IMPROVING AUDITORY CAPTCHA SECURITY
#1

Presented by:
SANDEEP MEHTA

[attachment=13022]
IMPROVING AUDITORY CAPTCHA SECURITY
Introduction
CAPTCHA
A common type of CAPTCHA requires the user to type the letters of a distorted image sometimes with the addition of an obscured sequence of letters or digits appears on screen.
This string which the user has to type to submit a form .This is a simple problem for humans, but a very hard problem for computers which have to use character recognition, because the displayed string is alienated in a way, which makes it very hard for a computer to decode.
CAPTCHA
A program that can generate and grade tests that:
1. Most humans can pass
2. Current computer programs cannot pass
The concept of a CAPTCHA is motivated by real-world problems faced by internet companies such as Yahoo! and AltaVista.
These companies offer free email accounts, intended for use by humans.
However, they found that many online vendors were using "bots", computer programs that would sign up for thousands of email accounts, from which they could send out masses of junk email.
Text Based CAPTCHAs
Gimpy, ez-gimpy
Pick a word or words from a small dictionary
Distort them and add noise and background
Gimpy-r, Google’s CAPTCHA
Pick random letters
Distort them, add noise and background
Simard’s HIP
Pick random letters and numbers
Distort them and add arcs
Text Based CAPTCHAs
Graphic Based CAPTCHAs
Bongo
Display two series of blocks
User must find the characteristic that sets the two series apart
User is asked to determine which series each of four single blocks belongs to
Difference? thick vs. thin lines
Image CAPTCHA
Provide the user with a series of images
Ask the user to:
Identify a picture matching a description
Identify a common theme to the images
Requires huge databases of images with metadata to provides sets.
Graphic Based CAPTCHAs
Constructing CAPTCHAs
Breaking CAPTCHAs
Most text based CAPTCHAs have been broken by software
OCR

Other CAPTCHAs were broken by streaming the tests for unsuspecting users to solve.
Criticism
Exclusionary to Users with disabilities.
No official standards or ruling body for creation of CAPTCHA algorithms.
Difficult user interactions.
No published for proper implementation of algorithms
Security
Very hard to balance effectiveness of CAPTCHA and usability.
Difficult for programmer to identify bad CAPTCHA algorithms.
Researchers frequently break seemingly strong CAPTCHA.
Algorithms possibility protected under DMCA.
Summary
CAPTCHA do not provide individual authentication.
CAPTCHA cannot stop extravagant exploits that utilize humans.
In some situations user authentication is more suited.
CAPTCHA are difficult to design.
CAPTCHA are effective in reducing spam and automated attacks.
Principles
The principles behind CAPTCHA are as follows:
The user is presented with a garbled image on which some text is displayed. This image is generated by the server using random text.
The user must enter the same letters in the text into a text field that is displayed on the form to protect.
When the form is submitted, the server checks if the text entered by the user matches the initial generated text. If it does, the transaction continues. Otherwise, an error message is displayed and the user has to enter a new code.
Applications
Online polls
Protecting Website Registration
Preventing Comment Spam in Blogs.
Search Engine Bots
Worms and Spam
Prevent Dictionary attacks
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on improving atm security via atm security, captcha effectiveness, free ieee paper captcha security, 3d captcha animation, full seminar topic on captcha, management auditory hallucinations, infostrada jdownloader,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,146 31-01-2015, 11:55 PM
Last Post: Guest
  Android Mobile Security – An Issue of Future computer girl 2 2,390 24-08-2013, 10:26 AM
Last Post: computer topic
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,729 06-02-2013, 10:02 AM
Last Post: seminar details
Music CELL PHONE VIRUSES AND SECURITY Computer Science Clay 10 10,805 11-10-2012, 08:12 PM
Last Post: jerrysamon
  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM computer girl 1 1,594 06-10-2012, 01:26 PM
Last Post: seminar details
  Wireless LAN Security computer science crazy 1 2,718 24-02-2012, 12:21 PM
Last Post: seminar paper
  information security using steganography seminar class 1 1,671 13-02-2012, 02:48 PM
Last Post: seminar paper
  BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) computer science crazy 18 22,051 26-01-2012, 10:47 AM
Last Post: seminar addict
  GSM Mobile Security presentation project report maker 7 5,484 24-01-2012, 10:05 AM
Last Post: seminar addict
Thumbs Down GSM Security And Encryption Computer Science Clay 8 7,041 16-01-2012, 11:17 AM
Last Post: seminar addict

Forum Jump: