Merging CAPTCHA and Graphical Password on NP Hard Problems in AI: New Security Enhancing Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Merging CAPTCHA and Graphical Password on NP Hard Problems in AI: New Security Enhancing Technique

Nayan Gawande

CAPTCHA (Completely Automated Public Turing Test to tell computers and human apart) is a test build by computer programs which human can pass but computer programs cannot pass. A new technology is built over the captcha called graphical captcha which is resilient to dictionary attacks and hence more secure. With the hybrid use of CAPTCHA and graphical password one can addresses a number of security problems such as relay attacks, online guessing attacks and also shoulder surfing attacks. CaRP (Captcha as a graphical password) is not act as a cure all technique but it stipulates security and usability to legitimate users in real time applications.

Keywords: CAPTCHA, graphical password, CaRP, dictionary attacks, security, legitimate user

Edition: Volume 3 Issue 12, December 2014

Pages: 980 - 983

Share this Article

How to Cite this Article?

Nayan Gawande, "Merging CAPTCHA and Graphical Password on NP Hard Problems in AI: New Security Enhancing Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=5121402, Volume 3 Issue 12, December 2014, 980 - 983

111 PDF Views | 100 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'CAPTCHA'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3271 - 3274

A Review of Captcha and Graphical Passwords to Enhance Security and Usability to Next Level

Vikas K. Kolekar, Milindkumar. B. Vaidya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Similar Articles with Keyword 'graphical password'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2137 - 2139

A Review of the Graphical Password Based Authentication Schemes

Shraddha S. Banne, Prof. Kishor N. Shedge

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2302 - 2305

Authentication Using Text and Graphical Password

Mayur H Patel, Nimit S Modi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3271 - 3274

A Review of Captcha and Graphical Passwords to Enhance Security and Usability to Next Level

Vikas K. Kolekar, Milindkumar. B. Vaidya

Share this Article

Similar Articles with Keyword 'CaRP'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2442 - 2447

A Smart Real Time Ridesharing and Travel Assistance

Aarthi R

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1270 - 1274

Experimental study of CAPTCHA: A Security Primitive

Pawar Sonali, Kalyankar Pravin

Share this Article

Similar Articles with Keyword 'dictionary attacks'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 893 - 898

Design New Security Protocol against Online Password Guessing Attacks

Nitin. R. Shinde, S. K. Sonkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1156 - 1158

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

Ravi Kumar Yalagandala, Dr. N. Chandra Sekhar Reddy

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 5, May 2019

Pages: 1815 - 1820

Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints

Anusha Medavaka

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 476 - 479

Incorporated Approach for Multiserver Inaccessible User Authentication

Madhuri R. Shirkande

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'legitimate user'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1156 - 1158

Revisiting Defenses against Large-Scale Online Password Guessing Attacks

Ravi Kumar Yalagandala, Dr. N. Chandra Sekhar Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 386 - 391

Efficient Framework to Mitigate DDoS Attacks and Response System

Saravanan S, P.Siva kumar

Share this Article
Top