A Comprehensive Survey on CAPTCHA and VRP
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper | Information Technology | India | Volume 4 Issue 11, November 2015

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

A Lot of security primitives are based on hard challenges that are solvable only by mathematical formulations. Use of Difficult AI problems for security has become an evolution for a new paradigm of security, but still left underexplored. In this paper, we will noticeably present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on the basis of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is a complex combination of Captcha and a graphical password style. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. CaRP alone becomes inefficient to prevent all security, hence this paper makes a survey of the various security measures for secure password schemes and gives a clear picture of the efficiencies of the different techniques. There is no panacea, but highly secure password offers reasonable security and usability and appears suit well with practical applications for improving online security.

Keywords: CaRP, OTP, Graphical Password, Captcha, Security, Password Attacks

Edition: Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

Share this Article

How to Cite this Article?

Vijayalaxmi Daundkar, Prashant Kumbharkar, "A Comprehensive Survey on CAPTCHA and VRP", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151598, Volume 4 Issue 11, November 2015, 2128 - 2131

135 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'CaRP'

Views: 120 , Downloads: 105 | CTR: 88 % | Weekly Popularity: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1906 - 1909

A Novel Technique for Fake News Detection using Machine Learning Algorithms and Web Scrapping

K S Veda, Sudarshana K, Moulya M, Amulya, Chandana N S

Share this Article

Views: 135 , Downloads: 107 | CTR: 79 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 6 Issue 5, May 2017

Pages: 2006 - 2008

Smart City Carpooling Mobile Application Based on Intelligent Route

Prof. S. U. Kadam, Mahesh W. Nimje, Sheetal Kode, Vaibhav Talegaonkar, Anand Sangle

Share this Article

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Views: 147 , Downloads: 127 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 88 - 93

A Three Level Graphical Password Scheme for Providing High Degree of Security

Pranita H. Mokal, R. N. Denikar

Share this Article

Similar Articles with Keyword 'OTP'

Views: 141 , Downloads: 105 | CTR: 74 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Views: 146 , Downloads: 112 | CTR: 77 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1210 - 1213

Big Data ? Road to Smart Cities

R. S. Balaji

Share this Article

Views: 121 , Downloads: 113 | CTR: 93 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article

Views: 178 , Downloads: 125 | CTR: 70 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, Malaysia, Volume 2 Issue 11, November 2013

Pages: 264 - 269

The Effectiveness of Administration and Co-curriculum in Sport to the Involvement of Students in Vocational College in Malaysia

Melati Binti Yaacob, Hairul Nurasyikin Binti Haron

Share this Article

Similar Articles with Keyword 'Graphical Password'

Views: 121 , Downloads: 103 | CTR: 85 % | Weekly Popularity: ⮙5

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Views: 137 , Downloads: 107 | CTR: 78 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Views: 121 , Downloads: 113 | CTR: 93 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this Article

Views: 142 , Downloads: 119 | CTR: 84 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 2 Issue 10, October 2013

Pages: 242 - 246

A Robust Graphical-Based Authentication for Knowledge Level Using Persuasive Cued Click Points

S. Subadra, S. Ushanandhini

Share this Article

Similar Articles with Keyword 'Captcha'

Views: 137 , Downloads: 107 | CTR: 78 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Views: 120 , Downloads: 107 | CTR: 89 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 6 Issue 5, May 2017

Pages: 1507 - 1508

Hypothesis on Approach which Distinguishes Soul from Automaton

Vinay J Uttekar, Ranjit P Lawale

Share this Article

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Views: 147 , Downloads: 127 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 88 - 93

A Three Level Graphical Password Scheme for Providing High Degree of Security

Pranita H. Mokal, R. N. Denikar

Share this Article

Similar Articles with Keyword 'Security'

Views: 117 , Downloads: 82 | CTR: 70 % | Weekly Popularity: ⮙6

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Views: 143 , Downloads: 101 | CTR: 71 % | Weekly Popularity: ⮙6

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Views: 151 , Downloads: 101 | CTR: 67 %

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Similar Articles with Keyword 'Password Attacks'

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 2128 - 2131

A Comprehensive Survey on CAPTCHA and VRP

Vijayalaxmi Daundkar, Prashant Kumbharkar

Share this Article

Views: 147 , Downloads: 127 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 1, January 2016

Pages: 88 - 93

A Three Level Graphical Password Scheme for Providing High Degree of Security

Pranita H. Mokal, R. N. Denikar

Share this Article
Top