Web security through improvised image based CAPTCHA

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    CAPTCHA is a Completely Automated Public Turing Test to tell Computers and Humans Apart [1]. Whenever a website is hosted onto a server it is not human that always tries to access the website. Sometimes a human generated computer bot also known as Zombie may try to access the website. In such situations bots need to be filtered from legitimate users and this can be accomplished by using a simple method called CAPTCHA. Initially CAPTCHA was developed on text-based platform later it was evolved to audio, image etc. In this paper a new technique to differentiate bots from humans is introduced. It is a question-based image-oriented technique where a question comprising of keywords is posed along with four different images out of which only one image has relation with all the keywords. The user needs to spot the image to pass the test. A flag will be counting the number of times the user failed the test and depending on the number of failure attempts the user is judged.


  • Keywords


    CAPTCHA; Question based Image oriented technique; Image based CAPTCHA.

  • References


      [1] “The Official CAPTCHA Site.” [Online]. Available: http://www.CAPTCHA.net/.

      [2] M. Tariq Banday, N. A. Shah, “A Study of CAPTCHAs for Securing Web Services”, IJSDIA International Journal of Secure Digital Information Age, Vol. 1. No. 2, December 2009.

      [3] CaoLei,” Image CAPTCHA Technology Research Based on The Mechanism of Finger-Guessing Game”, School of Computer & Communication Engineering, University of Science & Technology Beijing, Beijing, 10083, P. R. China.

      [4] CaoLei,” Image CAPTCHA Technology Research Based on The Mechanism of Finger-Guessing Game”, School of Computer & Communication Engineering, University of Science & Technology Beijing, Beijing, 10083, P. R. China.

      [5] R.P. Anto Kumar, R. Sivakumar and S.S. Aalin Grace, “A New Implementation of Graphical Password Scheme for CAPTCHA Based Security System”, Middle-East Journal of Scientific Research 23 (7): 1353-1357, 2015.

      [6] A. Clementeena and P. Sripriya, “Comparative Study of Algorithms used in CAPTCHA’s and New Finding Set as LCG Algorithm”, Indian Journal of Science and Technology, November 2016. https://doi.org/10.17485/ijst/2016/v9i42/97758.

      [7] Ibrahim FurkanInce, IlkerYengin, YucelBatu Salman, “designing CAPTCHA algorithm: splitting and rotating the images against ocr’s”, Third 2008 International Conference on Convergence and Hybrid Information Technology, Busan, Republic of Korea.

      [8] “A Study of Audio CAPTCHA and their Limitations” K. Aiswarya,. S. Kuppusamy, Department of Computer Science, Pondicherry University, Puducherry, India, Interna tional Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.

      [9] “A Study of Audio CAPTCHA and their Limitations” K. Aiswarya, K. S. Kuppusamy, Department of Computer Science, Pondicherry University, Puducherry, India, Interna tional Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.

      [10] COMS 6998 Computational Photography Spring 2009 “BREAKING AN IMAGE BASED CAPTCHA” FINAL REPORT Michele Merler, Jacquilene Jacob.

      [11] “Detection of Distributed Denial of Service Attacks in Software Defined Networks” Lohit Barki, Amrit Shidling, Nisharani Meti, Narayan D G and Mohammed Moin Mulla, 2016 Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India.


 

View

Download

Article ID: 9481
 
DOI: 10.14419/ijet.v7i1.1.9481




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.