Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
20
Page No.
7669 - 7678
References
Aadhirai, R., P.J.S. Kumar and S. Vishnupriya, 2012. Image CAPTCHA: Based on human understanding of real world distances. Proceedings of the 2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), December 27-29, 2012, IEEE, Kharagpur, India, ISBN:978-1-4673-4367-1, pp: 1-6.
Adeyiga, J.A., J.O. Ezike, A. Omotosho and W. Amakulor, 2011. A neural network based model for detecting irregularities in e-Banking transactions. Afr. J. Comput. ICT., 4: 7-14.
Direct Link | Aldosari, M.H. and A.A. Al-Daraiseh, 2016. Strong multilingual CAPTCHA based on handwritten characters. Proceedings of the 2016 7th International Conference on Information and Communication Systems (ICICS), April 5-7, 2016, IEEE, Irbid, Jordan, ISBN:978-1-4673-8614-2, pp: 239-245.
Almazyad, A.S., Y. Ahmad and S.A. Kouchay, 2011. Multi-modal CAPTCHA: A user verification scheme. Proceedings of the 2011 IEEE International Conference on Information Science and Applications, April 26-29, 2011, IEEE, Jeju Island, South Korea, ISBN:978-1-4244-9222-0, pp: 1-7.
Azad, S. and K. Jain, 2013. CAPTCHA: Attacks and weaknesses against OCR technology. Global J. Comput. Sci. Technol., 13: 1-5.
Direct Link | Baird, H.S. and J.L. Bentley, 2005. Implicit CAPTCHAs. Proceedings of the SPIE/IS&T Conference on Document Recognition and Retrieval XII, January 16-20, 2005, San Jose, CA., pp: 191-196.
Banday, M.T. and N.A. Shah, 2009. Image flip CAPTCHA. ISC. Intl. J. Inf. Secur., 1: 105-123.
CrossRef | Direct Link | Chandavale, A.A. and A.M. Sapkal, 2010. Algorithm for secured online authentication using CAPTCHA. Proceedingas of the 3rd International Conference on Emerging Trends in Engineering and Technology, November 19-21, 2010, Goa, pp: 292-297.
D'Souza, D., P.C. Polina and R.V. Yampolskiy, 2012. Avatar CAPTCHA: Telling computers and humans apart via face classification. Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, May 6-8, 2012, IEEE, Indianapolis, Indiana, USA., ISBN:978-1-4673-0819-9, pp: 1-6.
Dailey, M. and C. Namprempre, 2004. A text graphics character CAPTCHA for password authentication. Proceedings of the 2004 IEEE International Conference on Region 10 (TENCON 2004), November 24, 2004, IEEE, Chiang Mai, Thailand, pp: 45-48.
Davis, M., R. Divya, V. Paul and P.N. Sankaranarayanan, 2015. CAPCHA as graphical password. Intl. J. Comput. Sci. Inf. Technol., 6: 148-151.
Direct Link | Deepika, G.J. and D.S. Babu, 2015. A novel approach for captcha as graphical password using a new safety primitive based on hard AI problems. Intl. J. Comput. Sci. Mob. Comput., 4: 277-282.
Direct Link | Desai, A. and P. Patadia, 2009. Drag and drop: A better approach to CAPTCHA. Proceedings of the 2009 Annual IEEE India Conference, December 18-20, 2009, IEEE, Gujarat, India, pp: 1-4.
Ferrara, E., O. Varol, C. Davis, F. Menczer and A. Flammini, 2016. The rise of social bots. Commun. ACM., 59: 96-104.
CrossRef | Direct Link | Fischer, I. and T. Herfet, 2006. Visual CAPTCHAs for document authentication. Proceedings of the 2006 IEEE Workshop on Multimedia Signal Processing, October 3-6, 2006, IEEE, Victoria, Canada, ISBN:0-7803-9751-7, pp: 471-474.
Gao, H., D. Yao, H. Liu, X. Liu and L. Wang, 2010. A novel image based CAPTCHA using jigsaw puzzle. Proceedings of the 2010 13th IEEE International Conference on Computational Science and Engineering, December 11-13, 2010, IEEE, Hong Kong, China, ISBN:978-1-4244-9591-7, pp: 351-356.
Goswami, G., B.M. Powell, M. Vatsa, R. Singh and A. Noore, 2014. FaceDCAPTCHA: Face detection based color image CAPTCHA. Future Gen. Comput. Syst., 31: 59-68.
CrossRef | Direct Link | Hernandez-Castro, C.J., M.D. R-Moreno, D.F. Barrero and S. Gibson, 2017. Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysis. Comput. Secur., 70: 744-756.
Direct Link | ITU., 2016. ICT facts and figures 2016. International Telecommunication Union, Geneva, Switzerland.
James, D. and M. Philip, 2012. A novel anti phishing framework based on visual cryptography. Proceedings of the 2012 International Conference on Power, Signals, Controls and Computation, January 3-6, 2012, IEEE, Thrissur, India, ISBN:978-1-4673-0446-7, pp: 1-5.
Kumar, K.S. and T. Sasikala, 2014. A technique for web security using mutual authentication and clicking-cropping based image captcha technology. Intl. Rev. Comput. Software, 9: 110-118.
Direct Link | Kumar, S.P. and R. Ramachandaran, 2017. Multi-digit random number CAPTCHA generation system for enhancing web security. J. Comput. Theor. Nanosci., 14: 1506-1512.
CrossRef | Direct Link | Kumesh, T. and A.S. Rani, 2015. Captcha as graphical password using carp technique. Intl. J. Comput. Tech., 2: 60-65.
Direct Link | Madar, B., G.K. Kumar and C. Ramakrishna, 2017. Captcha breaking using segmentation and morphological operations. Intl. J. Comput. Appl., 166: 34-38.
CrossRef | Direct Link | Marechal, N., 2016. Automation, algorithms and politics when bots tweet: Toward a normative framework for bots on social networking sites (Feature). Intl. J. Commun., 10: 5022-5031.
Direct Link | Nanglae, N. and P. Bhattarakosol, 2015. Attitudes towards text-based CAPTCHA from developing countries. Proceedings of the 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), June 24-27, 2015, IEEE, Hua Hin, Thailand, pp: 1-4.
Nejati, H., N.M. Cheung, R. Sosa and D.C.I. Koh, 2014. DeepCAPTCHA: An image CAPTCHA based on depth perception. Proceedings of the 5th ACM International Conference on Multimedia Systems (MMSys'14), March 19, 2014, ACM, Singapore, ISBN:978-1-4503-2705-3, pp: 81-90.
Omotosho, A., E. Asani, P. Fiddi and N. Akande, 2019. Image and password multifactor authentication scheme for e-Voting. J. Eng. Appl. Sci., 14: 3732-3740.
Direct Link | Omotosho, A., J. Emuoyibofarhe and A. Oke, 2017. Securing private keys in electronic health records using session-based hierarchical key encryption. J. Appl. Secur. Res., 12: 463-477.
CrossRef | Direct Link | Omotosho, A., J. Emuoyibofarhe and C. Meinel, 2017. Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography. Intl. J. Electron. Healthcare, 9: 227-254.
CrossRef | Direct Link | Omotosho, A., O. Adegbola, B. Adelakin, A. Adelakun and J. Emuoyibofarhe, 2015. Exploiting multimodal biometrics in E-privacy scheme for electronic health records. J. Bio. Agric. Healthcare., 4: 22-33.
Direct Link | PWC., 2017. Toward new possibilities in threat management: How businesses are embracing a modern approach to threat management and information sharing. PricewaterhouseCoopers, London, UK. https://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/assets/gsiss-report-cybersecurity-privacy-possibilities.pdf
Saini, B.S. and A. Bala, 2013. A review of bot protection using CAPTCHA for web security. IOSR. J. Comput. Eng., 8: 36-42.
CrossRef | Direct Link | Saranya, R., S. Usha, S. Vigneswari and M. Vidhyaa, 2016. Image and audio based authentication using CAPTCHA as graphical password. Intl. J. Adv. Res. Trends Eng. Technol., 3: 12-14.
Direct Link | Sauer, G., H. Hochheiser, J. Feng and J. Lazar, 2008. Towards a universally usable CAPTCHA. Proceedings of the 4th International Symposium on Usable Privacy and Security (SOUPS) Vol. 6, July 6-8, 2008, Pittsburgh, Pennsylvania, USA., pp: 1-4.
Singh, B. and K.S. Jasmine, 2017. Security Management in Mobile Cloud Computing: Security and Privacy Issues and Solutions in Mobile Cloud Computing. In: Security Management in Mobile Cloud Computing, Kashif, M. (Ed.). IGI Global, Pennsylvania, USA., ISBN:9781522506034, pp: 148-168.
Singh, V.P. and P. Pal, 2014. Survey of different types of CAPTCHA. Intl. J. Comput. Sci. Inf. Technol., 5: 2242-2245.
Direct Link | Stieglitz, S., F. Brachten, D. Berthele, M. Schlaus and C. Venetopoulou
et al., 2017. Do social bots (still) act different to humans?-Comparing metrics of social bots with those of humans. Proceedings of the International Conference on Social Computing and Social Media, July 9-14, 2017, Springer, Cham, Switzerland, pp: 379-395.
Tak, G.K., N. Badge, P. Manwatkar, A. Ranganathan and S. Tapaswi, 2010. Asynchronous anti phishing image captcha approach towards phishing. Proceedings of the 2010 2nd International Conference on Future Computer and Communication Vol. 3, May 21-24, 2010, IEEE, Wuhan, China, pp: V3-694-V3-698.
Thrivikram, P., K. Narayana and P. Sunitha, 2015. A new authentication scheme for security using captcha password. Intl. J. Eng. Sci. Res. Technol., 4: 144-155.
Traore, I., A. Awad and I. Woungang, 2017. Information Security Practices: Emerging Threats and Perspectives. Springer, Berlin, Germany, ISBN:9783319489476, Pages: 104.
Von Ahn, L., B. Maurer, C. McMillen, D. Abraham and M. Blum, 2008. reCAPTCHA: Human-based character recognition via web security measures. Sci., 321: 1465-1468.
CrossRef | PubMed | Direct Link | Yang, S., J. Wang, J. Zhang and H. Li, 2016. Cyber threat detection and application analysis. Proceedings of the 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), October 13-15, 2016, IEEE, Chengdu, China, pp: 46-49.
Ye, Q.B., T.E. Wei, A.B. Jeng, H.M. Lee and K.P. Wu, 2013. DDIM-CAPTCHA: A novel drag-n-drop interactive masking CAPTCHA against the third party human attacks. Proceedings of the 2013 International Conference on Technologies and Applications of Artificial Intelligence, December 6-8, 2013, IEEE, Taipei, Taiwan, pp: 158-163.
Zhu, B.B., J. Yan, G. Bao, M. Yang and N. Xu, 2014. Captcha as graphical passwords-A new security primitive based on hard AI problems. IEEE. Trans. Inf. Forensics Secur., 9: 891-904.
CrossRef | Direct Link |