We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

CAPTCHA: A Security Review

by Sudarshan Soni, Padma Bonde
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 4
Year of Publication: 2017
Authors: Sudarshan Soni, Padma Bonde
10.5120/ijca2017914377

Sudarshan Soni, Padma Bonde . CAPTCHA: A Security Review. International Journal of Computer Applications. 168, 4 ( Jun 2017), 44-47. DOI=10.5120/ijca2017914377

@article{ 10.5120/ijca2017914377,
author = { Sudarshan Soni, Padma Bonde },
title = { CAPTCHA: A Security Review },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 4 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number4/27867-2017914377/ },
doi = { 10.5120/ijca2017914377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:16.436598+05:30
%A Sudarshan Soni
%A Padma Bonde
%T CAPTCHA: A Security Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 4
%P 44-47
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Completely Automated Public Turing test to tell Computers and Human Apart(CAPTCHA) is an automated test that humans can pass, but current computer programs could not pass. The main purpose of CAPTCHA is to block automated scripts that are posted spam content everywhere they can. In this paper, various types of CAPTCHA techniques has been discussed. There is a constant require to enhance current CAPTCHAs and to develop new CAPTCHAs in order to provide security against newly generated programs which can create thousands of e-mail accounts used for stuff online polls with ballots, malicious purposes, and develop worms and viruses contained in emails.

References
  1. B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proc. ACM CCS, 18-22 Nov. 2002, Washington DC USA, pp. 161–170.
  2. Moy G., Jones N., Harkless C., Potter R.,“Distortion estimation techniques in solving visual CAPTCHAs”, IEEE CVPR, pp. II-23-II-28, Vol. 2l, 2004
  3. Ahmad Salah El Ahmad, Jeff Yan,“Breaking Visual CAPTCHAs with Naïve Patter Recognition Algorithms”, IEEE Computer Security Applications Conference, Dec 2007, Miami Beach FL USA ,pp. 279- 291,.
  4. Jeff Yan, Ahmad Salah El Ahmad,“A low-cost attack on a Microsoft captcha”, Proceeding of the 15th ACM Conference on Computer and communications security, October, 2008,Tacoma WA USA, pp. 543-554.
  5. Rich Gossweiler, Maryam Kamvar and Shumeet Baluja, “What’s Up CAPTCHA? A CAPTCHA Based on Image Orientation”, ACM 2009,20-24 April 2009, New York NY USA, pp. 841-850.
  6. R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4,4 Aug. 2012, New York NY USA.
  7. 2012, Feb. The Science Behind Passfaces [Online]. Available: http://www.realuser.com/published/ScienceBehindPassfaces.pdf
  8. Tsheten Tamang and Pattarasinee Bhattarakosol, “Uncover Impact Factors of Text-based CAPTCHA Identification”, Computing and Convergence Technology (ICCCT), 2012 7th International Conference on IEEE, 13 June 2013,Seoul Korea(South).
  9. Chen-Chiung Hsieh and Zong-Yu Wu "Anti-SIFT Images Based CAPTCHA Using Versatile," IEEE, 2013.
  10. Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, “Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems ”in IEEE transactions on information forensics and security, vol. 9, no. 6, june 2014, pp. 891-903.
  11. Anuj Thakur, Nikhil S., Rohit Chaware, SK Hafizul Islam, “The Reading Oriented Overlapping Text based CAPTCHA”ITACT-15 international conference in IEEE,21-22 Dec. 2015, Banglore India,pp.1-6.
  12. Mohamed Torky, Ali Meligy, Hani Ibrahim, “Securing Online Social Networks against Bad bots based on a Necklace CAPTCHA Approach.”, 2016, IEEE 12th ICENCO,Giza Egypt, pp. 158-163.
  13. Gaihuan An, Wanjun Yu, “CAPTCHA Recognition Algorithm Based on the Relative Shape Context and Point Pattern Matching” 2017, 9th International Conference on Measuring Technology and Mechatronics Automation,14-15 Jan 2017,Changshu Hunan China, pp. 168-172.
Index Terms

Computer Science
Information Sciences

Keywords

CAPTCHA Graphical Password Authentication Hard AI Problem Attack.