SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                          International Journal of Advanced Research in Computer Engineering & Technology
                                                                                              Volume 1, Issue 4, June 2012




            A Proposal of Image Arrangement CAPTCHA
                       M.Geethanjali                                      R.Ramesh
                            M.Tech (CS)
                                                                       (Associate. professor)
       Audisankara Engineering Science and Technology,
                                                                       Gudur, Anantapur University, Andhra Pradesh


Abstract- A CAPTCHA is a technique that is used to prevent
automated programs from being able to acquire free e-mail or           sent, and mass spam blogs (splogs) being created, etc., by
online service accounts. However, as many researchers have             malicious automated programs (e.g., bots) are becoming a
already reported, conventional CAPTCHAs could be overcome by           serious problem. Thus, the Turing test is becoming a necessary
state-of-the-art malwares since the capabilities of computers are
                                                                       technique       to       discriminate        humans         from
approaching those of humans. Therefore, CAPTCHAs should be
based on even more advanced human-cognitive-processing                 malicious automated programs and the Completely Automated
abilities. In addition, it is also important to keep in mind that      Public Turing test to tell Computers and Humans Apart
answering CAPTCHAs is an added annoyance for users, who feel           (CAPTCHA). An image recognition-based CAPTCHA such as
troublesome to prove that they are humans at every Web accesses.       Asirra(Animal Species image recognition for restricting access) is
So, CAPTCHAs should be enjoyable for users. To cope with these
                                                                       known as one of the effective              solutions to enhance
issues, we have focused on the human ability to understand humor
which is considered one of the most advanced human cognitive           CAPTCHAs, because image recognition is much harder problem
processing abilities, and already proposed the concept of a new        for a machine than character recognition. Animal images can be
type of Turing test that uses image Arrangement , which would          fun and enjoyable by the users. By using animals users feel fun
make CATPCHAs fun and enjoyable. So in this paper, we carry out        and enjoy them self.
experimental studies to confirm the usability of the proposed
CAPTCHA.



Turing Test; CAPTCHA; image Arrangement; humor (key words)




                       I.       INTRODUCTION

Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users
choose or are assigned an ID and password or other
authenticating information that allows them access to
information and programs within their authority.

         Network security covers a variety of computer networks,
both public and private, that are used in everyday jobs
conducting transactions and communications among businesses,
government               agencies and individuals. Networks can be
private, such as within a company, and others which might be
open to public access. Network               security is involved in
organizations, enterprises, and other types of institutions. The
most common and simple way of protecting a network resource
is by assigning it a unique name and a corresponding password.

       Denial of service (DoS) attacks, such as masses of Web
service accounts being illicitly obtained, bulk spam e-mails being


                                                                                                                                    289

                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012


                                                                           As more and more sites accept comments from their
                                                                     users, more and more people are trying to leave messages telling
                                                                     people how to enlarge their outgoings. Unfortunately, spam
                                                                     makes people rich and there’s not all that much we can do apart

II.    RELATED WORKS                                                 from block and delete it when it happens to us. CAPTCHAs are at
                                                                     the points of submitting something, or where you would sign up.
ESP-PIX, so called “naming images CAPTCHA”, has been
proposed in CMU [1]. In ESP-PIX, a user is presented with            They are in the places where there is most probably going to be
several distinct images of same subject. Then the user has to        an automated spam attack.
correctly type the common term associated with the images.
                                                                          Requiring a set of machine testable, programmatically valid
II.Image Arrangement CAPTCHA :                                       options helps ensure that images have complete structure. If no
                                                                     accessible option can be determined, then the resulting structure
  Concept:
                                                                     should be considered invalid. Text alternatives are essential for
        CAPTCHA used to identify whether the web application is      accessibility. Enabling automatic valuators to programmatically
using by the Human or Computer .Using the web applications by        detect the presence or absence of text alternatives raises public
the user we can provide the security to that web application         awareness of Web accessibility in general and aids in accessibility
using the CAPTCHA.In this image based-CAPTCHA image provided         education in particular.
to the user. That image divided into 9 pixels. Among the 9 pixels
.Now image CAPTCHA consisting of pixels. We can shuffle that          Image CAPTCHA saved in database. When User using the wed

pixels after that provided to the user.    Pixel is Electronics &    site or web application that image pixel CAPTCHA can provided to

Computer Science / Computer Science any of a number of very          the user. User can rearrange that image pixel

small picture elements that make up a picture, as on a visual
                                                                     CAPTCHA then user easily log on to that web application.
display unit. Pixels are generally arranged in rows and column. In
Computer science, the smallest discrete component of an image        Otherwise, user cannot log on to that particular website. User
or picture on a CRT screen.                                          may request new CAPTCHA image because user cannot arrange
                                                                     that image CATPCHAs we can provide new image CAPTCHA
      III.Math                                                       when user requested other image. From the database
                                                                     immediately, we can provide an image to the requested user.
Your probably seen those colorful images with distorted text in
                                                                     User can try to rearrange that image. User easily logged onto the
them at the bottom of Web registration form. CAPTCHAs are
                                                                     web application. We can provide security to the web application
used by Yahoo, Hotmail, PayPal and many other popular Web
                                                                     by using the CAPTCHA.To arranging the image CAPTCHA user can
sites to prevent automated registrations, and they work because no
                                                                     take some time based upon the humar.
computer program can currently read distorted text as well as
humans can.                                                          For a computer, however, it would be difficult to recognize
                                                                     the meaning of the pictures and utterances in each panel.
      CAPTCHA is a “completely Automated Public Turing Test to       Moreover, even if image processing and natural language
                                                                     processing capabilities developed to the level where the
Tell Computer and Human Apart”. Public means that the code           computer could recognize the meaning of the pictures and
and the data used by a CAPTCHA should be publicly available.         utterances, it would be still impossible for the computer to
                                                                     arrange the four panels in the right order unless it understood
Turing Test means CAPTCHAs are like Turing Tests in that they        humor – what is funny about the cartoon, and why? Cartoons
distinguish humans from computers.                                   often contain situations that do not appear explicitly in
                                                                     conversation, such as tacit understanding and atmosphere.
                                                                     We believe that it would be nearly impossible for malwares to
                                                                     reach a level where they can understand this type of implicit
                                                                                                                                   290

                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012


meaning (humor), regardless of how advanced the technology              For the purposes of comparison, the following three types
might be.                                                            (categories) of four-panel cartoons were used in this
                                                                     experiment.
   Furthermore, because reading cartoons is fun and
entertaining for humans, a four-panel cartoon CAPTCHA will           four-panel cartoons selected at random from among four-
most likely be seen as an agreeable and enjoyable Turing Test        panel cartoons published on the Internet (e.g.: Fig. 8)
that does not adversely affect convenience for users.
                                                                     1)      Ten image arrangement with very clear story lines;
B.    Authentication process                                                 considered highly likely to be arranged correctly by
                                                                             human subjects
   The authentication process used in a image arrangement
CAPTCHA is as follows:                                               2)      Ten four-panel cartoons where if one panel is removed,
                                                                             the order of the remaining three panels is clear, such
     STEP 1image is selected at random from a database of                    that those remaining three panels are considered highly
             cartoons.                                                       likely to be arranged correctly by human subjects

     STEP 2.The order of the panels in the selected image
             cartoon is rearranged randomly (shuffled).                       Ten four-panel cartoons in each of categories (i), (ii), and
                                                                          (iii) were presented to the subjects in random order. The
     STEP 3.The shuffled image parts is presented to a                    subjects were given no information about any of the four-
             webpage visitor.                                             panel cartoons in categories (i), (ii), and (iii)

     STEP 4.The visitor rearranges the shuffled image cartoon         V.      REMARKS
             into what appears to be the correct order. (The
             webpage could be equipped with a form allowing          A.     Security
             the visitor to input the correct order of panels.)
                                                                       In the case of four-panel cartoon CAPTCHAs, a four-panel
     STEP 5.If the order of the panels entered is correct, the       cartoon is presented with the four panels rearranged
             visitor is identified as a human, and if the order is   randomly, and users that are able to respond with the correct
             incorrect, the visitor is identified as a malware.      order are identified as humans. In this case, however, since
                                                                     there are only 24 possible combinations, even a malware
                                                                     could respond a correct answer at a rate of one out of every
                                                                     24 tries. It is therefore necessary to investigate methods for
                                                                     constructing more effective four-panel cartoon CAPTCHAs.

     IV. VERIFICATION EXPERIMENTS
                                                                        For example, if a panel that is completely unrelated to the
     We conducted basic experiments to check and evaluate            four-panel cartoon used for the CAPTCHA is displayed as a
     the feasibility of the proposed method.                         decoy, then the success rate for a malware will be reduced by
                                                                     1/{n+4P4} for every n decoy panels included. This also
                                                                     increases the effort required by users, however, and there is
A.    Goal of the experiments                                        a fear that the usability will decrease. We will need to explore
                                                                     the most appropriate configurations for four-panel cartoon
  We conducted a simple preliminary experiment to check              CAPTCHAs from the perspectives of both security and
whether humans could easily arrange shuffled four-panel              usability.At the same time, we plan to conduct detailed
cartoons into the correct order. We also investigated how the        studies regarding whether the four-panel cartoon CAPTCHA is
level of difficulty in this task changed depending on the type       true impervious to malware attacks.
of four-panel cartoon.

B.    Experimental method
                                                                     B.      Operation procedures
  The subjects in this experiment were ten volunteers who
were college students (subject A-J). These subjects were               A large volume of four-panel cartoon data would be
presented with shuffled four-panel cartoons, like the one            required to put four-panel cartoon CAPTCHAs into actual
shown in Fig. 7 and were then asked to arrange the panels in         operation on the Internet. Japan has a highly developed
the most appropriate order according to the flow of the              Manga (cartoon) culture, and four-panel cartoons are
cartoons.                                                            published in many newspapers every day, providing a rich

                                                                                                                                     291

                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                Volume 1, Issue 4, June 2012


source of such data. It will be necessary, however, to study              time was about 28.5 seconds, which is substantially longer than
mechanisms for accumulating four-panel cartoons in a                      the response time for conventional CAPTCHAs using character
database. A system will also have to be constructed to                    recognition. Answering CAPTCHAs is an added annoyance for
automatically create CAPTCHAs from the four-panel cartoons                users, who feel troublesome to prove that they are humans at
in the database.                                                          every Web accesses. Reducing the response time for the four-
                                                                          panel cartoon CAPTCHAs is therefore a crucial issue.
   In order to accumulate cartoons, it would be possible to
incorporate a business model into the proposed CAPTCHA as                          If the authentication process itself is a itself is a
                                                                          pleasant one for users, however, it is expected that the
follows: cartoonists from across the country upload their own             overall usability level will be acceptable even if the response
four-panel cartoons into the CAPTCHA database, so that each               time is longer. In the proposed method which is asking the
time a given cartoon is used as a CAPTCHA on an Internet                  users to read four-panel cartoons, we believe that the
page, the cartoon’s author would be paid royalties (Fig.11).              authentication process will be entertaining and enjoyable. In
                                                                          other words, despite the fact that the proposed method
   In order to implement this system, it will be necessary to             requires more time for an authentication than conventional
                                                                          CAPTCHAs using character recognition, the level of usability
find a way of automatically extracting from a vast numbers of
                                                                          experienced by the user is not expected to decrease
                                                                          significantly. We plan to confirm this assumption through
    the uploaded cartoons in the database only those
                                                                          subject interviews.In the proposed method, there is a
cartoons that are easy for humans to understand.                          potential to further increase theentertainment value. For
Furthermore, when copyrighted cartoons are used, it is                    example, cooking recipes presented in the form of four-panel
necessary to give sufficient consideration to the protection of           cartoons could be used in place of actual cartoons. A website
these contents (e.g.,                                                     that introduces cooking information would like to use such a
                                                                          CAPTCHA with a four-panel recipe. In this way, by creating
      preventing the cartoons from being copied by using a                CAPTCHA that are related to the Web page contents, it is
                                                                          possible to draw the user’s interest, and to further strengthen
screen capture for the CAPTCHA authentication screen).
                                                                          the entertainment value of the proposed CAPTCHA value of
                                                                          the proposed CAPTCHA.
   It is noted here that the above-mentioned cartoon
database should be concealed from public and those four-
                                                                                           IV.CONCLUSION
panel cartoons should be stored in private. If the cartoons
are publicly stored, attackers can easily collect the answers               In this study, we focused on the user’s ability to understand
(i.e., correct order of panels) of four-panel cartoon CAPTCHAs            humor, which represents the ultimate in human cognitive
by using the database. One of the practical ways could be to              processing abilities, and proposed a CAPTCHA that uses image
establish an agency which carries out all the operation                   pixels. The proposed method is expected to offer a new form of
regarding the proposed CAPTCHAs: (1) when a user visits a                 CAPTCHA that feature both security and usability, being difficult
Web page, the user is redirected to the agency site, (2) the              for advanced malwares to decipher, and at the same time
user is authenticated in the agency site with a four-panel                offering entertainment value for users. This paper confirmed the
                                                                          usability of the proposed CAPTCHA throughout some
cartoon CAPTCHA, and (3) agency sends the result back to
                                                                          experimental studies.
the Web page.

                                                                                        REFERENCES

                                                                          [1] The Official CAPTCHA Site, http://www.captcha.net

                                                                          [2]   PWNtcha-Captcha Decoder, http://caca.zoy.org/wiki/PWNtcha

                                                                          [3]   K. Chellapilla, K. Larson, P. Y. Simard and M. Czerwinski, Computers
                                                                                beat Humans at Single Character Recognition in Reading based Human
                                                                                Interaction Proofs (HIPs), In Proceedings of the 2nd Conference on
Figure 11. Outline of operations using four-panel cartoon CAPTCHAs
                                                                                Email and Anti-Spam, 2005. Ar

C.    Entertaining aspect


    Even in the case that we only used well-conceived cartoons
(experiments (ii) and (iii) in Section IV), the average response
                                                                                                                                                292

                                                       All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...IOSR Journals
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...IGEEKS TECHNOLOGIES
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature IJECEIAES
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
 
IRJET- Artificial Intelligence Based Chat-Bot
IRJET-  	  Artificial Intelligence Based Chat-BotIRJET-  	  Artificial Intelligence Based Chat-Bot
IRJET- Artificial Intelligence Based Chat-BotIRJET Journal
 
Interactive speech based games for autistic children with asperger syndrome
Interactive speech based games for autistic children with asperger syndromeInteractive speech based games for autistic children with asperger syndrome
Interactive speech based games for autistic children with asperger syndromeAmal Abduallah
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationIJNSA Journal
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 

Tendances (19)

Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Captcha
CaptchaCaptcha
Captcha
 
File tracking system
File tracking systemFile tracking system
File tracking system
 
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
6543456
65434566543456
6543456
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Diff between AI& ML&DL
Diff between AI& ML&DLDiff between AI& ML&DL
Diff between AI& ML&DL
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
C0361419
C0361419C0361419
C0361419
 
IRJET- Artificial Intelligence Based Chat-Bot
IRJET-  	  Artificial Intelligence Based Chat-BotIRJET-  	  Artificial Intelligence Based Chat-Bot
IRJET- Artificial Intelligence Based Chat-Bot
 
Interactive speech based games for autistic children with asperger syndrome
Interactive speech based games for autistic children with asperger syndromeInteractive speech based games for autistic children with asperger syndrome
Interactive speech based games for autistic children with asperger syndrome
 
An Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for AuthenticationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 

En vedette (8)

203 212
203 212203 212
203 212
 
91 94
91 9491 94
91 94
 
24 26
24 2624 26
24 26
 
47 50
47 5047 50
47 50
 
311 314
311 314311 314
311 314
 
51 59
51 5951 59
51 59
 
238 243
238 243238 243
238 243
 
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_services
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_servicesRapid disclosure of_clients_spot_witg_the_help_of_location_based_services
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_services
 

Similaire à 289 292

IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET Journal
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologiesMonika Keerthi
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesIRJET Journal
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based CaptchaKAUSHAL KUMAR JHA
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesKarthikeyan Umapathy
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...IRJET Journal
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPIRJET Journal
 
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing TechniquesCaptcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing TechniquesIOSR Journals
 

Similaire à 289 292 (20)

IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Captcha
CaptchaCaptcha
Captcha
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 
Captchas
CaptchasCaptchas
Captchas
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based Captcha
 
Captcha
CaptchaCaptcha
Captcha
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
captcha
captcha captcha
captcha
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Captcha
CaptchaCaptcha
Captcha
 
CAPTCHA.pptx
CAPTCHA.pptxCAPTCHA.pptx
CAPTCHA.pptx
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing TechniquesCaptcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing Techniques
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Dernier (20)

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

289 292

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 A Proposal of Image Arrangement CAPTCHA M.Geethanjali R.Ramesh M.Tech (CS) (Associate. professor) Audisankara Engineering Science and Technology, Gudur, Anantapur University, Andhra Pradesh Abstract- A CAPTCHA is a technique that is used to prevent automated programs from being able to acquire free e-mail or sent, and mass spam blogs (splogs) being created, etc., by online service accounts. However, as many researchers have malicious automated programs (e.g., bots) are becoming a already reported, conventional CAPTCHAs could be overcome by serious problem. Thus, the Turing test is becoming a necessary state-of-the-art malwares since the capabilities of computers are technique to discriminate humans from approaching those of humans. Therefore, CAPTCHAs should be based on even more advanced human-cognitive-processing malicious automated programs and the Completely Automated abilities. In addition, it is also important to keep in mind that Public Turing test to tell Computers and Humans Apart answering CAPTCHAs is an added annoyance for users, who feel (CAPTCHA). An image recognition-based CAPTCHA such as troublesome to prove that they are humans at every Web accesses. Asirra(Animal Species image recognition for restricting access) is So, CAPTCHAs should be enjoyable for users. To cope with these known as one of the effective solutions to enhance issues, we have focused on the human ability to understand humor which is considered one of the most advanced human cognitive CAPTCHAs, because image recognition is much harder problem processing abilities, and already proposed the concept of a new for a machine than character recognition. Animal images can be type of Turing test that uses image Arrangement , which would fun and enjoyable by the users. By using animals users feel fun make CATPCHAs fun and enjoyable. So in this paper, we carry out and enjoy them self. experimental studies to confirm the usability of the proposed CAPTCHA. Turing Test; CAPTCHA; image Arrangement; humor (key words) I. INTRODUCTION Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. Denial of service (DoS) attacks, such as masses of Web service accounts being illicitly obtained, bulk spam e-mails being 289 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 As more and more sites accept comments from their users, more and more people are trying to leave messages telling people how to enlarge their outgoings. Unfortunately, spam makes people rich and there’s not all that much we can do apart II. RELATED WORKS from block and delete it when it happens to us. CAPTCHAs are at the points of submitting something, or where you would sign up. ESP-PIX, so called “naming images CAPTCHA”, has been proposed in CMU [1]. In ESP-PIX, a user is presented with They are in the places where there is most probably going to be several distinct images of same subject. Then the user has to an automated spam attack. correctly type the common term associated with the images. Requiring a set of machine testable, programmatically valid II.Image Arrangement CAPTCHA : options helps ensure that images have complete structure. If no accessible option can be determined, then the resulting structure Concept: should be considered invalid. Text alternatives are essential for CAPTCHA used to identify whether the web application is accessibility. Enabling automatic valuators to programmatically using by the Human or Computer .Using the web applications by detect the presence or absence of text alternatives raises public the user we can provide the security to that web application awareness of Web accessibility in general and aids in accessibility using the CAPTCHA.In this image based-CAPTCHA image provided education in particular. to the user. That image divided into 9 pixels. Among the 9 pixels .Now image CAPTCHA consisting of pixels. We can shuffle that Image CAPTCHA saved in database. When User using the wed pixels after that provided to the user. Pixel is Electronics & site or web application that image pixel CAPTCHA can provided to Computer Science / Computer Science any of a number of very the user. User can rearrange that image pixel small picture elements that make up a picture, as on a visual CAPTCHA then user easily log on to that web application. display unit. Pixels are generally arranged in rows and column. In Computer science, the smallest discrete component of an image Otherwise, user cannot log on to that particular website. User or picture on a CRT screen. may request new CAPTCHA image because user cannot arrange that image CATPCHAs we can provide new image CAPTCHA III.Math when user requested other image. From the database immediately, we can provide an image to the requested user. Your probably seen those colorful images with distorted text in User can try to rearrange that image. User easily logged onto the them at the bottom of Web registration form. CAPTCHAs are web application. We can provide security to the web application used by Yahoo, Hotmail, PayPal and many other popular Web by using the CAPTCHA.To arranging the image CAPTCHA user can sites to prevent automated registrations, and they work because no take some time based upon the humar. computer program can currently read distorted text as well as humans can. For a computer, however, it would be difficult to recognize the meaning of the pictures and utterances in each panel. CAPTCHA is a “completely Automated Public Turing Test to Moreover, even if image processing and natural language processing capabilities developed to the level where the Tell Computer and Human Apart”. Public means that the code computer could recognize the meaning of the pictures and and the data used by a CAPTCHA should be publicly available. utterances, it would be still impossible for the computer to arrange the four panels in the right order unless it understood Turing Test means CAPTCHAs are like Turing Tests in that they humor – what is funny about the cartoon, and why? Cartoons distinguish humans from computers. often contain situations that do not appear explicitly in conversation, such as tacit understanding and atmosphere. We believe that it would be nearly impossible for malwares to reach a level where they can understand this type of implicit 290 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 meaning (humor), regardless of how advanced the technology For the purposes of comparison, the following three types might be. (categories) of four-panel cartoons were used in this experiment. Furthermore, because reading cartoons is fun and entertaining for humans, a four-panel cartoon CAPTCHA will four-panel cartoons selected at random from among four- most likely be seen as an agreeable and enjoyable Turing Test panel cartoons published on the Internet (e.g.: Fig. 8) that does not adversely affect convenience for users. 1) Ten image arrangement with very clear story lines; B. Authentication process considered highly likely to be arranged correctly by human subjects The authentication process used in a image arrangement CAPTCHA is as follows: 2) Ten four-panel cartoons where if one panel is removed, the order of the remaining three panels is clear, such STEP 1image is selected at random from a database of that those remaining three panels are considered highly cartoons. likely to be arranged correctly by human subjects STEP 2.The order of the panels in the selected image cartoon is rearranged randomly (shuffled). Ten four-panel cartoons in each of categories (i), (ii), and (iii) were presented to the subjects in random order. The STEP 3.The shuffled image parts is presented to a subjects were given no information about any of the four- webpage visitor. panel cartoons in categories (i), (ii), and (iii) STEP 4.The visitor rearranges the shuffled image cartoon V. REMARKS into what appears to be the correct order. (The webpage could be equipped with a form allowing A. Security the visitor to input the correct order of panels.) In the case of four-panel cartoon CAPTCHAs, a four-panel STEP 5.If the order of the panels entered is correct, the cartoon is presented with the four panels rearranged visitor is identified as a human, and if the order is randomly, and users that are able to respond with the correct incorrect, the visitor is identified as a malware. order are identified as humans. In this case, however, since there are only 24 possible combinations, even a malware could respond a correct answer at a rate of one out of every 24 tries. It is therefore necessary to investigate methods for constructing more effective four-panel cartoon CAPTCHAs. IV. VERIFICATION EXPERIMENTS For example, if a panel that is completely unrelated to the We conducted basic experiments to check and evaluate four-panel cartoon used for the CAPTCHA is displayed as a the feasibility of the proposed method. decoy, then the success rate for a malware will be reduced by 1/{n+4P4} for every n decoy panels included. This also increases the effort required by users, however, and there is A. Goal of the experiments a fear that the usability will decrease. We will need to explore the most appropriate configurations for four-panel cartoon We conducted a simple preliminary experiment to check CAPTCHAs from the perspectives of both security and whether humans could easily arrange shuffled four-panel usability.At the same time, we plan to conduct detailed cartoons into the correct order. We also investigated how the studies regarding whether the four-panel cartoon CAPTCHA is level of difficulty in this task changed depending on the type true impervious to malware attacks. of four-panel cartoon. B. Experimental method B. Operation procedures The subjects in this experiment were ten volunteers who were college students (subject A-J). These subjects were A large volume of four-panel cartoon data would be presented with shuffled four-panel cartoons, like the one required to put four-panel cartoon CAPTCHAs into actual shown in Fig. 7 and were then asked to arrange the panels in operation on the Internet. Japan has a highly developed the most appropriate order according to the flow of the Manga (cartoon) culture, and four-panel cartoons are cartoons. published in many newspapers every day, providing a rich 291 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 source of such data. It will be necessary, however, to study time was about 28.5 seconds, which is substantially longer than mechanisms for accumulating four-panel cartoons in a the response time for conventional CAPTCHAs using character database. A system will also have to be constructed to recognition. Answering CAPTCHAs is an added annoyance for automatically create CAPTCHAs from the four-panel cartoons users, who feel troublesome to prove that they are humans at in the database. every Web accesses. Reducing the response time for the four- panel cartoon CAPTCHAs is therefore a crucial issue. In order to accumulate cartoons, it would be possible to incorporate a business model into the proposed CAPTCHA as If the authentication process itself is a itself is a pleasant one for users, however, it is expected that the follows: cartoonists from across the country upload their own overall usability level will be acceptable even if the response four-panel cartoons into the CAPTCHA database, so that each time is longer. In the proposed method which is asking the time a given cartoon is used as a CAPTCHA on an Internet users to read four-panel cartoons, we believe that the page, the cartoon’s author would be paid royalties (Fig.11). authentication process will be entertaining and enjoyable. In other words, despite the fact that the proposed method In order to implement this system, it will be necessary to requires more time for an authentication than conventional CAPTCHAs using character recognition, the level of usability find a way of automatically extracting from a vast numbers of experienced by the user is not expected to decrease significantly. We plan to confirm this assumption through the uploaded cartoons in the database only those subject interviews.In the proposed method, there is a cartoons that are easy for humans to understand. potential to further increase theentertainment value. For Furthermore, when copyrighted cartoons are used, it is example, cooking recipes presented in the form of four-panel necessary to give sufficient consideration to the protection of cartoons could be used in place of actual cartoons. A website these contents (e.g., that introduces cooking information would like to use such a CAPTCHA with a four-panel recipe. In this way, by creating preventing the cartoons from being copied by using a CAPTCHA that are related to the Web page contents, it is possible to draw the user’s interest, and to further strengthen screen capture for the CAPTCHA authentication screen). the entertainment value of the proposed CAPTCHA value of the proposed CAPTCHA. It is noted here that the above-mentioned cartoon database should be concealed from public and those four- IV.CONCLUSION panel cartoons should be stored in private. If the cartoons are publicly stored, attackers can easily collect the answers In this study, we focused on the user’s ability to understand (i.e., correct order of panels) of four-panel cartoon CAPTCHAs humor, which represents the ultimate in human cognitive by using the database. One of the practical ways could be to processing abilities, and proposed a CAPTCHA that uses image establish an agency which carries out all the operation pixels. The proposed method is expected to offer a new form of regarding the proposed CAPTCHAs: (1) when a user visits a CAPTCHA that feature both security and usability, being difficult Web page, the user is redirected to the agency site, (2) the for advanced malwares to decipher, and at the same time user is authenticated in the agency site with a four-panel offering entertainment value for users. This paper confirmed the usability of the proposed CAPTCHA throughout some cartoon CAPTCHA, and (3) agency sends the result back to experimental studies. the Web page. REFERENCES [1] The Official CAPTCHA Site, http://www.captcha.net [2] PWNtcha-Captcha Decoder, http://caca.zoy.org/wiki/PWNtcha [3] K. Chellapilla, K. Larson, P. Y. Simard and M. Czerwinski, Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs), In Proceedings of the 2nd Conference on Figure 11. Outline of operations using four-panel cartoon CAPTCHAs Email and Anti-Spam, 2005. Ar C. Entertaining aspect Even in the case that we only used well-conceived cartoons (experiments (ii) and (iii) in Section IV), the average response 292 All Rights Reserved © 2012 IJARCET