Open Access Open Access  Restricted Access Subscription or Fee Access

Security Using Captcha as a Graphical Password

Sahadeo Bhogil, Aishwarya Kadam, Omkar Warke, Karishma Bhavsar, Rupali Chopade

Abstract


Many security primitives are totally based on hard mathematical problems. With the help of hard AI problems, security is emerging as an exciting new paradigm. In this paper, we present a new security   technique that is  basically based on hard AI problems, namely graphical password systems and  which is built on top of Captcha technology, which we defined as Captcha as graphical passwords (CaRP). It is actually both a Captcha and a graphical password scheme. We design CaRP technique to provide a security for cloud such access and data on cloud and can be useful in many other cases. CaRP provide a number of security problems, such as online guessing attacks, shoulder-surfing & relay attacks. So that we provide three levels for the security purpose such as level1, level2 and level3. And also data on the cloud is making more secure by using encryption algorithms so main advantage is it provide robust security.

Level 1: It consist of simple click on image, image is made up of alphanumeric password.

Level 2: It consists of the click on image from the image grid.

Level 3: It consists of the image and numbers on the image grid.

CaRP offers reasonable security, usability & it’s appears to fit well with some applications for improving better online security. In this we mainly focus on making cloud more secure using this new paradigm CaRP.


Keywords


CaRP(Captcha As Graphical Password), (CbPA) Captcha-based Password Authentication, Captcha, Graphical Password, (IRC) Image-Recognition Captcha, Security Primitive.

Full Text:

PDF

References


R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.

(2012, Feb.). The Science Behind Passfaces [Online]. Available: http://www.realuser.com/published/ScienceBehindPassfaces.pdf

I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.

H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.

S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.

Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, Captcha as Graphical Passwords—A New SecurityPrimitive Based on Hard AI Problems IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 6, JUNE 2014 891

K. Golofit, “Click passwords under investigation,” in Proc. ESORICS, 2007, pp. 343–358.

A. E. Dirik, N. Memon, and J.-C. Birget, “Modeling user choice in the passpoints graphical password scheme,” in Proc. Symp. Usable Privacy Security, 2007, pp. 20–28.

S. Karthika, Dr. P. Devaki, “An Efficient user Authentication using Captcha and graphical passwords- a Survey”, International Journal of Science and Research (IJSR), Volume 3 Issue 11,November 2014

Ved Prakash Singh, Preet Pal, “Survey of Different Types of CAPTCHA”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.

P. C. van Oorschot and J. Thorpe, “Exploiting predictability in clickbased graphical passwords,” J. Comput. Security, vol. 19, no. 4, pp. 669–702, 2011.

B. Zhu et al., “Attacks and design of image recognition CAPTCHAs,” in Proc. ACM CCS, 2010, pp. 187–200

J. Birget, D. Hong, and N. Memon. Graphical Passwords based on robust discretization. IEEE Transactions on Information Forensics and Security, 1(3):395–399, 2006.

B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proc. ACM CCS, 2002, pp. 161–170.

Jeff Yan, Ahmad Salah El Ahmad, "Captcha Robustness: A Security Engineering Perspective," IEEE Computer, vol. 44, no. 2, pp. 54-60, 2011.

M. Alsaleh, M. Mannan, and P. C. van Oorschot, “Revisiting defenses against large-scale online password guessing attacks,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128–141, Jan./Feb. 2012.

L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “CAPTCHA: Using hard AI problems for security,” in Proc. Eurocrypt, 2003, pp. 294–311.

S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical password authentication using cued click points,” in Proc. ESORICS, 2007, pp. 359–374.

S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, “Influencing users towards better passwords: Persuasive cued click-points,” in Proc.Brit. HCI Group Annu. Conf. People Comput., Culture, Creativity, Interaction, vol. 1. 2008, pp. 121–130.

D. Davis, F. Monrose, and M. Reiter, “On user choice in graphical password schemes,” in Proc. USENIX Security, 2004, pp. 1–11.

L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “CAPTCHA: Using hard AI problems for security,” in Proc. Eurocrypt, 2003, pp. 294–311

P. Dunphy and J. Yan, “Do background images improve ‘Draw a Secret’ graphical passwords,” in Proc. ACM CCS, 2007, pp. 1–12.

B. B. Zhu et al., “Attacks and design of image recognition CAPTCHAs,” in Proc. ACM CCS, 2010, pp. 187–200.

K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, “Computers beat humans at single character recognition in reading-based human interaction proofs,” in Proc. 2nd Conf. Email Anti-Spam, 2005, pp. 1–3.

K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, “Building segmentation based human-friendly human interaction proofs,” in Proc. 2nd Int. Workshop Human Interaction Proofs, 2005, pp. 1–10.

J. Bonneau, “The science of guessing: Analyzing an anonymized corpus of 70 million passwords,” in Proc. IEEE Symp. Security Privacy, Jun. 2012, pp. 20–25.


Refbacks

  • There are currently no refbacks.