Affiliations Assistant Professor, Dept.of IT, R.V.R. & J.C. College of Engineering, Chowdavaram, Guntur, Acharya Nagarjuna University
Evaluation of Captcha technologies towards a Graphical password scheme used for User Authentication
Online guessing attacks, relay attacks and shoulder surfing attacks are handled, where Captcha as graphical passwords
(CaRPS) and reCAPTCHA. Wheare CaRPS is click-based graphical passwords where a sequence of clicks on an image is
used to derive a password. Dynamic captcha challenge image is used for each login attempt in CaRPS. Text Captcha and
image-recognition Captcha are used in CaRPS scheme where reCAPTCHA is built for security. Armed with state of the art
technology, it always stays at the forefront of spam and abuse fighting trends. reCAPTCHA is on guard for you, so you can
rest easy. . Text CaRPS scheme constructs the password by clicking the right character sequence on CaRPS images.
reCAPTCHA doesn’t depend solely on text distortions to separate man from machines. Rather it uses advanced risk
analysis techniques, considering the user’s entire engagement with the CAPTCHA, and evaluates a broad range of cues
that distinguish humans from bots provides an unparalleled view into abusive activity on the internet
Venkata Srinivasu Veesam,Bandaru Satish Babu."Evaluation of Captcha Technologies towards Graphical Password Scheme". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 02,pp.98-106, February - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I22.pdf,
 R. Biddle, S. Chiasson, and P. C. van Oorschot, ‚Graphical passwords: Learning from the first twelve years,‛ ACM Comput. Surveys, vol. 44, no. 4, 2012.
 The Science Behind Passfaces [Online].http://www.realuser.com/published/ScienceBe hindPassface s.pdf
 HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks 2010.
 H. Tao and C. Adams, ‚Pass-Go: A proposal to improve the usability of graphical passwords,‛ Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
 D. Weinshall, ‚Cognitive authentication schemes safe against spyware,‛ in Proc. IEEE Symp, 2006.
 P. Dunphy and J. Yan, ‚Do background images improve ‘Draw a Secret’ graphical passwords,‛ in Proc. ACM CCS,2007.
 Napa Sae-Bae and Kowsar Ahmed, ‚Multitouch Gesture-Based Authentication‛, IEEE Transactions On Information Forensics And Security, April 2014.
 S. Chiasson, P. C. van Oorschot, and R. Biddle,‚Graphical password authentication using cued click points,‛ in Proc. ESORICS, 2007, pp. 359–374.
 S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, ‚Influencing users towards better passwords:Persuasive cued click-points,‛ in Proc. Brit. HCI Group Annu. Conf. vol. 1. 2008.
 Sooyeon Shin and Sarang Na, ‚Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected‛, IEEE Transactions On Systems, Man,And Cybernetics: Systems, June 2014.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.