Affiliations Assistant Professor, Dept.of IT, R.V.R. & J.C. College of Engineering, Chowdavaram, Guntur, Acharya Nagarjuna University
Evaluation of Captcha technologies towards a Graphical password scheme used for User Authentication
Online guessing attacks, relay attacks and shoulder surfing attacks are handled, where Captcha as graphical passwords
(CaRPS) and reCAPTCHA. Wheare CaRPS is click-based graphical passwords where a sequence of clicks on an image is
used to derive a password. Dynamic captcha challenge image is used for each login attempt in CaRPS. Text Captcha and
image-recognition Captcha are used in CaRPS scheme where reCAPTCHA is built for security. Armed with state of the art
technology, it always stays at the forefront of spam and abuse fighting trends. reCAPTCHA is on guard for you, so you can
rest easy. . Text CaRPS scheme constructs the password by clicking the right character sequence on CaRPS images.
reCAPTCHA doesnâ€™t depend solely on text distortions to separate man from machines. Rather it uses advanced risk
analysis techniques, considering the userâ€™s entire engagement with the CAPTCHA, and evaluates a broad range of cues
that distinguish humans from bots provides an unparalleled view into abusive activity on the internet
Venkata Srinivasu Veesam,Bandaru Satish Babu."Evaluation of Captcha Technologies towards Graphical Password Scheme". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 02,pp.98-106, February - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I22.pdf,
 R. Biddle, S. Chiasson, and P. C. van Oorschot, â€šGraphical passwords: Learning from the first twelve years,â€› ACM Comput. Surveys, vol. 44, no. 4, 2012.
 The Science Behind Passfaces [Online].http://www.realuser.com/published/ScienceBe hindPassface s.pdf
 HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks 2010.
 H. Tao and C. Adams, â€šPass-Go: A proposal to improve the usability of graphical passwords,â€› Int. J. Netw. Security, vol. 7, no. 2, pp. 273â€“292, 2008.
 D. Weinshall, â€šCognitive authentication schemes safe against spyware,â€› in Proc. IEEE Symp, 2006.
 P. Dunphy and J. Yan, â€šDo background images improve â€˜Draw a Secretâ€™ graphical passwords,â€› in Proc. ACM CCS,2007.
 Napa Sae-Bae and Kowsar Ahmed, â€šMultitouch Gesture-Based Authenticationâ€›, IEEE Transactions On Information Forensics And Security, April 2014.
 S. Chiasson, P. C. van Oorschot, and R. Biddle,â€šGraphical password authentication using cued click points,â€› in Proc. ESORICS, 2007, pp. 359â€“374.
 S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, â€šInfluencing users towards better passwords:Persuasive cued click-points,â€› in Proc. Brit. HCI Group Annu. Conf. vol. 1. 2008.
 Sooyeon Shin and Sarang Na, â€šCovert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expectedâ€›, IEEE Transactions On Systems, Man,And Cybernetics: Systems, June 2014.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.