SlideShare una empresa de Scribd logo
1 de 15
Captcha as Graphical
Passwords—A New Security
Primitive Based on Hard AI
Problems
Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu
Abstract
Many security primitives are based on hard mathematical problems. Using hard AI
problems for security is emerging as an exciting new paradigm, but has been
underexplored. In this paper, we present a new security primitive based on hard
AI problems, namely, a novel family of graphical password systems built on top of
Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP
is both a Captcha and a graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks, relay attacks, and,
if combined with dual-view technologies, shoulder-surfing attacks. Notably, a
CaRP password can be found only probabilistically by automatic online guessing
attacks even if the password is in the search set. CaRP also offers a novel
approach to address the well-known image hotspot problem in popular graphical
password systems, such as PassPoints, that often leads to weak password choices.
CaRP is not a panacea, but it offers reasonable security and usability and appears
to fit well with some practical applications for improving online security.
Existing System
Security primitives are based on hard mathematical problems. Using hard AI
problems for security is emerging as an exciting new paradigm, but has been
underexplored. A fundamental task in security is to create cryptographic
primitives based on hard mathematical problems that are computationally
intractable.
Disadvantages of Existing System
 This paradigm has achieved just a limited success as compared with the
cryptographic primitives based on hard math problems and their wide
applications.
 Using hard AI (Artificial Intelligence) problems for security, initially proposed
in [17], is an exciting new paradigm. Under this paradigm, the most notable
primitive invented is Captcha, which distinguishes human users from
computers by presenting a challenge.
Proposed System
We present a new security primitive based on hard AI problems, namely, a novel family of
graphical password systems built on top of Captcha technology, which we call Captcha as
graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme.
CaRP addresses a number of security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks.
Notably, a CaRP password can be found only probabilistically by automatic online guessing
attacks even if the password is in the search set. CaRP also offers a novel approach to
address the well-known image hotspot problem in popular graphical password systems,
such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but
it offers reasonable security and usability and appears to fit well with some practical
applications for improving online security.We present exemplary CaRPs built on both text
Captcha and image-recognition Captcha. One of them is a text CaRP wherein a password
is a sequence of characters like a text password, but entered by clicking the right
character sequence on CaRP images. CaRP offers protection against online dictionary
attacks on passwords, which have been for long time a major security threat for various
online services. This threat is widespread and considered as a top cyber security risk.
Defense against online dictionary attacks is a more subtle problem than it might appear.
Advantages of Proposed System
 The proposed system offers reasonable security and usability and appears to
fit well with some practical applications for improving online security.
 This threat is widespread and considered as a top cyber security risk. Defense
against online dictionary attacks is a more subtle problem than it might
appear.
Implementation
Implementation is the stage of the project when the theoretical design is turned
out into a working system. Thus it can be considered to be the most critical stage
in achieving a successful new system and in giving the user, confidence that the
new system will work and be effective.
The implementation stage involves careful planning, investigation of the
existing system and it’s constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover methods.
Modules
 Graphical Password
 Captcha in Authentication
 Thwart Guessing Attacks
 Security Of Underlying Captcha
Modules Description
 Graphical Password
In this module, Users are having authentication and security to access the detail
which is presented in the Image system. Before accessing or searching the details
user should have the account in that otherwise they should register first.
 Captcha in Authentication
It was introduced in [14] to use both Captcha and password in a user
authentication protocol, which we call Captcha-based Password Authentication
(CbPA) protocol, to counter online dictionary attacks. The CbPA-protocol in
requires solving a Captcha challenge after inputting a valid pair of user ID and
password unless a valid browser cookie is received. For an invalid pair of user ID
and password, the user has a certain probability to solve a Captcha challenge
before being denied access.
 Thwart Guessing Attacks
In a guessing attack, a password guess tested in an unsuccessful
trial is determined wrong and excluded from subsequent trials.
The number of undetermined password guesses decreases with
more trials, leading to a better chance of finding the password. To
counter guessing attacks, traditional approaches in designing
graphical passwords aim at increasing the effective password
space to make passwords harder to guess and thus require more
trials. No matter how secure a graphical password scheme is, the
password can always be found by a brute force attack. In this
paper, we distinguish two types of guessing attacks: automatic
guessing attacks apply an automatic trial and error process but S
can be manually constructed whereas human guessing attacks
apply a manual trial and error process.
 Security Of Underlying Captcha
Computational intractability in recognizing objects in CaRP images is
fundamental to CaRP. Existing analyses on Captcha security were mostly case by
case or used an approximate process. No theoretic security model has been
established yet. Object segmentation is considered as a computationally
expensive, combinatorially-hard problem, which modern text Captcha schemes
rely on.
Minimum Hardware Configuration of the
proposed system
 Processor : Intel/AMD
 Speed : 1.1 GHz
 RAM : 256 MB
 Hard Disk : 20 GB
 Key Board : Standard Keyboard
 Mouse : Standard Mouse
 Monitor : SVGA/LCD
Software Configuration of the
proposed system
 Operating System : Windows
 Java Version : JDK 1.7/1.8
 Application Server : Tomcat 7/8
 Front End : HTML, Java, JSP
 Scripts : JavaScript
 Database : MySQL 5.5
 Database Connectivity : JDBC
References
 R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning
from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
 (2012, Feb.). The Science Behind Passfaces [Online]. Available:
http://www.realuser.com/published/ScienceBehindPassfaces.pdf
 I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and
analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999,
pp. 1–15.
 H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of
graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
 S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon,
“PassPoints: Design and longitudinal evaluation of a graphical password
system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.

Más contenido relacionado

La actualidad más candente

graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
ijtsrd
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
Nimisha_Goel
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 

La actualidad más candente (20)

Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Graphical password minor report
Graphical password minor reportGraphical password minor report
Graphical password minor report
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Vshantaram
VshantaramVshantaram
Vshantaram
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans P...
 

Destacado

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
kunalkiit
 
Observer-Resistant Password Systems: How hard to make them both usable and se...
Observer-Resistant Password Systems:How hard to make them both usable and se...Observer-Resistant Password Systems:How hard to make them both usable and se...
Observer-Resistant Password Systems: How hard to make them both usable and se...
Shujun Li
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
Abhimanyu Sood
 
Carp powerpoint.ppt 1
Carp powerpoint.ppt 1Carp powerpoint.ppt 1
Carp powerpoint.ppt 1
mapirner
 

Destacado (19)

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Captcha
CaptchaCaptcha
Captcha
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Observer-Resistant Password Systems: How hard to make them both usable and se...
Observer-Resistant Password Systems:How hard to make them both usable and se...Observer-Resistant Password Systems:How hard to make them both usable and se...
Observer-Resistant Password Systems: How hard to make them both usable and se...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Introduction about Captcha and its types
Introduction about Captcha and its typesIntroduction about Captcha and its types
Introduction about Captcha and its types
 
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without DatabaseAn Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets Usability
 
Carp powerpoint
Carp powerpointCarp powerpoint
Carp powerpoint
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
Carp powerpoint.ppt 1
Carp powerpoint.ppt 1Carp powerpoint.ppt 1
Carp powerpoint.ppt 1
 
captcha
captchacaptcha
captcha
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 

Similar a Captcha as graphical passwords a new security primitive based on hard ai problems

Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
chandra sekhar
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
chandra sekhar
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
banda5630
 
Secure visual algorithm simulator
Secure visual algorithm simulatorSecure visual algorithm simulator
Secure visual algorithm simulator
Prachi Singhal
 

Similar a Captcha as graphical passwords a new security primitive based on hard ai problems (20)

captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...captcha as graphical passwords—a new security primitive based on hard ai prob...
captcha as graphical passwords—a new security primitive based on hard ai prob...
 
captcha as graphical passwords—a new security
captcha as graphical passwords—a new securitycaptcha as graphical passwords—a new security
captcha as graphical passwords—a new security
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AIIRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
 
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWWCAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
 
Engineering Project of Venkata Krishna
Engineering Project of Venkata KrishnaEngineering Project of Venkata Krishna
Engineering Project of Venkata Krishna
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
Secure visual algorithm simulator
Secure visual algorithm simulatorSecure visual algorithm simulator
Secure visual algorithm simulator
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 

Más de IGEEKS TECHNOLOGIES

Más de IGEEKS TECHNOLOGIES (20)

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Captcha as graphical passwords a new security primitive based on hard ai problems

  • 1. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu
  • 2. Abstract Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
  • 3. Existing System Security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. A fundamental task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable.
  • 4. Disadvantages of Existing System  This paradigm has achieved just a limited success as compared with the cryptographic primitives based on hard math problems and their wide applications.  Using hard AI (Artificial Intelligence) problems for security, initially proposed in [17], is an exciting new paradigm. Under this paradigm, the most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge.
  • 5. Proposed System We present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.We present exemplary CaRPs built on both text Captcha and image-recognition Captcha. One of them is a text CaRP wherein a password is a sequence of characters like a text password, but entered by clicking the right character sequence on CaRP images. CaRP offers protection against online dictionary attacks on passwords, which have been for long time a major security threat for various online services. This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear.
  • 6. Advantages of Proposed System  The proposed system offers reasonable security and usability and appears to fit well with some practical applications for improving online security.  This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear.
  • 7. Implementation Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
  • 8. Modules  Graphical Password  Captcha in Authentication  Thwart Guessing Attacks  Security Of Underlying Captcha
  • 9. Modules Description  Graphical Password In this module, Users are having authentication and security to access the detail which is presented in the Image system. Before accessing or searching the details user should have the account in that otherwise they should register first.
  • 10.  Captcha in Authentication It was introduced in [14] to use both Captcha and password in a user authentication protocol, which we call Captcha-based Password Authentication (CbPA) protocol, to counter online dictionary attacks. The CbPA-protocol in requires solving a Captcha challenge after inputting a valid pair of user ID and password unless a valid browser cookie is received. For an invalid pair of user ID and password, the user has a certain probability to solve a Captcha challenge before being denied access.
  • 11.  Thwart Guessing Attacks In a guessing attack, a password guess tested in an unsuccessful trial is determined wrong and excluded from subsequent trials. The number of undetermined password guesses decreases with more trials, leading to a better chance of finding the password. To counter guessing attacks, traditional approaches in designing graphical passwords aim at increasing the effective password space to make passwords harder to guess and thus require more trials. No matter how secure a graphical password scheme is, the password can always be found by a brute force attack. In this paper, we distinguish two types of guessing attacks: automatic guessing attacks apply an automatic trial and error process but S can be manually constructed whereas human guessing attacks apply a manual trial and error process.
  • 12.  Security Of Underlying Captcha Computational intractability in recognizing objects in CaRP images is fundamental to CaRP. Existing analyses on Captcha security were mostly case by case or used an approximate process. No theoretic security model has been established yet. Object segmentation is considered as a computationally expensive, combinatorially-hard problem, which modern text Captcha schemes rely on.
  • 13. Minimum Hardware Configuration of the proposed system  Processor : Intel/AMD  Speed : 1.1 GHz  RAM : 256 MB  Hard Disk : 20 GB  Key Board : Standard Keyboard  Mouse : Standard Mouse  Monitor : SVGA/LCD
  • 14. Software Configuration of the proposed system  Operating System : Windows  Java Version : JDK 1.7/1.8  Application Server : Tomcat 7/8  Front End : HTML, Java, JSP  Scripts : JavaScript  Database : MySQL 5.5  Database Connectivity : JDBC
  • 15. References  R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.  (2012, Feb.). The Science Behind Passfaces [Online]. Available: http://www.realuser.com/published/ScienceBehindPassfaces.pdf  I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.  H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.  S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.