IEEE Organizations related to Captchas

Back to Top

No organizations are currently tagged "Captchas"



Conferences related to Captchas

Back to Top

2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2023 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2022 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


SoutheastCon 2020

SoutheastCon is the annual Region 3 conference that brings together engineering professionals, students, and volunteers for a weekend of technical presentations, meetings, student competitions, and volunteer education.

  • SoutheastCon 2021

    IEEE SoutheastCon is the annual IEEE Region 3 Student, Professional, and awards conference.

  • SoutheastCon 2019

    The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.

  • SoutheastCon 2018

    SoutheastCon is a annual conference held in Region 3 and covers a Professional Track, Student Track and Regional Track.

  • SoutheastCon 2017

    Broad scope professional paper conference, region 3 annual meeting, region 3 annual student conference

  • SoutheastCon 2016

    Annual Region 3 Trifecta of Student competitions, Technical papers and volunteer training and administration.

  • SoutheastCon 2015

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SOUTHEASTCON 2014

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • IEEE SOUTHEASTCON 2013

    Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2005

  • SOUTHEASTCON 2004

  • SOUTHEASTCON 2003

  • SOUTHEASTCON 2002

  • SOUTHEASTCON 2001

  • SOUTHEASTCON 2000

  • SOUTHEASTCON '99

  • SOUTHEASTCON '98

  • SOUTHEASTCON '97

  • SOUTHEASTCON '96


2019 14th Annual Conference System of Systems Engineering (SoSE)

IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 14th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “Internet of Things as System of Systems”. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2018 13th Annual Conference on System of Systems Engineering (SoSE)

    SoSE is the main conference on Systems of Systems, defined as complex systems created by the systematic and dynamic assembly of various interacting sub-systems. The 2018 conference theme is “Systems of systems Management and Control: Frontiers between cyber, physical, and social systems”.

  • 2017 12th System of Systems Engineering Conference (SoSE)

    Internet of Things as System of Systems

  • 2016 11th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Eleventhth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, maritime, energy, environment, healthcare, and transportation. The conference theme is "SoSE and Cyber Physical Systems (CPS), from academia to application and back" We welcome papers on theories, methodologies, and applications of SoSE and CPS in science, technology, industry, and education. Particularly those that deal with the interaction between research institutes, industry, funding and policy makers. What can we do to stimulate both knowledge creation and economic value? Papers should be five to six pages in length, in standard two-column IEEE Conference Proceedings format.

  • 2015 10th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “SoSE Controls, Modeling, and Simulation” three areas of significant investment within the public and private sectors as well as being significant initiatives areas of IEEE. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2014 9th International Conference on System of Systems Engineering (SOSE)

    Sociotechnical Aspects of SoSE; The Nexus between Complex Systems Concepts and SoSE; SoSE Application Domains and Case Studies; Open Cloud Computing; SoSE Approaches, Tools, Methods and Processes; SoSE modelling, simulation & and analysis; Entrepreneurship.

  • 2013 8th International Conference on System of Systems Engineering (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 8th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is

  • 2012 7th International Conference on System of Systems Engineering (SoSE)

    The conference theme is SoSE in cooperative and competitive distributed decision making in complex dynamic systems , focusing on SoSE control and simulation methodologies to support decisions in different application fields, among others transport, energy, industrial and environmental risk management. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2011 6th International Conference on System of Systems Engineering (SoSE)

    the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is SoSE in Cloud Computing, Smart Grid, and Cyber Security, three areas of significant investment within the public and private sectors as well

  • 2010 5th International Conference on System of Systems Engineering (SoSE)

    The 5th International Conference on System of Systems Engineering (SoSE) covers engineering fields such as control, computing, communication, information technology and the applications to manufacturing, defense, national and homeland security, aerospace, aeronautics, energy, environment, transport.

  • 2009 IEEE International Conference on System of Systems Engineering (SoSE)

    SYSTEM OF SYSTEMS, ARCHITECHTURE, MODLEING, SIMULATION, EMERGENCE, ENGINEERING, CONTROL, APPLICATION IN DEFENSE, ENERGY, SECURITY, SPACE, AERONAUTICS, MANUFACTURING, EARTH OBSERVATION, WATER RESOURCES, ETC.

  • 2008 IEEE International Conference on System of Systems Engineering (SoSE)

    Various concepts and fundamental theories and applications of system of systems and SoS Engineering will be discussed in this meeting. This is the 3rd of its sereis.

  • 2007 IEEE International Conference on System of Systems Engineering (SoSE)

  • 2006 IEEE/SMC International Conference on System of Systems Engineering (SoSE)


2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)

The 18th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutionsadopted.

  • 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)

    The 17th International Conference on Computer and Information Science (ICIS 2018) bringstogether scientists, engineers, computer users and students to exchange and share theirexperiences, new ideas and research results about all aspects (theory, applications and tools)of computer and information science and discuss the practical challenges encountered and thesolutions adopted.

  • 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)

    The 16th International Conference on Computer and Information Science (ICIS 2017) brings together scientists, engineers, computer users and students to exchange and share their experiences, new ideas and research results about all aspects (theory, applications and tools) of computer and information science and discuss the practical challenges encountered and the solutions adopted.

  • 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)

    The 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted.

  • 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)

    The 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted.

  • 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)

    The 13th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted.

  • 2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)

    ICIS 2013 brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects of computer and information science, and discuss the practical challenges encountered and the solutions adopted. The conference will cover, but not limited to, the following:Algorithms, Artificial Intel, Neural Networks, Bioinformatics, Communication Sys & Net, Component-Based Software Eng, Computer Arch, VLSI, Data Mining, Knowledge Discovery, Data Warehousing & Eng, Distributed Comp, Economic & Financial Sys,Image and Signal Proc, Pattern Rec,Information Systems, Intelligent Agent, Intelligent Control Sys, Internet Tech, e-Commerce, Middleware Arch, Mobile/Wireless Comp, Parallel & Distributed Comp, Programming Lang, Compilers, Operating Systems, Software Arch, Design Patterns, Frameworks, Software Engineering, Software Metrics, Software Reuse, Design Patterns, Software Testing, Technology Education, UML, OO Modelin

  • 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS)

    The 11th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted.

  • 2011 IEEE/ACIS 10th International Conference on Computer and Information Science (ICIS)

    The 10th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted. The conference will cover a broad set of research topics including, but not limited to, the following: Algorithms, Artificia

  • 2010 IEEE/ACIS 9th International Conference on Computer and Information Science (ICIS)

    This Conference brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted. The conference will cover a broad set of research topics.

  • 2009 8th IEEE/ACIS International Conference on Computer & Information Science (ICIS)

  • 2008 7th International Conference on Computer & Information Science (ICIS)

    The 7th IEEE/ACIS International Conference on Computer and Information Science brings together scientists, engineers, computer users, and students to exchange and share their experiences, new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted

  • 2007 International Conference on Computer & Information Science (ICIS)

  • 2006 International Conference on Computer & Information Science (ICIS)


2018 11th International Conference on Human System Interaction (HSI)

The HSI conference will cover research topics related to the traditional combination of hardware, software and human factors as well as theories and methods of psychology, and communication. The conference will focus not only on theories but also on practical insights related to Human System Interaction. HSI is widely applicable to all types of human activity including manufacturing, transport, supply chain, medical treatment , personal care (aged care, the elderly , the disabled), tele-health, education, business, government, the household and remote monitoring and control. Additionally, there are many new research areas open to Human System Interaction. During the conference we would like to inspire and provoke the audience to work on new ideas and solutions that could become standards for future Human System Interaction applications.

  • 2017 10th International Conference on Human System Interactions (HSI)

    The HSI2017 conference covers both theory and applications in all the area of human system interaction. The topics of interests include, but are not limited to:- Artificial Intelligence- Human Machine Interaction- Education and Training- Cyber Security in HSI- Sociological ad Psychological Aspects of HSI- Cyber Physical Systems- Human Space Computing- Internet of Things and Smart Homes- Health Care and Assistive Devices- Extreme Interfaces- Humanity in Wireless Mesh Network- Vehicular System- Multimedia Human Communication- Personal Communication System- Personal Mobile Ad-hoc System- Wearable Network and System- Network Control and Management- Security, Privacy and Trust- Human Dependable System- Multi-agent System and Applications

  • 2016 9th International Conference on Human System Interactions (HSI)

    Rapid improvement of information and computation technologies leads to the extending and boosting of human system interaction. A large variety of human activities are supported with the development of HSI in aspects of manufacturing, education, business, health and management. International Conference series on Human System Interactions have been serving as a platform for exchanging ideas, knowledge, skills and experiences in interactions between human and systems.

  • 2015 8th International Conference on Human System Interactions (HSI)

    The HSI conference will cover research topics related to the traditional combination of hardware, software and human factors as well as theories and methods of psychology, and communication. The conference will focus not only on theories but also on practical insights related to Human System Interaction. HSI is widely applicable to all types of human activity including manufacturing, transport, supply chain, medical treatment , personal care (aged care, the elderly , the disabled), tele-health, education, business, government, the household and remote monitoring and control. Additionally, there are many new research areas open to Human System Interaction. During the conference we would like to inspire and provoke the audience to work on new ideas and solutions that could become standards for future Human System Interaction applications.

  • 2014 7th International Conference on Human System Interactions (HSI)

    Rapid changes of information technologies lead to boosting the strength and efficiency of human activity. These technologies have an influence on every particular area of human life, including education, science, business, leisure time, entertainment, state administration, health care. Human life is greatly dependent on these systems

  • 2013 6th International Conference on Human System Interactions (HSI)

    Rapid changes of information technologies lead to boosting the strength and efficiency of human activity. These technologies have an influence on every particular area of human life, including education, science, business, leisure time, entertainment, state administration, health care. Human life is greatly dependent on these systems

  • 2012 5th International Conference on Human System Interactions (HSI)

    The conference covers theory, design and application of human-system interactions in the areas of science, education, business, industry, services, humanity, environment, health, and government.

  • 2011 4th International Conference on Human System Interactions (HSI)

    The recent development of computational technologies contributes to introducing intelligent and interactive systems for supporting and extending human activities. International Conference series on Human System Interactions have been providing a platform for interdisciplinarily exchanging ideas, knowledge, skills and experiences in interactions between human and systems.

  • 2010 3rd International Conference on Human System Interactions (HSI)

    Rapid changes of information technologies lead to boosting the strength and efficiency of human activity. These technologies have an influence on every particular area of human life, including education, science, business, leisure time, entertainment, state administration, health care. Human life is greatly dependent on these systems efficiency and performance. HSI conference has been prepared as a platform for exchanging ideas, knowledge, skills and experiences in interactions between man and these s

  • 2009 2nd Conference on Human System Interactions (HSI)

    Computers are today integrant parts of our life, embedded in more and more devices, objects, and systems. So the interactions between Human and Computers has evolved toward interactions between Human and Systems including the larger range of ubiquitous, pervasive computing. Human Systems Interaction 2009 aims to represent a meeting point for different communities, where to share experience and knowledge related to the interaction of human beings with such a broader range of systems.

  • 2008 Conference on Human System Interactions (HSI)


More Conferences

Periodicals related to Captchas

Back to Top

No periodicals are currently tagged "Captchas"


Most published Xplore authors for Captchas

Back to Top

Xplore Articles related to Captchas

Back to Top

Text and image based spam email classification using KNN, Naïve Bayes and Reverse DBSCAN algorithm

2014 International Conference on Reliability Optimization and Information Technology (ICROIT), 2014

Internet has changed the way of communication, which has become more and more concentrated on emails. Emails, text messages and online messenger chatting have become part and parcel of our lives. Out of all these communications, emails are more prone to exploitation. Thus, various email providers employ algorithms to filter emails based on spam and ham. In this research paper, ...


Web authentication methods using single sign on method and virtual keyboard

2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG), 2015

Data security assurance through a web or standalone application implies the development of security technologies and methods. User authentication, a security technology, allows access to data and information only to users which have an account and a password. Besides the well-known passwords users can chose other different authentication methods, i.e. electronic identity cards, smart cards or biometric methods, all of ...


Prevention of phishing attacks in voting system using visual cryptography

2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), 2016

Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs ...


DDoS attack detection mechanism in the application layer using user features

2018 International Conference on Information and Computer Technologies (ICICT), 2018

DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. ...


CAPTCHA: A robust approach to resist online password guessing attacks

2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014), 2014

Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the ...


More Xplore Articles

Educational Resources on Captchas

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Captchas"

IEEE-USA E-Books

  • Text and image based spam email classification using KNN, Naïve Bayes and Reverse DBSCAN algorithm

    Internet has changed the way of communication, which has become more and more concentrated on emails. Emails, text messages and online messenger chatting have become part and parcel of our lives. Out of all these communications, emails are more prone to exploitation. Thus, various email providers employ algorithms to filter emails based on spam and ham. In this research paper, our prime aim is to detect text as well as image based spam emails. To achieve the objective we applied three algorithms namely: KNN algorithm, Naïve Bayes algorithm and reverse DBSCAN algorithm. Pre-processing of email text before executing the algorithms is used to make them predict better. This paper uses Enron corpus's dataset of spam and ham emails. In this research paper, we provide comparison performance of all three algorithms based on four measuring factors namely: precision, sensitivity, specificity and accuracy. We are able to attain good accuracy by all the three algorithms. The results have shown comparison of all three algorithms applied on same data set.

  • Web authentication methods using single sign on method and virtual keyboard

    Data security assurance through a web or standalone application implies the development of security technologies and methods. User authentication, a security technology, allows access to data and information only to users which have an account and a password. Besides the well-known passwords users can chose other different authentication methods, i.e. electronic identity cards, smart cards or biometric methods, all of these being possible with some supplementary costs. A Single Sign On authentication method combined with a virtual keyboard represents a secure and efficient solution with low-costs implementation.

  • Prevention of phishing attacks in voting system using visual cryptography

    Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his vote by combining share 1 and share 2 using VC. Phishing is an attempt by an individual or a group to get personal confidential information from unsuspecting victims. Fake websites which appear very similar to the original ones are being hosted to achieve this. Internet voting focuses on security, privacy, and secrecy issues, as well as challenges for stakeholder involvement and observation of the process. A new approach is proposed for voting system to prevent phishing attacks.

  • DDoS attack detection mechanism in the application layer using user features

    DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot.

  • CAPTCHA: A robust approach to resist online password guessing attacks

    Brute force and Dictionary attacks have become an inevitable security threat to web applications today. Common measures taken to prevent online password guessing attacks like account locking mechanism are ineffective if an attacker has access to a number of compromised machines from a botnet. The main goal is to design a web application that restricts such attacks and at the same time enable convenient login to valid users. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is an effective challengeresponse test to achieve this goal because of its usability and robustness. These are the tests that cannot be solved by current computer programs or bots, but are easily solvable by humans. This ensures that the account is being accessed by a human and not by an automated program. The proposed system implements a secure CAPTCHA that withstands segmentation attacks and also provides various difficulty levels in CAPTCHA design. Classification of CAPTCHA and its robustness is discussed

  • Face image captcha generation using particle swarm optimization approach

    CAPTCHA is a software programming which is introduced to differentiate the human from the robots. CATCHA intends to generate a code which can only be identified by the human and machines cannot. In the real world, due to the massive increase in the usage of smart phones, tablets and other devices with the touch screen functionality poses a many online security threats. The traditional CAPTCHA requires a help of keyboard input and does dependant of language which will not be efficient in the smart phone devices. The face CAPTCHA is the one which intends to generate a CAPTCHA by using a combination of facial images and the fake images. It is based on generating a CAPTCHA with noised real face images and the fake images which cannot be identified by the machines but humans do. In the existing work, genetic algorithm is used to select the optimized face images by using which the better optimized fpso CAPTCHA can be created. However this work lacks from the local convergence problem where it can only select the best images within the local region. To overcome this problem in this work, the particle swarm optimization method is propose which can generate the globalize solution. Particle Swarm Optimization (PSO) is a popular and bionic algorithm based on the social behavior associated with bird flocking for optimization problems. The experimental tests that were conducted were proved that the proposed methodology improves in accuracy and generates an optimized solution than the existing methodologies.

  • A non OCR approach for math CAPTCHA design based on Boolean algebra using digital gates to enhance web security

    CAPTCHA is widely research field become a ubiquitous defense to protect open web resources from automated access. The objective of CAPTCHA is to give genuine services to every user by minimize automated approaches. An efficient CAPTCHA must be not only human friendly, but also robust enough to resist to machine attacks for pass CAPTCHA test. Many CAPTCHAs have been proposed in literature like text-graphical based, video based, mathematical or questions based. The miscreants attempt to effectively bypass these CAPTCHA test by use optical recognition or machine learning techniques. The design and implementation of CAPTCHA lie in the domain of artificial intelligence. We aim to design a CAPTCHA, which will effectively use by modern digitize world and turn to reduce the optical recognition and other automated attacks. In this paper, for better security issues, a non OCR CAPTCHA design called digital CAPTCHA based on Mathematical Boolean algebra by use digital logic gates. The different logic gates design which depict shapes like (AND, OR, NOT, NAND, NOR). Each gate executes multiple answers based on Boolean algebra by use Boolean laws. For prove human, user recognize shapes of logic gates and choose a correct answer from multiple answers. The experimental results analyze by multiple technical and non technical users with different age groups. The resulting values show that our proposed system has high probability and security and resists the visual attacks with existing math CAPTCHAs.

  • Annulus: A novel image-based CAPTCHA scheme

    A new image-based CAPTCHA, Annulus, Which capitalizes on human ability of understanding the content of image, specially, counting the numbers of the annulus in a picture was presented in this paper. The Annulus CAPTCHA presents 1 to 8 annuluses in a picture randomly and asks a user input the number of annuluses. Preliminary experiments verified the usability and security of the proposed scheme. Compared with existing implementations, Annulus CAPTCHA achieves a human accuracy of 88% at least and is robust against common attacks. Besides, Annulus CAPTCHA is language independent and flexible for customization (both in terms of security and usability levels). These features make it a promising alternative image-based CAPTCHA to web service providers.

  • Cyber security paradox from a user's view point

    Much of the world is in cyber space. Cyber security is a huge issue with many facets that involve aspects from the security management on a company's or organization's side of the equation to the hackers trying to breach said security to the user's themselves and their private and personal information. Cyber security has brought about research, discussion, papers, tools for monitoring, tools for management, and so on. Much of the focus is on the company's or organization's side of the equation and the protection of their and their client's (the user) information. The most common paradox is weighing the risk to the cost of implementation, but through the company's or organization's point of view. What about the point of view of client of the company or organization? These are the people that use the company's or organization's web site and trust in the company or organization with their personally identifiable information. How much security is too much? How much is not enough? When does a web site become a frustration to the user that it becomes unusable? Where does the responsibility fall and how much? In a non- technical example, 40 years ago one could not lock themselves IN a car. Today however, with all the electronics it is possible to become locked IN a car. Is this too much or just something that society just accepts and deals with? This paper will look at the paradox of cyber security through the view point of the user.

  • CAPTCHA Recognition Algorithm Based on the Relative Shape Context and Point Pattern Matching

    Using shape context descriptors in the distance uneven grouping and its more extensive description of the shape feature, so this descriptor has the target contour point set deformation invariance. However, the twisted adhesions verification code have more outliers and more serious noise, the above- mentioned invariance of the shape context will become very bad, in order to solve the above descriptors' limitations, this article raise a new algorithm based on the relative shape context and point pattern matching to identify codes. And also experimented on the CSDN site's verification code, the result is that the recognition rate is higher than the traditional shape context and the response time is shorter.



Standards related to Captchas

Back to Top

No standards are currently tagged "Captchas"


Jobs related to Captchas

Back to Top