SlideShare uma empresa Scribd logo
1 de 22
CAPTCHA AS GRAPHICAL PASSWORDS
A NEW SECURITY PRIMITIVE BASED ON
HARD AI PROBLEMS
By
Gopinath.R
(1BY14SCS08)
M.Tech (CSE),BMSIT
Under the Guidance of:
Mr. Ravi Kumar B.N
Asst. Professor , Dept of CSE, BMSIT
AGENDA
 Introduction
 Background
 Captcha as Graphical Password
 Recognition Based CaRP
 Security Analysis
 Applications
 Conclusion 2
INTRODUCTION
 Using hard Artificial Intelligence problems for Security is an exciting
new paradigm.
 Under this paradigm, the most notable primitive is Captcha, which
distinguishes human users from computers by presenting a
challenge, i.e., a puzzle .
 Captcha is now a standard Internet security technique to protect
online email and other services from being abused by bots.
 A new security primitive based on hard AI problems, namely, a novel
family of graphical password systems integrating Captcha
technology, called as CaRP.
 CaRP is click-based graphical passwords, where a sequence of
clicks on an image is used to derive a password.
3
BACKGROUND
 Graphical Passwords
Recall Based Techniques
A user is asked to reproduce something that he created or
selected earlier during the registration stage
Recognition Based Techniques
A user is presented with a set of images and the user passes the
authentication by recognizing and identifying the images he
selected during the registration stage.
Cued-recall Technique
An extra cue is provided to users to remember and target specific
locations within a presented image.
4
 Captcha
Completely Automated Public Turing test to tell Computers &
Humans Apart.
It is a program that is a challenge response to test to separate humans
from computer programs.
TYPES:
Text Captcha
The Text Captcha relies on character recognition
Image-Recognition Captcha (IRC)
The IRC relies on recognition of non-character objects.
5
TEXT BASED
simple, normal questions :-
 what is the sum of three & thirty-five ?
 If today is Saturday, what is day after tomorrow?
 Which of mango, table & water is a fruit?
 Very effective, needs a large question bank.
 Cognitively challenged ,users find it hard.
6
IMAGE-RECOGNITION CAPTCHA
1.BONGO
 User has to solve a pattern recognition problem.
 Has to tell the distinct characteristic between two sets of figures.
 Then tell to which set a given figure belongs to.
7
2.PIX
 Uses a large database of labelled images.
 It shows a set of images, user has to recognize the common feature
among those.
 Eg :- pick the common characteristic among the following 4 pictures =
“aeroplane”.
8
 Captcha in Authentication
 It was introduced to use both Captcha and password in
authentication protocol, called as Captcha-based Password
Authentication (CbPA) protocol.
 The CbPA-protocol requires solving a Captcha challenge after
inputting a valid pair of user ID and password.
9
CAPTCHA AS GRAPHICAL
PASSWORDS- CARP
A New Way to Thwart Guessing Attacks
 In a guessing attack, a password guess tested in an unsuccessful trial
is determined wrong and excluded from subsequent trials.
 To counter guessing attacks, traditional approaches in designing
graphical passwords aim at increasing the effective password space.
 Here we distinguish two types of guessing attacks:
Automatic guessing attacks apply a automatic trial and error process.
Human guessing attacks apply a manual trial and error process.
10
CaRP: An Overview
 In CaRP, a new image is generated for every login attempt.
 CaRP uses an alphabet of visual objects
(e.g., alphanumerical characters, similar animals) to generate a CaRP
image
 CaRP schemes are clicked-based graphical passwords.
 CaRP schemes can be classified into two categories:
Recognition
which requires recognizing an image and using the recognized objects
as cues to enter a password.
Recognition-recall
combines the tasks of both recognition and cued-recall 11
USER AUTHENTICATION WITH
CARP SCHEMES
A typical way to apply CaRP schemes in user authentication is as
follows.
12
Flowchart of basic CaRP authentication.
 The authentication server AS stores a salt s and a hash value H(ρ,s)
for each user ID .
 Upon receiving a login request, AS generates a CaRP image.
 The coordinates of the clicked points are recorded and sent to AS
along with the user ID.
 AS maps the received coordinates onto the CaRP image, and
recovers a sequence of visual object IDs .
 Then AS retrieves salt s of the account, calculates the hash value of
ρ with the salt.
 Authentication succeeds only if the two hash values match.
13
RECOGNITION BASED CARP
1.Click Text
 Click Text is a recognition-based CaRP scheme built on top of text
Captcha.
 A Click Text password is a sequence of characters in the alphabet,
e.g.ρ =“AB#9CD87”, which is similar to a text password.
14
Click-Text image with 33 characters
2.Click Animal
 Click Animal is a recognition-based CaRP scheme built on top of
Captcha Zoo ,with an alphabet of similar animals such as dog,
horse, cat, etc.
 Its password is a sequence of animal names such as
ρ = “Turkey, Cat, Horse, Dog,….”
15
Captcha Zoo with horses circled red. A Click Animal image
3.Animal Grid
 Animal Grid is a combination of Click Animal and CAS.
 Click-A-Secret (CAS) wherein a user clicks the grid cells in his password.
password.
 To enter a password, a Click Animal image is displayed first.
 After an animal is selected, an image of n × n grid appears, with the grid-
grid-cell size equaling the bounding rectangle of the selected animal.
16
A ClickAnimal image 6 × 6 grid
SECURITY ANALYSIS
 Security of Underlying Captcha
As a framework of graphical passwords, CaRP does not
rely on any specific Captcha scheme.
If one Captcha scheme gets broken, a new robust
Captcha scheme can be used to construct a new CaRP
scheme
17
 Automatic online guessing attcks
In automatic online guessing attacks, the trial and error
process is executed automatically whereas dictionaries can
beconstructed manually
18
APPLICATIONS
 CaRP can be applied on touch-screen devices .
 Many e-banking systems uses Captchas in user logins that
requires solving a Captcha challenge for every online login
attempt.
 CaRP increases spammer’s operating cost and thus helps
reduce spam emails.
 If CaRP is combined with a policy to throttle the number of
emails sent to new recipients per login session, leads to
reduced outbound spam traffic.
19
CONCLUSION
 CaRP is both a Captcha and a graphical password scheme.
 A desired security property that other graphical password schemes
lack.
 CaRP is also resistant to Captcha relay attacks, and, if combined with
dual-view technologies shoulder-surfing attacks.
 CaRP can also help to reduce spam emails sent from a Web email
service
 More efforts will be attracted by CaRP than ordinary Captcha.
 CaRP does not rely on any specific Captcha scheme. 20
REFERENCES
[1] Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu “Captcha as
Graphical Passwords—A New Security Primitive Based on Hard AI Problems”
VOL. 9, NO. 6, JUNE 2014
[2] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords:
Learning from the first twelve years,” ACM Compute Surveys, vol. 44, no. 4,
2012.
[3] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and
analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999,
pp. 1–15.
[4] H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of
graphical passwords,” Int. J. Netw. Security , vol. 7, no. 2, pp. 273– 292, 2008.
[5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon,
“PassPoints: Design and longitudinal evaluation of a graphical password
system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.
21
Thank you…!!!
22

Mais conteúdo relacionado

Mais procurados

Lexical Analysis - Compiler design
Lexical Analysis - Compiler design Lexical Analysis - Compiler design
Lexical Analysis - Compiler design Aman Sharma
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and DefenseKishor Datta Gupta
 
String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)Aditya pratap Singh
 
A Role of Lexical Analyzer
A Role of Lexical AnalyzerA Role of Lexical Analyzer
A Role of Lexical AnalyzerArchana Gopinath
 
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...Nithin Kumar,VVCE, Mysuru
 
Introduction to Java Strings, By Kavita Ganesan
Introduction to Java Strings, By Kavita GanesanIntroduction to Java Strings, By Kavita Ganesan
Introduction to Java Strings, By Kavita GanesanKavita Ganesan
 
Image classification using CNN
Image classification using CNNImage classification using CNN
Image classification using CNNNoura Hussein
 
Language for specifying lexical Analyzer
Language for specifying lexical AnalyzerLanguage for specifying lexical Analyzer
Language for specifying lexical AnalyzerArchana Gopinath
 
Java programming lab assignments
Java programming lab assignments Java programming lab assignments
Java programming lab assignments rajni kaushal
 
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...Edureka!
 
Machine Learning
Machine LearningMachine Learning
Machine LearningRahul Kumar
 
20.2 Java inheritance
20.2 Java inheritance20.2 Java inheritance
20.2 Java inheritanceIntro C# Book
 

Mais procurados (20)

Lexical Analysis - Compiler design
Lexical Analysis - Compiler design Lexical Analysis - Compiler design
Lexical Analysis - Compiler design
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
 
String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)String Matching (Naive,Rabin-Karp,KMP)
String Matching (Naive,Rabin-Karp,KMP)
 
A Role of Lexical Analyzer
A Role of Lexical AnalyzerA Role of Lexical Analyzer
A Role of Lexical Analyzer
 
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
 
Introduction to Java Strings, By Kavita Ganesan
Introduction to Java Strings, By Kavita GanesanIntroduction to Java Strings, By Kavita Ganesan
Introduction to Java Strings, By Kavita Ganesan
 
Captcha
CaptchaCaptcha
Captcha
 
NLP
NLPNLP
NLP
 
Image classification using CNN
Image classification using CNNImage classification using CNN
Image classification using CNN
 
Language for specifying lexical Analyzer
Language for specifying lexical AnalyzerLanguage for specifying lexical Analyzer
Language for specifying lexical Analyzer
 
Java programming lab assignments
Java programming lab assignments Java programming lab assignments
Java programming lab assignments
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Introduction to Compiler design
Introduction to Compiler design Introduction to Compiler design
Introduction to Compiler design
 
Machine learning
Machine learningMachine learning
Machine learning
 
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...
Keras Tutorial For Beginners | Creating Deep Learning Models Using Keras In P...
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Java Strings
Java StringsJava Strings
Java Strings
 
String matching algorithm
String matching algorithmString matching algorithm
String matching algorithm
 
20.2 Java inheritance
20.2 Java inheritance20.2 Java inheritance
20.2 Java inheritance
 
1.Introduction to deep learning
1.Introduction to deep learning1.Introduction to deep learning
1.Introduction to deep learning
 

Destaque

Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 

Destaque (20)

Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Captcha
CaptchaCaptcha
Captcha
 
captcha as a graphical password
captcha as a graphical passwordcaptcha as a graphical password
captcha as a graphical password
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Jean captcha-ppt
Jean captcha-pptJean captcha-ppt
Jean captcha-ppt
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 

Semelhante a Captcha as graphical password

CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWCAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWIJLT EMAS
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologiesMonika Keerthi
 
captcha and graphical
captcha and graphicalcaptcha and graphical
captcha and graphicalvishnuRajan20
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET Journal
 
captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...swathi78
 
captcha as graphical passwords—a new security
captcha as graphical passwords—a new securitycaptcha as graphical passwords—a new security
captcha as graphical passwords—a new securityswathi78
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Shakas Technologies
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...chandra sekhar
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...chandra sekhar
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologiesMonika Keerthi
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based CaptchaKAUSHAL KUMAR JHA
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...IRJET Journal
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 

Semelhante a Captcha as graphical password (20)

CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWCAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
 
captcha and graphical
captcha and graphicalcaptcha and graphical
captcha and graphical
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
 
captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...
 
captcha as graphical passwords—a new security
captcha as graphical passwords—a new securitycaptcha as graphical passwords—a new security
captcha as graphical passwords—a new security
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based Captcha
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
deCaptcha
deCaptchadeCaptcha
deCaptcha
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 

Último

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Último (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Captcha as graphical password

  • 1. CAPTCHA AS GRAPHICAL PASSWORDS A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS By Gopinath.R (1BY14SCS08) M.Tech (CSE),BMSIT Under the Guidance of: Mr. Ravi Kumar B.N Asst. Professor , Dept of CSE, BMSIT
  • 2. AGENDA  Introduction  Background  Captcha as Graphical Password  Recognition Based CaRP  Security Analysis  Applications  Conclusion 2
  • 3. INTRODUCTION  Using hard Artificial Intelligence problems for Security is an exciting new paradigm.  Under this paradigm, the most notable primitive is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle .  Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots.  A new security primitive based on hard AI problems, namely, a novel family of graphical password systems integrating Captcha technology, called as CaRP.  CaRP is click-based graphical passwords, where a sequence of clicks on an image is used to derive a password. 3
  • 4. BACKGROUND  Graphical Passwords Recall Based Techniques A user is asked to reproduce something that he created or selected earlier during the registration stage Recognition Based Techniques A user is presented with a set of images and the user passes the authentication by recognizing and identifying the images he selected during the registration stage. Cued-recall Technique An extra cue is provided to users to remember and target specific locations within a presented image. 4
  • 5.  Captcha Completely Automated Public Turing test to tell Computers & Humans Apart. It is a program that is a challenge response to test to separate humans from computer programs. TYPES: Text Captcha The Text Captcha relies on character recognition Image-Recognition Captcha (IRC) The IRC relies on recognition of non-character objects. 5
  • 6. TEXT BASED simple, normal questions :-  what is the sum of three & thirty-five ?  If today is Saturday, what is day after tomorrow?  Which of mango, table & water is a fruit?  Very effective, needs a large question bank.  Cognitively challenged ,users find it hard. 6
  • 7. IMAGE-RECOGNITION CAPTCHA 1.BONGO  User has to solve a pattern recognition problem.  Has to tell the distinct characteristic between two sets of figures.  Then tell to which set a given figure belongs to. 7
  • 8. 2.PIX  Uses a large database of labelled images.  It shows a set of images, user has to recognize the common feature among those.  Eg :- pick the common characteristic among the following 4 pictures = “aeroplane”. 8
  • 9.  Captcha in Authentication  It was introduced to use both Captcha and password in authentication protocol, called as Captcha-based Password Authentication (CbPA) protocol.  The CbPA-protocol requires solving a Captcha challenge after inputting a valid pair of user ID and password. 9
  • 10. CAPTCHA AS GRAPHICAL PASSWORDS- CARP A New Way to Thwart Guessing Attacks  In a guessing attack, a password guess tested in an unsuccessful trial is determined wrong and excluded from subsequent trials.  To counter guessing attacks, traditional approaches in designing graphical passwords aim at increasing the effective password space.  Here we distinguish two types of guessing attacks: Automatic guessing attacks apply a automatic trial and error process. Human guessing attacks apply a manual trial and error process. 10
  • 11. CaRP: An Overview  In CaRP, a new image is generated for every login attempt.  CaRP uses an alphabet of visual objects (e.g., alphanumerical characters, similar animals) to generate a CaRP image  CaRP schemes are clicked-based graphical passwords.  CaRP schemes can be classified into two categories: Recognition which requires recognizing an image and using the recognized objects as cues to enter a password. Recognition-recall combines the tasks of both recognition and cued-recall 11
  • 12. USER AUTHENTICATION WITH CARP SCHEMES A typical way to apply CaRP schemes in user authentication is as follows. 12 Flowchart of basic CaRP authentication.
  • 13.  The authentication server AS stores a salt s and a hash value H(ρ,s) for each user ID .  Upon receiving a login request, AS generates a CaRP image.  The coordinates of the clicked points are recorded and sent to AS along with the user ID.  AS maps the received coordinates onto the CaRP image, and recovers a sequence of visual object IDs .  Then AS retrieves salt s of the account, calculates the hash value of ρ with the salt.  Authentication succeeds only if the two hash values match. 13
  • 14. RECOGNITION BASED CARP 1.Click Text  Click Text is a recognition-based CaRP scheme built on top of text Captcha.  A Click Text password is a sequence of characters in the alphabet, e.g.ρ =“AB#9CD87”, which is similar to a text password. 14 Click-Text image with 33 characters
  • 15. 2.Click Animal  Click Animal is a recognition-based CaRP scheme built on top of Captcha Zoo ,with an alphabet of similar animals such as dog, horse, cat, etc.  Its password is a sequence of animal names such as ρ = “Turkey, Cat, Horse, Dog,….” 15 Captcha Zoo with horses circled red. A Click Animal image
  • 16. 3.Animal Grid  Animal Grid is a combination of Click Animal and CAS.  Click-A-Secret (CAS) wherein a user clicks the grid cells in his password. password.  To enter a password, a Click Animal image is displayed first.  After an animal is selected, an image of n × n grid appears, with the grid- grid-cell size equaling the bounding rectangle of the selected animal. 16 A ClickAnimal image 6 × 6 grid
  • 17. SECURITY ANALYSIS  Security of Underlying Captcha As a framework of graphical passwords, CaRP does not rely on any specific Captcha scheme. If one Captcha scheme gets broken, a new robust Captcha scheme can be used to construct a new CaRP scheme 17
  • 18.  Automatic online guessing attcks In automatic online guessing attacks, the trial and error process is executed automatically whereas dictionaries can beconstructed manually 18
  • 19. APPLICATIONS  CaRP can be applied on touch-screen devices .  Many e-banking systems uses Captchas in user logins that requires solving a Captcha challenge for every online login attempt.  CaRP increases spammer’s operating cost and thus helps reduce spam emails.  If CaRP is combined with a policy to throttle the number of emails sent to new recipients per login session, leads to reduced outbound spam traffic. 19
  • 20. CONCLUSION  CaRP is both a Captcha and a graphical password scheme.  A desired security property that other graphical password schemes lack.  CaRP is also resistant to Captcha relay attacks, and, if combined with dual-view technologies shoulder-surfing attacks.  CaRP can also help to reduce spam emails sent from a Web email service  More efforts will be attracted by CaRP than ordinary Captcha.  CaRP does not rely on any specific Captcha scheme. 20
  • 21. REFERENCES [1] Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu “Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems” VOL. 9, NO. 6, JUNE 2014 [2] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Compute Surveys, vol. 44, no. 4, 2012. [3] I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15. [4] H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security , vol. 7, no. 2, pp. 273– 292, 2008. [5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005. 21