Carp A Novel Approach To Address The Well-Known Image Hotspot Problem In Popular Graphical Password Systems

Nalluri. V.V.Prasad, Y.Adi Lakshmi

Abstract


In a novel safety pre-historic based on hard AI problems, that is, a new relations of graphical password systems put together Captcha knowledge, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical passwords, where a series of clicks on a picture is used to gain a password. Different other click-based graphicalpasswords, images used in CaRP are Captcha confront, and a new CaRP image is make for every login effort. Captcha is now a criterion Internet security method to defend onlineemail and other services from creaturebattered by bots. This new concept has get just anincompleteachievement as evaluate with the cryptographic primitives basedon solid math problems and their extensive applications. This is a demanding and motivating open trouble.


References


R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords:Learning from the first twelve years,” ACM Comput. Surveys, vol. 44,no. 4, 2012.

(2012, Feb.). The Science BehindPassfaces[Online]. Available:http://www.realuser.com/published/ScienceBehindPassfaces.pdf

I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The designand analysis of graphical passwords,” in Proc. 8th USENIX SecuritySymp., 1999, pp. 1–15.

H. Tao and C. Adams, “Pass-Go: A proposal to improve the usability ofgraphical passwords,” Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292,2008.

S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon,“PassPoints: Design and longitudinal evaluation of a graphical passwordsystem,” Int. J. HCI, vol. 63, pp. 102–127, Jul. 2005.

P. C. van Oorschot and J. Thorpe, “On predictive models and userdrawngraphical passwords,” ACM Trans. Inf. Syst. Security, vol. 10,no. 4, pp. 1–33, 2008.

K. Golofit, “Click passwords under investigation,” in Proc. ESORICS,2007, pp. 343–358.

A. E. Dirik, N. Memon, and J.-C. Birget, “Modeling user choice in thepasspoints graphical password scheme,” in Proc. Symp. Usable PrivacySecurity, 2007, pp. 20–28.

J. Thorpe and P. C. van Oorschot, “Human-seeded attacks and exploitinghot spots in graphical passwords,” in Proc. USENIX Security, 2007,pp. 103–118.

P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe, “Purely automatedattacks on passpoints-style graphical passwords,” IEEE Trans. Inf.Forensics Security, vol. 5, no. 3, pp. 393–405, Sep. 2010.

P. C. van Oorschot and J. Thorpe, “Exploiting predictability in clickbasedgraphical passwords,” J. Comput. Security, vol. 19, no. 4,pp. 669–702, 2011.

T. Wolverton. (2002, Mar. 26). Hackers Attack eBay Accounts[Online]. Available: http://www.zdnet.co.uk/news/networking/2002/03/26/hackers-attack-ebay-accounts-2107350/

HP TippingPointDVLabs, Vienna, Austria. (2010). Top Cyber SecurityRisks Report, SANS Institute and Qualys Research Labs [Online].Available: http://dvlabs.tippingpoint.com/toprisks2010

B. Pinkas and T. Sander, “Securing passwords against dictionaryattacks,” in Proc. ACM CCS, 2002, pp. 161–170.

P. C. van Oorschot and S. Stubblebine, “On countering online dictionaryattacks with login histories and humans-in-the-loop,” ACM Trans. Inf.Syst. Security, vol. 9, no. 3, pp. 235–258, 2006.

Bin B. Zhu, Jeff Yan, GuanboBao, Maowei Yang, and NingXu” Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems” IEEE transactions on Information


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.