CFP last date
20 December 2024
Reseach Article

A survey on E-mail Security and Authentication Process

by Namita Sahu, Pawan Patidar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 3
Year of Publication: 2016
Authors: Namita Sahu, Pawan Patidar
10.5120/ijca2016912064

Namita Sahu, Pawan Patidar . A survey on E-mail Security and Authentication Process. International Journal of Computer Applications. 154, 3 ( Nov 2016), 27-30. DOI=10.5120/ijca2016912064

@article{ 10.5120/ijca2016912064,
author = { Namita Sahu, Pawan Patidar },
title = { A survey on E-mail Security and Authentication Process },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 3 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number3/26473-2016912064/ },
doi = { 10.5120/ijca2016912064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:15.758915+05:30
%A Namita Sahu
%A Pawan Patidar
%T A survey on E-mail Security and Authentication Process
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 3
%P 27-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Online Email messages are not secured as they move crosswise over Internet. Messages can be undelivered or blocked and read by unapproved or unintended people. Email can likewise be surreptitiously altered even fashioned making the feeling that a individual created an impression that she didn't. Customary Internet email does not give methods to guaranteeing uprightness, security or making origin. A computerized signature or advanced mark plan is a sort of uneven cryptography used to the security properties of a transcribed mark on paper. Advanced steganography is the capacity to shroud data in an electronic source. We concentrate on novel information concealing methods gave by the field of steganography to confirm an encoded computerized signature, covered up in an advanced picture. There are no calculations existing as of now to secure email messages which utilize encryption what's more, picture steganography systems together. In this paper we talk about the usage of a calculation which utilizes these two procedures together and examine the execution of the framework. [1]

References
  1. Soheb Munir, A.S.Zadgaonkar and Manish Shrivastava “Key Generation and Verification for Image Authentication”, International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-3 Number-3 Issue-12 September-2013
  2. Suresh Kumar B. and Jagathy Raj V. P. “A Secure Email System Based on IBE, DNS and Proxy Service” Journal of Emerging Trends in Computing and Information Sciences©2009-2012 CIS Journal.
  3. Abhas Tandon,Rahul Sharma, Sankalp Sodhiya and P.M.Durai Raj Vincent “QR Code based secure OTP distribution scheme for Authentication in Net-Banking” in International Journal of Engineering and Technology (IJET). Vol 5 No 3 Jun-Jul 2013
  4. Shabir Ahmad and Bilal Ehsan “ The Cloud Computing Security Secure User Authentication Technique (Multi Level Authentication).” International Journal of Scientific & Engineering Research, Volume 4, Issue 12, December-2013 2166 ISSN 2229-5518
  5. Ms.B.Veera Jyothi, Dr.S.M.Verma and Dr.C.Uma Shanker “Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification” in IJCA Auguest-2014
  6. Neeta Wadhwa, Syed Zeeshan Hussain and S.A.M Rizvi “A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA)” WCE 2013, July 3 - 5, 2013, London, U.K.
  7. Suresh Kumar B. and Jagathy Raj V. P. “A Secure Email System Based on Identity Based Encryption” IJWCNT Volume 1, No.1, August- September 2012
  8. Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi and Tanashree Chavan “Secure Server Verification by using Encryption Algorithm and Visual Cryptography” IJSR Volume 3 Issue 12, December 2014
  9. Yiru Li and Anil Somayaji “Securing Email Archives through User Modeling “School of Computer Science, Carleton University1125 Colonel By Drive, Ottawa, ON K1S 5B6 Canada
  10. Sasirekha N and Hemalatha M , “An Enhanced Code Encryption Approach with HNT Transformations for Software Security”, International Journal of Computer Applications (0975 – 8887) Volume 53– No.10, September 2012
  11. Salvatore J. Stolfo, Chia-Wei Hu, Wei-Jen Li,Shlomo Hershkop and Ke Wang, Olivier Nimeskern “Combining Behavior Models to Secure Email Systems” DARPA contract F30602-00-1-0603
Index Terms

Computer Science
Information Sciences

Keywords

Picture verification One Time Password & Key Security (PV-OTPKS) Cryptography Compression