Open Access Open Access  Restricted Access Subscription or Fee Access

A Technique for Web Security Using Mutual Authentication and Clicking-Cropping Based Image Captcha Technology

K. Suresh Kumar(1*), T. Sasikala(2)

(1) Department of Information Technology, at Saveetha Engineering College Chennai, India
(2) SRR Engineering College, Padur, Chennai, India
(*) Corresponding author


DOI: https://doi.org/10.15866/irecos.v9i1.1037

Abstract


The major motto of my research is to develop a technique for web security using mutual authentication and clicking and cropping based image CAPTCHA technology. In our technique, we use two sections as registration and login. To create an account to use the application we use the registration section and to access the application we use the login section. We set five mandatory fields to login the application. The mandatory fields we give in login section should similar to the mandatory fields we gave while registration. The mandatory fields are checked with respect to the user id. The mandatory fields we set are user id, password, selecting image, number of clicks on image and cropping image. If the fields are same in the login section and registration section for a particular user id, the system will allow the user to access the application. Here, we incorporate three different features than the usual login section in the applications. The different features are selecting an image from a set of images and doing number clicks on that selected image and cropping a portion in that image. Our technique enhances the web security because of these added features.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Web Security; CAPTCHA; Mutual Authentication; Cropping-Clicking

Full Text:

PDF


References


Martin Szydlowski, Christopher Kruegel, Engin Kirda, “Secure Input for Web Applications”, in proceedings of Twenty-Third Annual conference on Computer Security Applications, pp. 375-384, 2007.
http://dx.doi.org/10.1109/acsac.2007.4413004

Ritendra Datta, Jia Li, and James Z. Wang, “IMAGINATION: A Robust Image-based CAPTCHA Generation System”, in Proceedings of the 13th annual ACM international conference on Multimedia, pp. 331 - 334, 2005.
http://dx.doi.org/10.1145/1101149.1101218

Graeme Baxter Bell, “Strengthening CAPTCHA-based Web Security”, in proceedings of Annual Computer Security Applications, 2011.
http://dx.doi.org/10.5210/fm.v17i2.3630

Shardul Vikram, Yinan Fan, Guofei Gu, “SEMAGE: A New Image-based Two-Factor CAPTCHA”, in Proceedings of the 27th Annual Computer Security Applications, pp. 237-246, 2011.
http://dx.doi.org/10.1145/2076732.2076766

Alessandro Basso, Stefano Sicco, “Preventing massive automated access to web resources”, Computers & security, vol. 28, no. 3-4, pp. 174–188, 2009.
http://dx.doi.org/10.1016/j.cose.2008.11.002

Carlos Javier Hernandez-Castro and Arturo Ribagorda, “Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study,” Computers & Security, Volume 29, Issue 1, Pages 141–157, February 2010.
http://dx.doi.org/10.1016/j.cose.2009.06.006

Alessandro Basso and Stefano Sicco, “Preventing massive automated access to web resources,” Computers & Security, vol.28, 2009.
http://dx.doi.org/10.1016/j.cose.2008.11.002

Peter Matthews, Andrew Mantel, Cliff C. Zou, "Scene tagging: image-based CAPTCHA using image composition and object relationships", in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security", pp. 345-350, 2010.
http://dx.doi.org/10.1145/1755688.1755736

S. Benson Edwin Raj,V. S. Jayanthi and V. Muthulakshmi, “A novel architecture for the generation of picture based CAPTCHA”, Computing, Networking and Security, Pages 568-574, 2011.
http://dx.doi.org/10.1007/978-3-642-29280-4_66

Ritendra Datta, Jia Li and James Z. Wang,, “Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs”, IEEE transactions on information forensics and security, April 2009.
http://dx.doi.org/10.1109/tifs.2009.2022709

Bin B. Zhu, Jeff Yan, Qiujie Li, Nanjing, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai, "Attacks and design of image recognition CAPTCHAs", in Proceedings of the 17th ACM conference on Computer and communications security, pp. 187-200, 2010.
http://dx.doi.org/10.1145/1866307.1866329

Priyadharshini, M., Baskaran, R., Balaji, N., Saleem Basha, M.S., Analysis on countering XML-based attacks in web services, (2013) International Review on Computers and Software (IRECOS), 8 (9), pp. 2197-2204.

S. Shirali-Shahreza, M. Shirali-Shahreza, M. T. Manzuri-Shalmani, Easy and Secure Login by CAPTCHA, (2007) International Review on Computers and Software (IRECOS), 2. (4), pp. 393 - 400.


Refbacks

  • There are currently no refbacks.



Please send any questions about this web site to info@praiseworthyprize.com
Copyright © 2005-2017 Praise Worthy Prize