International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842
Issue 07, Volume 5 (July 2018) www.irjcs.com
__________________________________________________________________________________________________
IRJCS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.281
Indexcopernicus: (ICV 2016): 88.80
© 2014- 18, IRJCS- All Rights Reserved Page -406
THREE STEP VERIFICATION SYSTEMS USING
EXTREMELY PROTECTED BY SOCIAL NETWORKING
K. Muthu Meena,
Research Scholar in Department of Computer Science,
Noorul Islam Centre for Higher Education,
Kumaracoil, Kanyakumari Dt, Tamilnadu, India
meenajeeva88@gmail.com
Dr. J.R.Jeba.,
Associate Professor, Department of Computer Applications,
Noorul Islam Centre for Higher Education,
Kumaracoil Kanyakumari Dt, Tamilnadu, India
jrjeba@rediffmail.com
Manuscript History
Number: IRJCS/RS/Vol.05/Issue07/JYCS10088
Received: 14, July 2018
Final Correction: 19, July 2018
Final Accepted: 27, July 2018
Published: July 2018
Citation: Meena & Jeba (2018). THREE STEP VERIFICATION SYSTEMS USING EXTREMELY PROTECTED BY SOCIAL
NETWORKING. IRJCS:: International Research Journal of Computer Science, Volume V, 406-417.
doi://10.26562/IRJCS.2018.JYCS10088
Editor: Dr.A.Arul L.S, Chief Editor, IRJCS, AM Publications, India
Copyright: ©2018 This is an open access article distributed under the terms of the Creative Commons Attribution
License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author
and source are credited
Abstract - In today's world, social media play an incredibly large role in the way the world exists in general. In this
analysis introduce secure breached Social Networking security and hacked accounts to be protected. In the social
networking site user want to reset or forgot their password on his social network account to using three Step
Verification Systems using extremely protected. The first step secure using dialer secret password (color based
click count) method and second step Password by own picture is a new graphical password system for social
networking that restore the personal images typically used in graphical password systems with personalized sign.
The proposed secure system used with personal pictures displayed end user device such as a mobile or desktop.
The third one is to Authenticating users with the help of their friends (i.e., trustee-based social authentication) has
been show into be a promising backup authentication mechanism. In this new social network security trustees that
were chosen from the user’s friends. The user wants to get back access to the account the social network provider
sends different verification codes to the user’s trustees. The user must obtain at least verification codes from the
trustees before being directed to reset his or her password.
Keywords – Three step secure; trustee-based; forgot password; graphical password;
I. INTRODUCTION
Social media is a website where people develop virtual social networks; share their interests, activities,
backgrounds or people that know each other from the real life. A person can create their own accounts and connect
with their friends in their account. These networks also allow users to find new friends, creating groups & pages
and develop their friend circles. Sharing is another important feature by which users are able to share photos,
videos, activities, interests, and many more items what they like. Users can up-to-date their information by visiting
social media, interact with others through chatting, comments etc. They can surf other members profile and know
others quickly. This project is used to develop a technique based on three step verification systems using extremely
protected by social networking. These days high measure of day by day collaboration with informal communities,
make them compelling piece of the client's life.