A Technique for Web Security Using Mutual Authentication and Clicking-Cropping Based Image Captcha Technology
The major motto of my research is to develop a technique for web security using mutual authentication and clicking and cropping based image CAPTCHA technology. In our technique, we use two sections as registration and login. To create an account to use the application we use the registration section and to access the application we use the login section. We set five mandatory fields to login the application. The mandatory fields we give in login section should similar to the mandatory fields we gave while registration. The mandatory fields are checked with respect to the user id. The mandatory fields we set are user id, password, selecting image, number of clicks on image and cropping image. If the fields are same in the login section and registration section for a particular user id, the system will allow the user to access the application. Here, we incorporate three different features than the usual login section in the applications. The different features are selecting an image from a set of images and doing number clicks on that selected image and cropping a portion in that image. Our technique enhances the web security because of these added features.
Copyright © 2014 Praise Worthy Prize - All rights reserved.
Martin Szydlowski, Christopher Kruegel, Engin Kirda, “Secure Input for Web Applications”, in proceedings of Twenty-Third Annual conference on Computer Security Applications, pp. 375-384, 2007.
Ritendra Datta, Jia Li, and James Z. Wang, “IMAGINATION: A Robust Image-based CAPTCHA Generation System”, in Proceedings of the 13th annual ACM international conference on Multimedia, pp. 331 - 334, 2005.
Graeme Baxter Bell, “Strengthening CAPTCHA-based Web Security”, in proceedings of Annual Computer Security Applications, 2011.
Shardul Vikram, Yinan Fan, Guofei Gu, “SEMAGE: A New Image-based Two-Factor CAPTCHA”, in Proceedings of the 27th Annual Computer Security Applications, pp. 237-246, 2011.
Alessandro Basso, Stefano Sicco, “Preventing massive automated access to web resources”, Computers & security, vol. 28, no. 3-4, pp. 174–188, 2009.
Carlos Javier Hernandez-Castro and Arturo Ribagorda, “Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study,” Computers & Security, Volume 29, Issue 1, Pages 141–157, February 2010.
Alessandro Basso and Stefano Sicco, “Preventing massive automated access to web resources,” Computers & Security, vol.28, 2009.
Peter Matthews, Andrew Mantel, Cliff C. Zou, "Scene tagging: image-based CAPTCHA using image composition and object relationships", in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security", pp. 345-350, 2010.
S. Benson Edwin Raj,V. S. Jayanthi and V. Muthulakshmi, “A novel architecture for the generation of picture based CAPTCHA”, Computing, Networking and Security, Pages 568-574, 2011.
Ritendra Datta, Jia Li and James Z. Wang,, “Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs”, IEEE transactions on information forensics and security, April 2009.
Bin B. Zhu, Jeff Yan, Qiujie Li, Nanjing, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai, "Attacks and design of image recognition CAPTCHAs", in Proceedings of the 17th ACM conference on Computer and communications security, pp. 187-200, 2010.
Priyadharshini, M., Baskaran, R., Balaji, N., Saleem Basha, M.S., Analysis on countering XML-based attacks in web services, (2013) International Review on Computers and Software (IRECOS), 8 (9), pp. 2197-2204.
S. Shirali-Shahreza, M. Shirali-Shahreza, M. T. Manzuri-Shalmani, Easy and Secure Login by CAPTCHA, (2007) International Review on Computers and Software (IRECOS), 2. (4), pp. 393 - 400.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2021 Praise Worthy Prize