of information over the Internet, an...
In today's fast-paced world of technology, the use of smartphones or iPhones has become so widesprea...
Steganography is the science of invisible communication. Apart from the sender and intended recipien...
With the development of means of communication and the exchange of information over the Internet, an...
In one of the most emerging technologies for automatic people recognition is Signature-based authent...
Increase in the number of attack recorded during electronic exchange of information between the sour...
Abstract- Security has become major issue in all online services. Strong authentication is provided ...
The Internet as a whole does not use secure links, thus information in transit may be susceptible to...
Hiding data is a very important thing nowadays as the data travels over various unsecure networks. T...
Abstract: Steganography is fetching attraction because of rapid growth & use of internet as a co...
As a significant verification method, digital signature algorithm introduces a technique to endorse ...
Security and confidentiality are important aspects needed in the exchange of messages through the ne...
The Internet as a whole does not use secure links,thus information in transit may be vulnerable to i...