Captcha as Graphical Passwords- A New Security
Primitive Based on Hard AI Problems
Abstract- User authentication has become one of the important topics in information security. Many graphical password schemes have been proposed, which are used to improve password usability and security. In this paper, we present a new approach to solve the hard AI problems, namely, graphical passwords are combined with Captcha technique, which will be referred them as Captcha as graphical password otherwise we call it as CaRP. CaRP solves security problems such as online dictionary attacks, relay attacks and shoulder-surfing attacks combined with dual-view technologies. Captcha as graphical passwords also offers an efficient approach to address the well-known image hotspot problem in popular graphical password systems, such as Pass-Points. CaRP also offers primitive scheme to provide reasonable and usability security to improve online security.
Keywords-Password, Captcha, CaRP, Graphical password, PassPoints, dictonary attack, relay attack, online security.
1. INTRODUCTION
Security is imperative factor in today’s world. Most of the daily activities such as education, searching are dispensed through the web. It is fundamental for getting to private information and security parameters. The most important fundamental is authentication to ensure data security issue is that the trouble of recollecting passwords provided by user. Studies have demonstrated that clients have a tendency to pick
An important field in computer science today is artificial intelligence. The novel approaches that computer scientists use in this field are looked to for answers to many of the problems that have not been solved through traditional approaches to software engineering thus far. One of the concepts studied and implemented for a variety of tasks in artificial intelligence today is neural networks; they have proven successful in offering an approach to some problems in the field, but they also have some failings.
Artificial intelligence is a beneficial form of technology used daily by humans around the world, and is widespread across society. It is used in almost every field of our lives, from our phones, to our food, and is devoted to making our day-to-day life easier. However, there is much debate worldwide about whether this technology is truly beneficial or not for society, as some choose to believe that it is doing more harm than good. Artificial intelligence (AI) is usually defined as the science of making computers do things that require intelligence when done by humans. We use Artificial intelligence every day, from Siri, a handheld assistant on most phones, to the video games we play to pass time, even self driving cars are considered
Numerous methods have been proposed that would try to alleviate the inferior characteristics associated with text-based passwords such as time for the user and cost to the organization, password retention, and propensity to create security risks. Among these methods, passive authentication uses various biometric approaches for continuous authentication of the user’s identity. This involves combinations of methods such as keystroke dynamics, pulse-response biometrics, retinal scanning, hand geometry, fingerprint scanning, and monitoring a user’s behavior. (Li, Clarke, Papadaki, & Dowland, 2014).
In the last decade, the global web has become increasingly popular due to many reasons. Social networking and being able to use apps on smartphones to purchase items from high end retail stores has impacted both the growth of the internet and the economy. However, to use most these services users would first need to register and input personal information which could include name, address, and financial information as well as other highly important data which is being collected by governments and private companies. In recent years, there have been many hacking scandals on huge retail companies which has led to the exploitation of millions of customer’s information, this has therefore affected peoples trust on how secure their information is.
Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest
One of the greatest problems that we experience in our daily lives that has been brought upon us by Information Technology (IT) are security problems, these include but are not limited to weak passwords, the same password for everything, viruses, and lost PDA’s. These problems are dangerous and put the business in a state of vulnerability where they are more liable to be hacked.
For decades the password is known as the most common using type of authentication. It is explained as “word” which known to an user and a computer (Pfleeger et al, 2006). According to Pfleeger et al (2006) it might contain some information that the users provide or sometimes it can be chosen automatically by the system. It can be seen that choosing password is essential in terms of security and convenience for the users. However, it has some weaknesses such that it could be less secure and easy to guess.
One of the most biased and controversial topics in the field of philosophy is that of a statement, and the questioning of "Can a machine know." The problems associating and surrounding this topic are endless, because of all the different biases, reasonable and skeptical thoughts that people contribute to the discussions. On an occasion when this turmoil question comes up an individual might be comparing and thinking that a plain toaster is a machine which is true and yet someone else compares the newest breakthrough in technology such as a robot and they might say that its "knows" what it is doing. However in the end of each discussion there is a doubt, this simple emotion, this chemical imbalance that makes you think of what you just
The essay will briefly introduce the concept of the ‘delegation’ and think about the relationship amongst the smart technology assemblage and people. Then, it will put more empathises on critically analysing two primary types of the intelligent agent, which transforms our life, although it has led to some criticisms including privacy and people are labelled as a “lesser being”. At the end, the essay will look forward to the development of the intelligent agent in the near future.
Graphical passwords is harder to guess or broken by brute force. If the number of possible pictures is sufficiently large, the possible password space of a graphical pass-word scheme may exceed that of text-based schemes and thus most probably offer improved security against dictionary attacks. The use of graphical password methods is gaining awareness because of these advantages. Graphical passwords were originally described by Blonder. In his description, an image would appear on the screen, and the user would click on a few chosen regions of it. If the correct regions were clicked in, the user would be
Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. Here, we propose 4-D Password scheme to make the existing scheme even more robust and powerful. We propose to different authentication scheme to one system, and this will lend more stability and make the attacks on user privacy even more difficult to succeed in. We proposed a system with graphical password scheme, Color code authentication, OTP based authentication, and Time Elapse Authentication scheme composed as a 4-D Authentication system.
The internet has been a wide usage in all the fields in the present competitive world. It is being used in the education, research, business and what not, in everything. But providing security for the users information or transactions or any other data in any of the field has become a paramount. This paper gives a vivid picture of “E-commerce” and the vulnerabilities they are facing in providing a secure system for the users. In other words, how the security attacks are made either by the hackers or the intruders, the ways how they attack and exploit to illegitimate means.
Up till now many shoulder surfing resistant graphical password schemes have been proposed. However, as most of the users are more familiar with textual passwords than the pure graphical passwords scheme therefore the text-based graphical password schemes have been proposed. But none of the existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colors because of that the user can easily and efficiently login system. Next, we provide the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. Now we propose a technique that is 3D password with session based technique for login security in smart phone means we are going to use two level authentications that is simple text based shoulder surfing graphical password as a first level. Whenever we are going to login in smart phone there is one circle occur with multiple random color and circle divided into eight sector which contain characters and alphanumerical which we select as a password. And 3D images as a second level in which whenever user going to start a session in smart phone, number of time 3D images will be change but object will be same which is used as a password on 3D images, which provide more security to the user in smart phone.
So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).
Visual Password means instead of alphabetically or numerically word use picture. By using picture it can be assembled that, it will be more convenient to remember password then word [1]. The importance of visual password is there is two ways how people cryptograph image in their mind, one is visual configuration & lexical description of the picture and another one is picture stored in human brain more comprehensively & it retrieve very easily quickly from memory. For support authentication there have various ways & thus can be classified in three group. This three group are Searchmetric, Locimetric and Drawmetric [1-3]. In the Searchmetric system user have to select a number of picture from a picture set which contains a authentication key & some distractors. On the other hand in Locimetric system, user need to remember & be able to point at a number of position in a picture. The difference between Searchmetric system & Locimetric system is, in Locimetric system only one picture is use at authentication & maximum time that image is chooses by user. But in Drawmetric system user need to draw a sketch which must be matched with user draw in before and this task have to draw during authentication time. But there is another way which is facial graphical password where user are allowed to select a face that password is make up by that face [2]. Even occasionally recall based graphical password system is referred as drawmetric password because a secret drawing is reproduce &