Open Access   Article Go Back

Against Spyware by Captcha in Graphical Pin Arrangement

P.Arthy 1 , J.Revathi 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 165-172, Jan-2015

Online published on Jan 31, 2015

Copyright © P.Arthy , J.Revathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.Arthy , J.Revathi, “Against Spyware by Captcha in Graphical Pin Arrangement,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.165-172, 2015.

MLA Style Citation: P.Arthy , J.Revathi "Against Spyware by Captcha in Graphical Pin Arrangement." International Journal of Computer Sciences and Engineering 3.1 (2015): 165-172.

APA Style Citation: P.Arthy , J.Revathi, (2015). Against Spyware by Captcha in Graphical Pin Arrangement. International Journal of Computer Sciences and Engineering, 3(1), 165-172.

BibTex Style Citation:
@article{_2015,
author = {P.Arthy , J.Revathi},
title = {Against Spyware by Captcha in Graphical Pin Arrangement},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {165-172},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=383},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=383
TI - Against Spyware by Captcha in Graphical Pin Arrangement
T2 - International Journal of Computer Sciences and Engineering
AU - P.Arthy , J.Revathi
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 165-172
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2564 2363 downloads 2560 downloads
  
  
           

Abstract

Text-founded pin systems have inherent refuge then us capability problems, leading to the growth of graphical pin schemes. However, most of these alternate systems are vulnerary intelligent to spyware attacks. We proposal a new scheme, by captcha (finally involuntary communal Turing examinations to tell processors then persons apart) thon retaining the compensations of graphical pin schemes, smooth nevertheless competently raising the charge of opponents via guidelines of magnitude. Furthermore, sure primary trials are led then the results indicate then the capability should be healthier in the upcoming work.

Key-Words / Index Term

Graphical Password; CAPTCHA; Spyware; Validation

References

[1] Eljetlawi, A.M. ; Centre for Adv. Software Eng. (CASE), Univ. Teknol. Malaysia, Kuala Lumpur ; Ithnin, N.” Graphical Password: Comprehensive Study of the Usability Features of the Recognition Base Graphical Password Methods”,Published in:Convergence andHybrid formation Technology, 2008. ICCIT '08. Third International Conference on (Volume:2) Date of Conference:11-13 Nov. 2008Page(s):1137 – 1143.
[2] Eljetlawi, A.M. ; Fac. of Eng., Univ. of Tajoura, Tripoli, Libya.” Graphical password: Existing recognition base graphical password usability”,Published in:Networked Computing (INC), 2010 6th International Conference onDate of Conference:11-13 May 2010Page(s):1 – 5.
[3] Aljahdali, Hani Moaiteq ; Poet, Ron.” Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords”,Published in:Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on Date of Conference:24-26 Sept. 2014 Page(s):973 – 982.
[4] Yuxin Meng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China.” Designing Click-Draw Based Graphical Password Scheme for Better Authentication”,Published in:Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on Date of Conference:28-30 June 2012 Page(s):39 – 48.
[5] Aljahdali, H.M. ; Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK ; Poet, R.” The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom”,Published in:Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on Date of Conference:16-18 July 2013 Page(s):1528 – 1534.
[6] Chandavale, A. ; Dept. of E&T/C, Univ. of Pune, Pune, India ; Sapkal, A.” An Improved Adaptive Noise Reduction for Secured CAPTCHA”,Published in:Emerging Trends in Engineering and Technology (ICETET), 2011 4th International Conference on Date of Conference:18-20 Nov. 2011 Page(s):12 – 17.
[7] Hamid Ali, Firkhan Ali Bin ; Dept. Web Technology, FSKTM, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia ; Karim, Farhana Bt.” Development of CAPTCHA system based on puzzle”,Published in:Computer, Communications, and Control Technology (I4CT), 2014 International Conference on Date of Conference:2-4 Sept. 2014 Page(s):426 – 428.
[8] Quan-Bin Ye ; Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan ; Te-En Wei ; Jeng, A.B. ; Hahn-Ming Lee.” DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks”,Published in:Technologies and Applications of Artificial Intelligence (TAAI), 2013 Conference on Date of Conference:6-8 Dec. 2013Page(s):158 – 163.
[9] Te-En Wei ; Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan ; Jeng, A.B. ; Hahn-Ming Lee.” GeoCAPTCHA — A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack”,Published in:Performance Computing and Communications Conference (IPCCC), 2012 IEEE 31st International Date of Conference:1-3 Dec. 2012Page(s):392 – 399.
[10] Tamang, T. ; Dept. of Math. & Comput. Sci., Chulalongkorn Univ., Bangkok, Thailand ; Bhattarakosol, P.” Uncover impact factors of text-based CAPTCHA identification”,Published in:Computing and Convergence Technology (ICCCT), 2012 7th International Conference onDate of Conference:3-5 Dec. 2012Page(s):556 – 560.
[11] Ming-Wei Wu ; Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei ; Yennun Huang ; Yi-Min Wang ; Sy-Yen Kuo.” A Stateful Approach to Spyware Detection and Removal”,Published in:Dependable Computing, 2006. PRDC '06. 12th Pacific Rim International Symposium onDate of Conference:Dec. 2006Page(s):173 – 182.
[12] Shams, R. ; Dept. of Electron. Eng., Sir Syed Univ. of Eng. & Technol., Karachi, Pakistan ; Farhan, M. ; Khan, S.A. ; Hashmi, F.” Comparing Anti-Spyware products — A different approach”,Published in:Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International (Volume:1 )Date of Conference:20-22 Aug. 2011Page(s):75 – 80.
[13] Chandrasekaran, M. ; Comput. Sci. & Eng., Buffalo Univ., NY ; Vidyaraman, S. ; Upadhyaya, S.” SpyCon: Emulating User Activities to Detect Evasive Spyware”,Published in:Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa Date of Conference:11-13 April 2007 Page(s):502 – 509.
[14] Ming-Wei Wu ; Nat. Taiwan Univ., Taipei ; Yi-Min Wang ; Sy-Yen Kuo ; Yennun Huang.” Self-Healing Spyware: Detection, and Remediation”,Published in:Reliability, IEEE Transactions on (Volume:56 , Issue: 4 )Page(s):588 – 596.
[15] Xiaoqiao Wang ; Manage. Dept., Hunan Univ. of Sci. & Technol., Xiangtan, China ; Juanjuan Chen.” Interests-Based Spyware Detection”,Published in:Computer Science-Technology and Applications, 2009. IFCSTA '09. International Forum on (Volume:2 )Date of Conference:25-27 Dec. 2009Page(s):175 – 178.
[16] Chuang Gu ; Dept. of Equip. Command & Manage., Ordnance Eng. Coll., Shijiazhuang, China ; Xisheng Jia ; Bing Liu ; Guiqi Wang.”Notice of RetractionResearch on validation method of dynamic action of equipment maintenance support simulation conceptual model”,Published in:Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013 International Conference on Date of Conference:15-18 July 2013 Page(s):1379 – 1382.
[17] Mo Chen ; Coll. of Comput., Hangzhou Dianzi Univ., Hangzhou ; Ning Zheng ; Ming Xu ; Yongjian Lou.” Validation Algorithms Based on Content Characters and Internal Structure: The PDF File Carving Method”,Published in:Information Science and Engineering, 2008. ISISE '08. International Symposium on (Volume:1 )Date of Conference:20-22 Dec. 2008 Page(s):168 – 172.
[18] Fei-Yan Min ; Control & Simulation Center, Harbin Inst. of Technol. ; Ming Yang ; Zi-Cai Wang.” An Intelligent Validation System of Simulation Model”,Published in:Machine Learning and Cybernetics, 2006 International Conference on Date of Conference:13-16 Aug. 2006 Page(s):1459 – 1464.
[19] Bojan, T. ; Israel Design Center, Intel Corp., Haifa ; Frumkin, I. ; Mauri, R.” Intel First Ever Converged Core Functional Validation Experience: Methodologies, Challenges, Results and Learning”,Published in:Microprocessor Test and Verification, 2007. MTV '07. Eighth International Workshop onDate of Conference:5-6 Dec. 2007 Page(s):85 – 90.
[20] Knauf, R. ; Dept. of Comput. Sci. & Autom., Tech. Univ. of Ilmenau ; Tsuruta, S. ; Gonzalez, A.J.” Toward Reducing Human Involvement in Validation of Knowledge-Based Systems”,Published in:Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on (Volume:37 , Issue: 1 )Page(s):120 – 131.