Open Access Open Access  Restricted Access Subscription or Fee Access

Secured New Generation CAPTCHA to Prevent BOTS and SPAMS

B. Suganya, R. Vaishnavi

Abstract


Today the Internet is now becoming a part of our everyone lives. Many services, including Emails, Search engine, and web board on Internet, are provided with free of charge and unintentionally turns them into vulnerability services. Many software robots or, in short term, bots are developed with purpose to use such services illegally and automatically. Thus, web sites employ human authentication mechanism called Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA) to counter this attack. Nowadays sending spam’s has turned to be a major problem in the Internet. So the spam’s are also born on the mobile phones as the form of SMS (Short Message Service) spam’s and Email Spam. In this paper a new method is proposed for filtering SMS spam’s using CAPTCHA systems. In our existing method 3D CAPTCHA are used. In our proposed method first, the picture of an object is sent as an SMS picture message, second the CAPTCHA characters are rotated in anti-clockwise and clockwise directions with fuzzy words.


Keywords


Bots, Spam, CAPTCHA, 3d Characters, Rotating with Directions, Fuzzy

Full Text:

PDF

References


Montree Imsamai and Suphakant Phimoltares, “3D CAPTCHA”, A Next Generation of the CAPTCHA, IEEE 2010.

Prof. (Mrs.) A.A. Chandavale and Prof. Dr.A.M. Sapkal Member, Algorithm for secured online authentication using CAPTCHA, IEEE and Member, IETE, IEEE 2010.

G Mori and J Malik, “Recognising objects in adversarial clutter: breaking a visual CAPTCHA”, IEEE Conference on Computer Vision & Pattern Recognition (CVPR), 2010, IEEE Computer Society.

M. Hassan Shirali-Shahreza and Mohammad Shirali-Shahreza, “An Anti-SMS-Spam Using CAPTCHA”, IEEE 2008.

Ibrahim Furkan Ince, Ilker Yengin, Yucel Batu Salman, Hwan-Gue Cho, Tae-Cheon Yang, “Designing CAPTCHA Algorithm: Splitting and Rotating the Images against OCRs”, IEEE 2008.

M. Blum, L. von Ahn, and J. Langford, The CAPTCHA Project, (Completely Automatic Public Turing Test to tell Computers and Humans Apart), School of Computer Science, Carnegie-Mellon University, November 2000.

M. Chew and H. S. Baird, "BaffleText: a Human Interactive Proof," Proceedings of the 11th SPIE/IS&T Document Recognition and Retrieval Conference (DRR2003), Santa Clara, CA, 2003, pp. 305-317.

H.S. Baird and T. Riopka, "ScatterType: a Reading CAPTCHA Resistant to Segmentation Attack," Proceedings of the IS&T/SPIE Document Recognition & Retrieval XII Conference, CA, 2005.

Wei Yu and Xun Wang and Xinwen Fu and Dong Xuanand Wei Zhao “An Invisible Localization Attack to Internet Threat Monitors” IEEE Parallel and Distributed Systems,vol. 20,no 11,pp 1611-1625 , Nov 2009

Olalekan Adeyinka, "Internet Attack Methods and Internet Security Technology," IEEE Networking,vol.0 , no.1 ,pp77-82 , 2008

M. Hassan Shirali-Shahreza , Mohammad Shirali-Shahreza “An Anti-SMS-Spam Using CAPTCHA” 2008

ISECS International Colloquium on Computing, Communication, Control, and Management IEEE Computer Society

K. Jain, R. Duin, and J. Mao, “Statistical Pattern Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, Jan. 2000.

J Yan and A S El Ahmad. “Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms”, in IEEE Conference Proc. of the 23rd Annual Computer Security Applications Conference (ACSAC’07).

K Chellapilla, K Larson, P Simard, M Czerwinski, “Computers beat humans at single character recognition in reading-based Human Interaction Proofs”, 2nd Conference on Email and Anti-Spam (CEAS), 2005. Gabriel Moy, Nathan Jones, Curt Harkless, and Randall Potter “Distortion Estimation Techniques in Solving Visual CAPTCHAs” proceedings of the Computer Vision and Pattern Recognition (CVPR’04) Conference ,IEEE Computer Society ,vol. 2 ,pp.23-28,2004.

Kumar Chellapilla Patrice Y. Simard “Using Machine Learning to Break Visual Human Interaction Proofs (HIPs) ” in L. K.Saul, Y. Weiss, and L. Bottou, editors, Advances in Neural Information Processing Systems 17, pp. 265–272. MIT Press,Cambridge, MA, 2005.

L von Ahn, M Blum and J Langford. “Telling Humans and Computer Apart Automatically”, CACM (Communications of ACM), V47, No2, February2004.

G Mori and J Malik. “Recognising objects in adversarial clutter: breaking a visual CAPTCHA”, IEEE Conference on Computer Vision & Pattern Recognition (CVPR), 2003, IEEE Computer Society, vol. 1, June 18-20, 2003.

B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proc. of the 9th CCS, V. Atluri, Ed. ACM Press, Nov. 2002, pp. 161–170.

Simon Haykin, Neural Networks: A comprehensive foundation, 2ndEdition, Prentice Hall, 1998

Anil K. Jain, Jianchang Mao, K. M.Mohiuddin, Artificial Neural Networks: A Tutorial, Computer, v.29 n.3, p.31-44, March 1996.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.