Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








83 Hits in 5.4 sec

Position-Encoding Convolutional Network to Solving Connected Text Captcha

Ke Qing, Rong Zhang
2021 Journal of Artificial Intelligence and Soft Computing Research  
Meanwhile, the security features, which prevent characters from segmentation and recognition, extensively increase the complexity of CAPTCHAs.  ...  We validate PosConv on six text-based CAPTCHA schemes, and it achieves state-of-the-art or competitive recognition accuracy with significantly fewer parameters and faster convergence speed.  ...  For Microsoft's two-layer CAPTCHA, the researchers presented a mixed segmentation method based on the professional analysis of the security feature: a customized algorithm to split the hollow and solid  ... 
doi:10.2478/jaiscr-2022-0008 fatcat:xlyywycmgrd7labdypmpxwnola

New Image-based CAPTCHAs based on Neural Style Transfer

Haichang Gao, Zhouhang Cheng, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei
2019 IET Information Security  
Two image-based CAPTCHAs, Grid-CAPTCHA and Font-CAPTCHA, based on neural style transfer are proposed.  ...  To evaluate the effectiveness of this techniques on enhancing CAPTCHA security, they conducted a comprehensive field study and compared them to similar mechanisms.  ...  Acknowledgments The authors thank the reviewers for their careful reading of this paper and for their helpful and constructive comments.  ... 
doi:10.1049/iet-ifs.2018.5036 fatcat:s2zvr74cyjhljjsvuueet2zrgy

Design and Comparison of Advanced Color based Image CAPTCHAs

Mandeep Kumar, Renu Dhir
2013 International Journal of Computer Applications  
Various types of CAPTCHAs are used, which mostly requires users to enter the strings of characters that appear in distorted form on the screen.  ...  This paper describes in detail the proposed CAPTCHA technology principle, method of implementation, variations and comparison of the accuracy rates.  ...  Harsh Verma HOD Computer Science for providing various research papers and giving their valuable suggestions. Thanks are also given to Dr. Dinesh, Principal, A.B. College, for his valuable comments.  ... 
doi:10.5120/10005-4870 fatcat:3tyfwmsxgnahnb4yhvvgdit5cy

Character Image Semantic-Based CAPTCHA

Aziz Barbar, Anis Ismail
2015 International Journal of Future Computer and Communication  
Benchmarks will be discussed after conducting both Usability and Security tests with a clear set of results that show the accuracy of the proposed solution compared to other existing ones.  ...  does not usually meet the definition of a CAPTCHA.  ...  For instance, researchers have developed an attack against Microsoft's Hotmail CAPTCHA that yields a 60% success rate [8] .  ... 
doi:10.7763/ijfcc.2015.v4.387 fatcat:4ep4dt27mrbczg7ubapmqzvaqe

Designing New CAPTCHA Models Based on the Cognitive Abilities of Artificial Agents

Edgar D. García-Serrano, Salvador Godoy-Calderón, Edgardo M. Felipe-Riverón
2017 Research in Computing Science  
Also, they can provide an idea of which fields in artificial intelligence are the most explored and which could be researched in the near future.  ...  The current state of technology is still not enough to reproduce some human cognitive abilities, and the identification of those abilities is the basis for the design of new CAPTCHA models.  ...  In this research we left out the security context and we use the CAPTCHA as an opportunity for some cognitive computing researches.  ... 
doi:10.13053/rcs-138-1-13 fatcat:6qiritjakndb7otg5pdbcdmbfa

Deciphering complex text-based CAPTCHAs with deep learning

Asadullah Kehar, Shah Abdul Latif University
2020 Indian Journal of Science and Technology  
CAPTCHA is a mechanism to distinguish humans from bots. It has become standard means of protection from the misuse of resources on World Wide Web.  ...  A complex text-based CAPTCHA scheme with varying number of letters: 3, 4 and 5 letters is decoded with the overall precision of 77.5%, 64.2% and 51.9% respectively.  ...  In (12) , the method used by Researchers' is based on two neural architectures along with two different feature extraction techniques: 1-Segmented Character Recognition and 2-Methodology used by researchers  ... 
doi:10.17485/ijst/v13i13.126 fatcat:gu6et7drtvedvgapkmv4ghlt7q

Color Channel CAPTCHA: A Secure Scheme for Cloud Environment

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The experimental study has been conducted among 41 participants on both usability and performance of color channel CAPTCHA.  ...  This simple challenge is completed by click on the specified circles in the given order with very less solving time, while compared to the state of the art.  ...  This work has been supported by the University of Madras (India) under University Research Fellow Grant No; GCCO/URF/Comp.Science/2019-20/323.  ... 
doi:10.35940/ijitee.a4712.119119 fatcat:3yqrz6spgje7xo7ae6vljgzlzy

Development of two novel face-recognition CAPTCHAs: A security and usability study

Guido Schryen, Gerit Wagner, Alexander Schlegel
2016 Computers & security  
With this study, we contribute to research through (1) the development of two new face recognition CAPTCHAs (Farett-Gender and Farett-Gender&Age), (2) the security analysis of both procedures, and (3)  ...  The need for developing alternative types of CAPTCHAs which improve both, the current security and usability levels, has been emphasized by several researchers.  ...  This research was supported by the "Bavarian State Ministry of Education, Science and the Arts" as part of the FORSEC research association.  ... 
doi:10.1016/j.cose.2016.03.007 fatcat:57us2e5u35cazd4a65cax3ab3e

Simple and Easy: Transfer Learning-Based Attacks to Text CAPTCHA

Ping Wang, Haichang Gao, Ziyu Shi, Zhongni Yuan, Jiangping Hu
2020 IEEE Access  
we use these two kinds of generated samples to pre-train the models, respectively.  ...  Instead, transfer learning is the key factor; it reduces the cost of data preparation while preserving the model's attack accuracy. INDEX TERMS CAPTCHA, security, deep learning, transfer learning.  ...  As one of the most important tools for preventing computer attacks, the security aspect of text-based CAPTCHAs has attracted considerable attention from researchers and industry practitioners.  ... 
doi:10.1109/access.2020.2982945 fatcat:2di2z5vggrb3pojg7dm7daqfe4

A deep learning‐based attack on text CAPTCHAs by using object detection techniques

Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo
2021 IET Information Security  
The experiments show that the attack can break a wide range of real-world text CAPTCHAs deployed by the 50 most popular websites on Alexa.com and that the method achieves a high attack accuracy with only  ...  The attack was also evaluated on four click-based CAPTCHAs that cannot be attacked in the end-to-end manner used by previous attacks, and the results demonstrated that within one step, the proposed approach  ...  ACKNOWLEDGEMENTS The authors thank the reviewers for their careful reading of this study and for their helpful and constructive comments.  ... 
doi:10.1049/ise2.12047 fatcat:mv63swxrj5ap5kowsdvh7untmy

AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups

2014 KSII Transactions on Internet and Information Systems  
As a result, we have not only verified the effectiveness of our scheme but also increased the applicability of image annotation CAPTCHAs.  ...  However, this approach has not been widely used because of its weak security and the fact that it can be applied only to annotate for a specific type of attribute clearly separated into mutually exclusive  ...  Therefore, the security of CAPTCHAs should not be based on the database's secrecy [10, 19] .  ... 
doi:10.3837/tiis.2014.03.021 fatcat:npxpyobl6vb7vlfcntjpm24yoi

Protecting Web 2.0 Services from Botnet Exploitations

Nguyen H. Vo, Josef Pieprzyk
2010 2010 Second Cybercrime and Trustworthy Computing Workshop  
Main RIA technologies can be used to implement Captcha are Ajax based on JavaScript, Adobe's Flex based on Flash, and Microsoft's Silverlight.  ...  We deploy two forms of Captcha, one is the popular text-based Captcha and one is our enhanced Captcha as described in Chapter 5. We study the following hypotheses. Figure 6 .3 [38] .  ... 
doi:10.1109/ctc.2010.10 fatcat:cfoopseg4vc3lf7sfd2twrmfoy

Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 [chapter]

Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland, Filip van Laenen
2009 Lecture Notes in Computer Science  
This paper discusses the security and trust aspects of the proposal put forward to the KRD.  ...  The consortium proposed a solution based on an open source approach on the one side, and the knowledge and experience in the field of Cybernetica on the other side.  ...  Acknowledgments The authors would like to thank all their colleagues who have contributed so far to the E-valg 2011 tender.  ... 
doi:10.1007/978-3-642-04766-4_15 fatcat:g7hj2zek2vc5lcai3v6myfa5dm

Security Threats with Associated Mitigation Techniques in Cloud Computing

Mohsin Nazir, Mirza Shuja Rashid
2013 International Journal of Applied Information Systems  
It focuses on technical security issues arising from the usage of cloud services and also provides an overview of key security issues related to cloud computing with the view of a secure cloud architecture  ...  Cloud Computing emerges as one of the hottest topic in the field of information technology.  ...  Two additional layers of trust: internal trust layer and contracted trust layer have been proposed to enhance security in a cloud computing environment.  ... 
doi:10.5120/ijais13-450935 fatcat:ciag4rxhgnh3dj4df7nnwqbpoq

Taxonomy of Cloud Security

Sanchika Gupta, Padam Kumar
2013 International Journal of Computer Science Engineering and Applications  
The attack, if it occurs on Cloud, will allow the attackers to compromise the secure traffic between the websites and browsers of various Cloud users.  ...  on Cloud security, and the defence taxonomy gives a classification of the various counter measures that can be taken to protect the Cloud environment from such attacks.  ...  denial of service attack is from one of the application layer"s security attackson the Cloud application layer.  ... 
doi:10.5121/ijcsea.2013.3505 fatcat:laoqx3yeazah7blsprybzc3ofi
« Previous Showing results 1 — 15 out of 83 results