Confident Multi-Factor Authentication on web application via Captcha Technologies
Main Article Content
Abstract
Evaluation of Captcha technologies towards prevention of phishing attacks as User Authentication Online
guessing attacks, relay attacks and shoulder surfing attacks are handled, where Captcha as graphical passwords
(CaRPS). CaRPS is click-based graphical passwords it performs a sequence of clicks on an image is used to derive a
password. Confident Multi-Factor Authentication. Consumers now have strong protection from the thousands of fraudulent
attacks that occur daily, without compromising the user experience. Confident Multi-Factor Authentication generates onetime passwords by prompting users to solve an image-based challenge on their mobile phone. Multi-Factor Authentication is
a secure, out-of-band (OOB) authentication process for you and easy-to-use additional security for your users Confident
Multi-Factor Authentication makes it easy to add strong authentication to your web application
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
R. Biddle, S. Chiasson, and P. C. van Oorschot, ‚Graphical passwords: Learning from the first twelve years,‛ ACM Comput. Surveys, vol. 44, no. 4, 2012.
The Science Behind Passfaces [Online].http://www.realuser.com/published/ScienceBe hindPassface s.pdf
HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks 2010.
H. Tao and C. Adams, ‚Pass-Go: A proposal to improve the usability of graphical passwords,‛ Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
D. Weinshall, ‚Cognitive authentication schemes safe against spyware,‛ in Proc. IEEE Symp, 2006.
P. Dunphy and J. Yan, ‚Do background images improve ‘Draw a Secret’ graphical passwords,‛ in Proc. ACM CCS,2007.
Napa Sae-Bae and Kowsar Ahmed, ‚Multitouch Gesture-Based Authentication‛, IEEE Transactions On Information Forensics And Security, April 2014.
S. Chiasson, P. C. van Oorschot, and R. Biddle,‚Graphical password authentication using cued click points,‛ in Proc. ESORICS, 2007, pp. 359–374.
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, ‚Influencing users towards better passwords:Persuasive cued click-points,‛ in Proc. Brit. HCI Group Annu. Conf. vol. 1. 2008.
Sooyeon Shin and Sarang Na, ‚Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected‛, IEEE Transactions On Systems, Man,And Cybernetics: Systems, June 2014.