AI Based Security Mechanism Using Captcha as Graphical Password
V.Surekha 1 , S.K.Murugaraja 2
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-9 , Page no. 320-321, Sep-2015
Online published on Oct 01, 2015
Copyright © V.Surekha , S.K.Murugaraja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: V.Surekha , S.K.Murugaraja, “AI Based Security Mechanism Using Captcha as Graphical Password,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.320-321, 2015.
MLA Citation
MLA Style Citation: V.Surekha , S.K.Murugaraja "AI Based Security Mechanism Using Captcha as Graphical Password." International Journal of Computer Sciences and Engineering 3.9 (2015): 320-321.
APA Citation
APA Style Citation: V.Surekha , S.K.Murugaraja, (2015). AI Based Security Mechanism Using Captcha as Graphical Password. International Journal of Computer Sciences and Engineering, 3(9), 320-321.
BibTex Citation
BibTex Style Citation:
@article{_2015,
author = {V.Surekha , S.K.Murugaraja},
title = {AI Based Security Mechanism Using Captcha as Graphical Password},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {320-321},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=692},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=692
TI - AI Based Security Mechanism Using Captcha as Graphical Password
T2 - International Journal of Computer Sciences and Engineering
AU - V.Surekha , S.K.Murugaraja
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 320-321
IS - 9
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2537 | 2459 downloads | 2454 downloads |




Abstract
Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologiDDes, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as Pass Points, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Key-Words / Index Term
CaRP,technologiDDes,AI,Captcha,Cryptosystem
References
[1]. R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[2]. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., 1999, pp. 1–15.
[3]. H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability of graphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
[4]. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal evaluation of a graphical password system,” Int. J. HCI, vol. 63, pp. 02–127, Jul. 2005.
[5]. K. Golofit, “Click passwords under investigation,” in Proc. ESORICS, 2007, pp. 343– 58.
[6]. A. E. Dirik, N. Memon, and J.-C. Birget, “Modeling user choice in the passpoints Graphical password scheme,” in Proc. Symp. Usable Privacy Security, 2007, pp. 20–28.