Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 6 , 2022
Captcha as Graphical Password

Author : Greeshma Pillai 1 Radhika Nair 2 Rudhra Menon 3

Date of Publication :7th March 2016

Abstract: As a security measure, nowadays, most systems have a mechanism for authenticating the user in order to log onto the system and exploit its functionalities. This can be done in different ways like entering a password, providing a fingerprint, voice pattern sample, inserting a smart card, or using some other means to prove to the system that you are who you claim to be. The commonly used authentication schemes, which involve text based passwords, have inherent security and usability problems. This resulted in the development of different graphical passwords schemes. The existing password authentication mainly focuses on using textual passwords and a Captcha authentication which is easily susceptible to relay attacks. Thus we propose a new security primitive based on hard AI problems, which involves integrating graphical password scheme and Captcha technology, which we name as Captcha as graphical passwords (CaRP).

Reference :

    1. B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proc. ACM CCS, 2002, pp. 161–170.
    2. (2012, Feb.). The Science Behind Passfaces [Online].Available:http://www.realuser.com/publis hed/ScienceBehindPassfaces.pdf
    3. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.
    4. H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 73–292, 2008.
    5. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.
    6. R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012
    7. P. C. van Oorschot and S. Stubblebine, “On countering online dictionary attacks with login histories and humans-in-the-loop,” ACM Trans. Inf. Syst. Security, vol. 9, no. 3, pp. 235–258, 2006.
    8. M. Alsaleh, M. Mannan, and P. C. van Oorschot, “Revisiting defenses against large-scale online password guessing attacks,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128–141, Jan./Feb. 2012
    9. HP TippingPoint DVLabs, Vienna, Austria. (2010). Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks2010
    10. N. Joshi. (2009, Nov. 29). Koobface Worm Asks for CAPTCHA [Online]. Available: http://blogs.mcafee.com/mcafee-labs/koobfaceworm-asksfor- CAPTCHA
    11. K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, “Building segmentation based humanfriendly human interaction proofs,” in Proc. 2nd Int. Workshop Human Interaction Proofs, 2005, pp. 1–10.
    12. S. Kim, X. Cao, H. Zhang, and D. Tan, “Enabling concurrent dual views on common LCD screens,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 2175–2184.

Recent Article