Abstract

Abstract: Graphical passwords, two-factor authentication, and other ways are just a few of the many options we have for authentication. Text based protection. Codes are susceptible to a variety of assaults, including dictionary attacks. As a result, as part of the authentication procedure, in addition to the usual alpha-numeric password, we also utilise pictures with captchas. It also fixes the problems with the pass points of graphical password systems. Automated Turing Test for Computers and Humans that Is Completely Public (CAPTCHA) Users who have successfully authenticated must pass a test in order to access their individual mail accounts. Accounts that put the secrecy, reliability, and privacy of data at risk are attacked by bots and other malicious software. This was stopped by the invention of CAPTCHA.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call