248 resources related to Captchas
- Topics related to Captchas
- IEEE Organizations related to Captchas
- Conferences related to Captchas
- Periodicals related to Captchas
- Most published Xplore authors for Captchas
No organizations are currently tagged "Captchas"
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
SoutheastCon is the annual Region 3 conference that brings together engineering professionals, students, and volunteers for a weekend of technical presentations, meetings, student competitions, and volunteer education.
IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 14th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “Internet of Things as System of Systems”. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.
The 18th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutionsadopted.
The HSI conference will cover research topics related to the traditional combination of hardware, software and human factors as well as theories and methods of psychology, and communication. The conference will focus not only on theories but also on practical insights related to Human System Interaction. HSI is widely applicable to all types of human activity including manufacturing, transport, supply chain, medical treatment , personal care (aged care, the elderly , the disabled), tele-health, education, business, government, the household and remote monitoring and control. Additionally, there are many new research areas open to Human System Interaction. During the conference we would like to inspire and provoke the audience to work on new ideas and solutions that could become standards for future Human System Interaction applications.
No periodicals are currently tagged "Captchas"
2014 International Conference on Reliability Optimization and Information Technology (ICROIT), 2014
Internet has changed the way of communication, which has become more and more concentrated on emails. Emails, text messages and online messenger chatting have become part and parcel of our lives. Out of all these communications, emails are more prone to exploitation. Thus, various email providers employ algorithms to filter emails based on spam and ham. In this research paper, ...
2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG), 2015
Data security assurance through a web or standalone application implies the development of security technologies and methods. User authentication, a security technology, allows access to data and information only to users which have an account and a password. Besides the well-known passwords users can chose other different authentication methods, i.e. electronic identity cards, smart cards or biometric methods, all of ...
2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), 2016
Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs ...
2018 International Conference on Information and Computer Technologies (ICICT), 2018
DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. ...
2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014), 2014
Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the ...
Internet has changed the way of communication, which has become more and more concentrated on emails. Emails, text messages and online messenger chatting have become part and parcel of our lives. Out of all these communications, emails are more prone to exploitation. Thus, various email providers employ algorithms to filter emails based on spam and ham. In this research paper, our prime aim is to detect text as well as image based spam emails. To achieve the objective we applied three algorithms namely: KNN algorithm, Naïve Bayes algorithm and reverse DBSCAN algorithm. Pre-processing of email text before executing the algorithms is used to make them predict better. This paper uses Enron corpus's dataset of spam and ham emails. In this research paper, we provide comparison performance of all three algorithms based on four measuring factors namely: precision, sensitivity, specificity and accuracy. We are able to attain good accuracy by all the three algorithms. The results have shown comparison of all three algorithms applied on same data set.
Data security assurance through a web or standalone application implies the development of security technologies and methods. User authentication, a security technology, allows access to data and information only to users which have an account and a password. Besides the well-known passwords users can chose other different authentication methods, i.e. electronic identity cards, smart cards or biometric methods, all of these being possible with some supplementary costs. A Single Sign On authentication method combined with a virtual keyboard represents a secure and efficient solution with low-costs implementation.
Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Fake websites which appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.
Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed
CAPTCHA is a software programming which is introduced to differentiate the human from the robots. CATCHA intends to generate a code which can only be identified by the human and machines cannot. In the real world, due to the massive increase in the usage of smart phones, tablets and other devices with the touch screen functionality poses a many online security threats. The traditional CAPTCHA requires a help of keyboard input and does dependant of language which will not be efficient in the smart phone devices. The face CAPTCHA is the one which intends to generate a CAPTCHA by using a combination of facial images and the fake images. It is based on generating a CAPTCHA with noised real face images and the fake images which cannot be identified by the machines but humans do. In the existing work, genetic algorithm is used to select the optimized face images by using which the better optimized fpso CAPTCHA can be created. However this work lacks from the local convergence problem where it can only select the best images within the local region. To overcome this problem in this work, the particle swarm optimization method is propose which can generate the globalize solution. Particle Swarm Optimization (PSO) is a popular and bionic algorithm based on the social behavior associated with bird flocking for optimization problems. The experimental tests that were conducted were proved that the proposed methodology improves in accuracy and generates an optimized solution than the existing methodologies.
CAPTCHA is widely research field become a ubiquitous defense to protect open web resources from automated access. The objective of CAPTCHA is to give genuine services to every user by minimize automated approaches. An efficient CAPTCHA must be not only human friendly, but also robust enough to resist to machine attacks for pass CAPTCHA test. Many CAPTCHAs have been proposed in literature like text-graphical based, video based, mathematical or questions based. The miscreants attempt to effectively bypass these CAPTCHA test by use optical recognition or machine learning techniques. The design and implementation of CAPTCHA lie in the domain of artificial intelligence. We aim to design a CAPTCHA, which will effectively use by modern digitize world and turn to reduce the optical recognition and other automated attacks. In this paper, for better security issues, a non OCR CAPTCHA design called digital CAPTCHA based on Mathematical Boolean algebra by use digital logic gates. The different logic gates design which depict shapes like (AND, OR, NOT, NAND, NOR). Each gate executes multiple answers based on Boolean algebra by use Boolean laws. For prove human, user recognize shapes of logic gates and choose a correct answer from multiple answers. The experimental results analyze by multiple technical and non technical users with different age groups. The resulting values show that our proposed system has high probability and security and resists the visual attacks with existing math CAPTCHAs.
A new image-based CAPTCHA, Annulus, Which capitalizes on human ability of understanding the content of image, specially, counting the numbers of the annulus in a picture was presented in this paper. The Annulus CAPTCHA presents 1 to 8 annuluses in a picture randomly and asks a user input the number of annuluses. Preliminary experiments verified the usability and security of the proposed scheme. Compared with existing implementations, Annulus CAPTCHA achieves a human accuracy of 88% at least and is robust against common attacks. Besides, Annulus CAPTCHA is language independent and flexible for customization (both in terms of security and usability levels). These features make it a promising alternative image-based CAPTCHA to web service providers.
Much of the world is in cyber space. Cyber security is a huge issue with many facets that involve aspects from the security management on a company's or organization's side of the equation to the hackers trying to breach said security to the user's themselves and their private and personal information. Cyber security has brought about research, discussion, papers, tools for monitoring, tools for management, and so on. Much of the focus is on the company's or organization's side of the equation and the protection of their and their client's (the user) information. The most common paradox is weighing the risk to the cost of implementation, but through the company's or organization's point of view. What about the point of view of client of the company or organization? These are the people that use the company's or organization's web site and trust in the company or organization with their personally identifiable information. How much security is too much? How much is not enough? When does a web site become a frustration to the user that it becomes unusable? Where does the responsibility fall and how much? In a non- technical example, 40 years ago one could not lock themselves IN a car. Today however, with all the electronics it is possible to become locked IN a car. Is this too much or just something that society just accepts and deals with? This paper will look at the paradox of cyber security through the view point of the user.
Using shape context descriptors in the distance uneven grouping and its more extensive description of the shape feature, so this descriptor has the target contour point set deformation invariance. However, the twisted adhesions verification code have more outliers and more serious noise, the above- mentioned invariance of the shape context will become very bad, in order to solve the above descriptors' limitations, this article raise a new algorithm based on the relative shape context and point pattern matching to identify codes. And also experimented on the CSDN site's verification code, the result is that the recognition rate is higher than the traditional shape context and the response time is shorter.
No standards are currently tagged "Captchas"