Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Enhancing CAPTCHA based Image Authentication for E-mail ID and Password

Pursuing M.Tech, CSE Branch,Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
NRI Institute of Technology, Guntur, Andhra Pradesh, India

-In this paper we survey the current Captcha password schemes furthermore exhibit the significance of Email authentication over cutting edge Captcha Advancements where Captcha and Its graphical password it can addresses various security issues out and out. CAPTCHA is accomplished by revision of letters in order arbitrarily on the catches and it is anything but difficult to baffle by straightforward key loggers .In data security, client authentication is a noteworthy issue in each framework. What's more, for authentication reason each framework relies on upon password whether it is literary password or graphical password. CAPTCHA is a test work by computer programs which human can pass however computer programs can't pass .The thought process of incorporating so as to enhance Email authentication is finished visual authentication instruments. This is ensured to the regular assaults endured by other authentication schemes.

MACHARLA BHANU KUMAR,K.KRANTHI KUMAR."Enhancing CAPTCHA based Image Authentication for E-mail ID and Password". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.1251-1256, December - 2015, URL :,

Keywords : Graphical Password, CaRP, CAPTCHA, Authentication, Security, E-mail, Hacker Attack, Keyloggers

[1] Shraddha S.Banne, Prof. K.N.Shedge,”A Review
Graphical password Based Authentication
Scheme”,International Journal of Science &
Research(IJSR), Volume 3 Issue 10, October 2014.
[2] Shraddha S.Banne, Prof. K.N.Shedge,” A Novel
Graphical Password Based Authentication Method
Using CAPTCHA”, International Journal of
Informative & Futuristic Research (IJIFR), Volume 2
Issue 11 July 2015
[3] Bin B. Zhu, Je Yan, Guanbo Bao, Maowei Yang,
and Ning Xu,``Captcha as a Graphical Passwords A
New Security Primitive Based on Hard AI
Problems",IEEE Trans, Vol. 9, No. 6, pp 891- 904,
June 2014.
[4] S. Chiasson, A. Forget, R. Biddle, and P. C. van
Oorschot, ``Inuencing users towards better
passwords: Persuasive cued clickpoints", in Proc.
HCI, British Computer Society, Liverpool, U.K., pp
121-130, 2008. [5] S. Chiasson, A. Forget, R. Biddle,
and P. C. van Oorschot, ``User interface design
affects security: Patterns in click-based graphical
passwords", Int. J. Inf. Security, vol. 8, no. 6, pp. 387-
398, 2009.
[6] G. Blonder, Graphical Passwords, U.S. Patent
5559961, 1996.
[7] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen,
“Graphical Passwords: A Survey”, Department of
Computer Science Georgia State University.
[8] A. Dirik, N. Memon, and J.-C. Birget, “Modeling
User choice in the Pass-Points graphical password
scheme", in 3rd Symp. Usable Privacy and
Security(SOUPS), Pittsburgh, PA, pp. 20-28, 2007.
[9] Chippy. T and R. Nagendran, Defences Against
Large Scale Online Password Guessing Attacks By
Using Persuasive Click Points, International Journal
of Communications and Engineering, Volume 03
No.3, Issue: 01 March2012 .
[10] D. Davis, F. Monrose, and M. K. Reiter, “On
user choice in graphical pass-word schemes", in
Proc. 13th USENIX Security Symp., San Diego, CA,
pp. 151-164, 2004.
[11] Robert Biddle, Sonia Chiasson and P.C.van
Oorschot. Graphical Passwords: Learning from the
First Twelve Year. School of Computer Science,
Carleton University, Jan 4, 2012.
[12] Liming Wang, Xiuling Chang, Zhongjie Ren,
Haichang Gao, Xiyang Liu, Uwe Aickelin, “Against
Spyware Using CAPTCHA in Graphical Password
[13] Luis von Ahn, Manuel Blum, Nicholas J.
Hopper, and John Langford, “CAPTCHA: Using
Hard AI Problems For Security”
[14] S. Wiedenbeck, J. Waters, J.C. Birget, A.
Brodskiy, N. Memon, ``PassPoints: Design and
longitudinal evaluation of a graphical password
system'', International J. of Human-Computer
Studies (Special Issue on HCI Research in Privacy
and Security), 63 (2005) 102-127.
[15] Xiaoyuan, S., Z. Ying, et al. (2005). “Graphical
passwords: a survey”, Computer Security
Applications Conference, 21st Annual.
[16] H. Gao, X. Liu, S.Wang, and R. Dai, “A new
graphical password scheme against spyware by
using CAPTCHA,” in Proc. Symp. Usable Privacy
Security, 2009, pp. 760–767.
[17] M. Alsaleh, M. Mannan, and P. C. van Oorschot,
“Revisiting defenses against large-scale online
password guessing attacks,” IEEE Trans.
Dependable Secure Comput., vol. 9, no. 1, pp. 128–
141, Jan./Feb. 2012.


Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal