Graphical Authentication using Captcha (A New Security Initiative Based on Hard AI problem)
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
Now a day’s security is an very important issue. The traditional security systems are easily hackable. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security method which works on hard AI problems; we provide a graphical password systems and Captcha technology together, which we call Graphical Authentication using Captcha (RAC). RAC is both a Captcha and a graphical password scheme. RAC addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and. Notably, a RAC password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. RAC also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. RAC is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Authors and Affiliations
Waheeda Chandbadshah Akkalkot, Dr. Ramesh K, Dhananjay Potdar
Ant Colony Optimization Algorithm
Hybrid algorithm is proposed to solve combinatorial optimization problem by using Ant Colony and Genetic programming algorithms. Evolutionary process of Ant Colony Optimization algorithm adapts genetic operations to enh...
Multivariate Correlation Analysis for Detection of Denial-Of-Service Attack
In networking systems, many Web servers, Database servers, Cloud computing servers and so on, are now under threats from network attackers. One of most common types of attack is denial-of-service (DoS) attacks which cau...
FPGA Implementation of Lightweight Cryptographic Algorithms-A Survey
Ever-present computing is new era of computing and it needs lightweight cryptographic algorithms for security and confidentiality. Lightweight cryptography is used for resource limited devices such as radio frequency id...
Identification of Factors Inhibiting Human Resource Development and Productivity Improvement in Indian Construction Firms
The motіve of thіs research іs to boost human resource development approach, declіne the mіsmatch between requіred and avaіlable skіlled labor and to dіscuss the sіgnіfіcance of іgnorіng tіhe appeal of craftsmen. Perhap...
Effect of Treated and Untreated Textile Effluent on the Strength, Plasticity and pH characteristics of Kaolinite Clay
Both solid and liquid wastes are increasingly getting mixed up with soils leading to a change in soil environment. These in turn changes the geotechnical properties of soil. Among the liquid and solid wastes, liquid was...