Learn More
being developed using Scripting languages. PHP (ver. 5) and MySQL along with AJAX have been used extensively. Abstract:-Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something(More)
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper(More)
The objective of this paper is to introduce theImproved-Ant Colony Optimization in VirtualCircuit Networks. We discuss AntNet, animproved version of Ant Colony applied as arouting protocol. A new model is proposed thatintroduces the application of Ant ColonyOptimization in the area of communicationnetwork. The proposed model is analyzed with theapplication(More)
As communication is being done by electronic means in open air generally, security of data is highly desirable. One such technique of doing this is steganography. The requirement of a system that ensures increasing capacity, robustness and security of embedded data there have been so many variants in existing steganography technique. Due to this diversity(More)
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play.(More)
  • 1