Open Access   Article Go Back

AI Based Security Mechanism Using Captcha as Graphical Password

V.Surekha 1 , S.K.Murugaraja 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 320-321, Sep-2015

Online published on Oct 01, 2015

Copyright © V.Surekha , S.K.Murugaraja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V.Surekha , S.K.Murugaraja, “AI Based Security Mechanism Using Captcha as Graphical Password,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.320-321, 2015.

MLA Style Citation: V.Surekha , S.K.Murugaraja "AI Based Security Mechanism Using Captcha as Graphical Password." International Journal of Computer Sciences and Engineering 3.9 (2015): 320-321.

APA Style Citation: V.Surekha , S.K.Murugaraja, (2015). AI Based Security Mechanism Using Captcha as Graphical Password. International Journal of Computer Sciences and Engineering, 3(9), 320-321.

BibTex Style Citation:
@article{_2015,
author = {V.Surekha , S.K.Murugaraja},
title = {AI Based Security Mechanism Using Captcha as Graphical Password},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {320-321},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=692},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=692
TI - AI Based Security Mechanism Using Captcha as Graphical Password
T2 - International Journal of Computer Sciences and Engineering
AU - V.Surekha , S.K.Murugaraja
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 320-321
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2370 2332 downloads 2305 downloads
  
  
           

Abstract

Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologiDDes, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as Pass Points, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.

Key-Words / Index Term

CaRP,technologiDDes,AI,Captcha,Cryptosystem

References

[1]. R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[2]. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.
[3]. H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
[4]. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 02–127, Jul. 2005.
[5]. K. Golofit, “Click passwords under investigation,” in Proc. ESORICS, 2007, pp. 343– 58.
[6]. A. E. Dirik, N. Memon, and J.-C. Birget, “Modeling user choice in the passpoints Graphical password scheme,” in Proc. Symp. Usable Privacy Security, 2007, pp. 20–28.