Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 20
Page No. 7669 - 7678

Implicit Drag and Drop Image CAPTCHA for Web Security

Authors : Adebayo Omotosho, Ukeme Asanga, Emmanuel O. Asani, Joyce Ayoola and Paula Fiddi

References

Aadhirai, R., P.J.S. Kumar and S. Vishnupriya, 2012. Image CAPTCHA: Based on human understanding of real world distances. Proceedings of the 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), December 27-29, 2012, IEEE, Kharagpur, India, ISBN:978-1-4673-4367-1, pp: 1-6.

Adeyiga, J.A., J.O. Ezike, A. Omotosho and W. Amakulor, 2011. A neural network based model for detecting irregularities in e-Banking transactions. Afr. J. Comput. ICT., 4: 7-14.
Direct Link  |  

Aldosari, M.H. and A.A. Al-Daraiseh, 2016. Strong multilingual CAPTCHA based on handwritten characters. Proceedings of the 2016 7th International Conference on Information and Communication Systems (ICICS), April 5-7, 2016, IEEE, Irbid, Jordan, ISBN:978-1-4673-8614-2, pp: 239-245.

Almazyad, A.S., Y. Ahmad and S.A. Kouchay, 2011. Multi-modal CAPTCHA: A user verification scheme. Proceedings of the 2011 IEEE International Conference on Information Science and Applications, April 26-29, 2011, IEEE, Jeju Island, South Korea, ISBN:978-1-4244-9222-0, pp: 1-7.

Azad, S. and K. Jain, 2013. CAPTCHA: Attacks and weaknesses against OCR technology. Global J. Comput. Sci. Technol., 13: 1-5.
Direct Link  |  

Baird, H.S. and J.L. Bentley, 2005. Implicit CAPTCHAs. Proceedings of the SPIE/IS&T Conference on Document Recognition and Retrieval XII, January 16-20, 2005, San Jose, CA., pp: 191-196.

Banday, M.T. and N.A. Shah, 2009. Image flip CAPTCHA. ISC. Intl. J. Inf. Secur., 1: 105-123.
CrossRef  |  Direct Link  |  

Chandavale, A.A. and A.M. Sapkal, 2010. Algorithm for secured online authentication using CAPTCHA. Proceedingas of the 3rd International Conference on Emerging Trends in Engineering and Technology, November 19-21, 2010, Goa, pp: 292-297.

D'Souza, D., P.C. Polina and R.V. Yampolskiy, 2012. Avatar CAPTCHA: Telling computers and humans apart via face classification. Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, May 6-8, 2012, IEEE, Indianapolis, Indiana, USA., ISBN:978-1-4673-0819-9, pp: 1-6.

Dailey, M. and C. Namprempre, 2004. A text graphics character CAPTCHA for password authentication. Proceedings of the 2004 IEEE International Conference on Region 10 (TENCON 2004), November 24, 2004, IEEE, Chiang Mai, Thailand, pp: 45-48.

Davis, M., R. Divya, V. Paul and P.N. Sankaranarayanan, 2015. CAPCHA as graphical password. Intl. J. Comput. Sci. Inf. Technol., 6: 148-151.
Direct Link  |  

Deepika, G.J. and D.S. Babu, 2015. A novel approach for captcha as graphical password using a new safety primitive based on hard AI problems. Intl. J. Comput. Sci. Mob. Comput., 4: 277-282.
Direct Link  |  

Desai, A. and P. Patadia, 2009. Drag and drop: A better approach to CAPTCHA. Proceedings of the 2009 Annual IEEE India Conference, December 18-20, 2009, IEEE, Gujarat, India, pp: 1-4.

Ferrara, E., O. Varol, C. Davis, F. Menczer and A. Flammini, 2016. The rise of social bots. Commun. ACM., 59: 96-104.
CrossRef  |  Direct Link  |  

Fischer, I. and T. Herfet, 2006. Visual CAPTCHAs for document authentication. Proceedings of the 2006 IEEE Workshop on Multimedia Signal Processing, October 3-6, 2006, IEEE, Victoria, Canada, ISBN:0-7803-9751-7, pp: 471-474.

Gao, H., D. Yao, H. Liu, X. Liu and L. Wang, 2010. A novel image based CAPTCHA using jigsaw puzzle. Proceedings of the 2010 13th IEEE International Conference on Computational Science and Engineering, December 11-13, 2010, IEEE, Hong Kong, China, ISBN:978-1-4244-9591-7, pp: 351-356.

Goswami, G., B.M. Powell, M. Vatsa, R. Singh and A. Noore, 2014. FaceDCAPTCHA: Face detection based color image CAPTCHA. Future Gen. Comput. Syst., 31: 59-68.
CrossRef  |  Direct Link  |  

Hernandez-Castro, C.J., M.D. R-Moreno, D.F. Barrero and S. Gibson, 2017. Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysis. Comput. Secur., 70: 744-756.
Direct Link  |  

ITU., 2016. ICT facts and figures 2016. International Telecommunication Union, Geneva, Switzerland.

James, D. and M. Philip, 2012. A novel anti phishing framework based on visual cryptography. Proceedings of the 2012 International Conference on Power, Signals, Controls and Computation, January 3-6, 2012, IEEE, Thrissur, India, ISBN:978-1-4673-0446-7, pp: 1-5.

Kumar, K.S. and T. Sasikala, 2014. A technique for web security using mutual authentication and clicking-cropping based image captcha technology. Intl. Rev. Comput. Software, 9: 110-118.
Direct Link  |  

Kumar, S.P. and R. Ramachandaran, 2017. Multi-digit random number CAPTCHA generation system for enhancing web security. J. Comput. Theor. Nanosci., 14: 1506-1512.
CrossRef  |  Direct Link  |  

Kumesh, T. and A.S. Rani, 2015. Captcha as graphical password using carp technique. Intl. J. Comput. Tech., 2: 60-65.
Direct Link  |  

Madar, B., G.K. Kumar and C. Ramakrishna, 2017. Captcha breaking using segmentation and morphological operations. Intl. J. Comput. Appl., 166: 34-38.
CrossRef  |  Direct Link  |  

Marechal, N., 2016. Automation, algorithms and politics when bots tweet: Toward a normative framework for bots on social networking sites (Feature). Intl. J. Commun., 10: 5022-5031.
Direct Link  |  

Nanglae, N. and P. Bhattarakosol, 2015. Attitudes towards text-based CAPTCHA from developing countries. Proceedings of the 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), June 24-27, 2015, IEEE, Hua Hin, Thailand, pp: 1-4.

Nejati, H., N.M. Cheung, R. Sosa and D.C.I. Koh, 2014. DeepCAPTCHA: An image CAPTCHA based on depth perception. Proceedings of the 5th ACM International Conference on Multimedia Systems (MMSys'14), March 19, 2014, ACM, Singapore, ISBN:978-1-4503-2705-3, pp: 81-90.

Omotosho, A., E. Asani, P. Fiddi and N. Akande, 2019. Image and password multifactor authentication scheme for e-Voting. J. Eng. Appl. Sci., 14: 3732-3740.
Direct Link  |  

Omotosho, A., J. Emuoyibofarhe and A. Oke, 2017. Securing private keys in electronic health records using session-based hierarchical key encryption. J. Appl. Secur. Res., 12: 463-477.
CrossRef  |  Direct Link  |  

Omotosho, A., J. Emuoyibofarhe and C. Meinel, 2017. Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography. Intl. J. Electron. Healthcare, 9: 227-254.
CrossRef  |  Direct Link  |  

Omotosho, A., O. Adegbola, B. Adelakin, A. Adelakun and J. Emuoyibofarhe, 2015. Exploiting multimodal biometrics in E-privacy scheme for electronic health records. J. Bio. Agric. Healthcare., 4: 22-33.
Direct Link  |  

PWC., 2017. Toward new possibilities in threat management: How businesses are embracing a modern approach to threat management and information sharing. PricewaterhouseCoopers, London, UK. https://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/assets/gsiss-report-cybersecurity-privacy-possibilities.pdf

Saini, B.S. and A. Bala, 2013. A review of bot protection using CAPTCHA for web security. IOSR. J. Comput. Eng., 8: 36-42.
CrossRef  |  Direct Link  |  

Saranya, R., S. Usha, S. Vigneswari and M. Vidhyaa, 2016. Image and audio based authentication using CAPTCHA as graphical password. Intl. J. Adv. Res. Trends Eng. Technol., 3: 12-14.
Direct Link  |  

Sauer, G., H. Hochheiser, J. Feng and J. Lazar, 2008. Towards a universally usable CAPTCHA. Proceedings of the 4th International Symposium on Usable Privacy and Security (SOUPS) Vol. 6, July 6-8, 2008, Pittsburgh, Pennsylvania, USA., pp: 1-4.

Singh, B. and K.S. Jasmine, 2017. Security Management in Mobile Cloud Computing: Security and Privacy Issues and Solutions in Mobile Cloud Computing. In: Security Management in Mobile Cloud Computing, Kashif, M. (Ed.). IGI Global, Pennsylvania, USA., ISBN:9781522506034, pp: 148-168.

Singh, V.P. and P. Pal, 2014. Survey of different types of CAPTCHA. Intl. J. Comput. Sci. Inf. Technol., 5: 2242-2245.
Direct Link  |  

Stieglitz, S., F. Brachten, D. Berthele, M. Schlaus and C. Venetopoulou et al., 2017. Do social bots (still) act different to humans?-Comparing metrics of social bots with those of humans. Proceedings of the International Conference on Social Computing and Social Media, July 9-14, 2017, Springer, Cham, Switzerland, pp: 379-395.

Tak, G.K., N. Badge, P. Manwatkar, A. Ranganathan and S. Tapaswi, 2010. Asynchronous anti phishing image captcha approach towards phishing. Proceedings of the 2010 2nd International Conference on Future Computer and Communication Vol. 3, May 21-24, 2010, IEEE, Wuhan, China, pp: V3-694-V3-698.

Thrivikram, P., K. Narayana and P. Sunitha, 2015. A new authentication scheme for security using captcha password. Intl. J. Eng. Sci. Res. Technol., 4: 144-155.

Traore, I., A. Awad and I. Woungang, 2017. Information Security Practices: Emerging Threats and Perspectives. Springer, Berlin, Germany, ISBN:9783319489476, Pages: 104.

Von Ahn, L., B. Maurer, C. McMillen, D. Abraham and M. Blum, 2008. reCAPTCHA: Human-based character recognition via web security measures. Sci., 321: 1465-1468.
CrossRef  |  PubMed  |  Direct Link  |  

Yang, S., J. Wang, J. Zhang and H. Li, 2016. Cyber threat detection and application analysis. Proceedings of the 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), October 13-15, 2016, IEEE, Chengdu, China, pp: 46-49.

Ye, Q.B., T.E. Wei, A.B. Jeng, H.M. Lee and K.P. Wu, 2013. DDIM-CAPTCHA: A novel drag-n-drop interactive masking CAPTCHA against the third party human attacks. Proceedings of the 2013 International Conference on Technologies and Applications of Artificial Intelligence, December 6-8, 2013, IEEE, Taipei, Taiwan, pp: 158-163.

Zhu, B.B., J. Yan, G. Bao, M. Yang and N. Xu, 2014. Captcha as graphical passwords-A new security primitive based on hard AI problems. IEEE. Trans. Inf. Forensics Secur., 9: 891-904.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved