We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor

by Varun Ambrose Thomas, Karanvir Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 22
Year of Publication: 2013
Authors: Varun Ambrose Thomas, Karanvir Kaur
10.5120/11526-7253

Varun Ambrose Thomas, Karanvir Kaur . Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor. International Journal of Computer Applications. 67, 22 ( April 2013), 13-17. DOI=10.5120/11526-7253

@article{ 10.5120/11526-7253,
author = { Varun Ambrose Thomas, Karanvir Kaur },
title = { Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 22 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number22/11526-7253/ },
doi = { 10.5120/11526-7253 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:08.624465+05:30
%A Varun Ambrose Thomas
%A Karanvir Kaur
%T Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 22
%P 13-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing and prevalent usage of Internet, threat for the service providers has arisen. One of the most important aspects of modern security concerns is to deal with users that are computer programs or bots. These programs pretend to be human users and exploit servers by submitting data automatically, thereby, hindering the services of the server. Security mechanism dealing with such attacks is called Completely Automated Turing test to tell Computers and Humans Apart (CAPTCHA). This paper discusses and analyzes broad CAPTCHA mechanisms and recent researches that have either reformed or flunked, previous techniques and methods. Also, a technique is proposed that counteracts the shortcomings or inabilities of such techniques.

References
  1. Ahn, Luis von, Blum, Manuel, Hopper, Nicholas J. , Langford, John 2003. CAPTCHA: Using Hard AI Problems for Security. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, pp 294-311
  2. Chew, Monica, Tygar, J. D. 2004. Image Recognition CAPTCHAs. In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, pp. 268-279
  3. Chow, Richard, Golle, Philippe, Jakobsson, Markus, Wang, Lusha, Wang, Xiaofeng 2008. Making CAPTCHAs Clickable. In proceedings of the 9th workshop on Mobile computing systems and applications, CA, USA , pp 91-94
  4. Yan, Jeff, Ahmad, Ahmad Salah El 2008. Usability of CAPTCHAs Or usability issues in CAPTCHA design. In Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA
  5. Bursztein, Elie, Martin, Matthieu, Mitchell, John C. 2011. Text-based CAPTCHA strengths and weaknesses. In ACM Computer and Communication Security
  6. Raj, Aditya, Jain, Ashish, Pahwa, Tushar, Jain, Abhimanyu 2010. Picture CAPTCHAs with Sequencing:
  7. Their Types and Analysis. In International Journal of Digital Society (IJDS), Volume 1, Issue 3
  8. Bursztein, Elie, Bethard, Steven, Fabry, Celine, Mitchell, John C. , Jurafsky, Dan 2010. How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In IEEE Symposium on Security and Privacy
  9. Fritsch, Christoph, Netter, Michael, Reisser, Andreas, Pernul, Günther 2010. Attacking Image Recognition Captchas – A Naïve but E?ective Approach. In 7th International Conference, TrustBus, Bilbao, Spain, pp 13-25
  10. Turbobit – A File Sharing Service "http://turbobit. net/captcha/securimg_1"
  11. Desai, Arpan, Patadia, Pragnesh 2009. Drag and Drop: A Better Approach to CAPTCHA. In Annual IEEE India Conference (INDICON) , Gujarat, India, pp 1-4
  12. Amrinder, Arora 2007. Statistics Hacking – Exploiting Vulnerabilities in News Websites. In International Journal of Computer Science and Network Security Vol. 7 No. 3
  13. Bursztein Elie, Beauxis Romain, Paaskov Hristo, Perito Daniele, Fabry Celine and Mitchell John, 2011. The Failure of Noise-Based Non-Continuous Audio CAPTCHAs. In IEEE Symposium on Security and Privacy, Berkeley, California pp 19 – 31
Index Terms

Computer Science
Information Sciences

Keywords

CAPTCHA Cursor – Match Image CAPTCHA