SlideShare a Scribd company logo
1 of 16
iCAPTCHAiCAPTCHA
CAPTCHA AND iCAPTCHACAPTCHA AND iCAPTCHA
TECHNOLOGYTECHNOLOGY
 CAPTCHACAPTCHA (Completely Automated Public Turing
Test to Tell Computers and Humans Apart)
i. Standard security mechanism.
ii. Prevent attack of automatic scripts.
 iCAPTCHA (Interactive Completely Automated
Public Turing Test to Tell Computers and Humans
Apart)
1. next generation of CAPTCHA
2. against 3rd party human attacks( legitimate user or not).
Welcome to the CAPTCHA worldWelcome to the CAPTCHA world
CAPTCHACAPTCHA
 Simple test , easy for humans . But difficult forSimple test , easy for humans . But difficult for
computers to solve.computers to solve.
 Protect resource from attack by the use ofProtect resource from attack by the use of
timing values.timing values.
 Unable to distinguish between human attackerUnable to distinguish between human attacker
and a legitimate user.and a legitimate user.
 ApplicationsApplications
face-book ,e-mail services.face-book ,e-mail services.
IMCA( Instant MessengerIMCA( Instant Messenger
CAPTCHA Attack )CAPTCHA Attack ) System used in CAPTCHA.System used in CAPTCHA.
 Instant Messenger (IM) network .Instant Messenger (IM) network .
 IM allow communication between two or moreIM allow communication between two or more
participants over a network .participants over a network .
 Data exchange .Data exchange .
 IMCA ComponentsIMCA Components
 Attack script : custom made to attackAttack script : custom made to attack
 IM connector : send and receive instantIM connector : send and receive instant
messagesmessages
EXAMPLE FOR CAPTCHAEXAMPLE FOR CAPTCHA
iCAPTCHA ( InteractiveiCAPTCHA ( Interactive
CAPTCHACAPTCHA))
 Reliable technique.Reliable technique.
 Concept and implementationConcept and implementation
a)a) use sequence of mouse clicks.use sequence of mouse clicks.
b)b) first click -CAPTCHA image creating.first click -CAPTCHA image creating.
c)c) mouse click- iCAPTCHA input.mouse click- iCAPTCHA input.
d)d) correct – perform functions.correct – perform functions.
iCAPTCHA MechanismiCAPTCHA Mechanism
interactioninteraction
Legitimate
Web Server
User
1..Download CAPTCHA
Challenge
2.. Response to
CAPTCHA
Fig. Legitimate user’s interaction with iCAPTCHA
CAPTCHA in different searchCAPTCHA in different search
engineengine
Security FeaturesSecurity Features
• CAPTCHA - time out value measuring .CAPTCHA - time out value measuring .
( not detect legitimate user or not .)( not detect legitimate user or not .)
• iCAPTCHA - time out value measuring periCAPTCHA - time out value measuring per
character.character.
( detect legitimate user or not .)( detect legitimate user or not .)
Attack Detection AlgorithmsAttack Detection Algorithms
Algorithms:Algorithms:
1.1. single slow response detection algorithmsingle slow response detection algorithm
2.2. two consecutive slow response algorithmtwo consecutive slow response algorithm
3.3. dynamic detection threshold algorithmdynamic detection threshold algorithm
LIMITATIONSLIMITATIONS
 users with impaired vision or motor skills.users with impaired vision or motor skills.
 iCAPTCHA performance against characteriCAPTCHA performance against character
recognition based attacks.recognition based attacks.
CONCLUSIONCONCLUSION
 protecting resources from attacks.protecting resources from attacks.
 provide statistical timing for evaluating theprovide statistical timing for evaluating the
mechanism.mechanism.
 attack detection based on detection algorithms.attack detection based on detection algorithms.
 we hope iCAPTCHA encourage researches andwe hope iCAPTCHA encourage researches and
develop more secure and reliable CAPTCHA.develop more secure and reliable CAPTCHA.
THANK YOU...THANK YOU...

More Related Content

Similar to iCAPTCHA

From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...Shujun Li
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Fatima Qayyum
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologiesMonika Keerthi
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the RyeImperva
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical PasswordIRJET Journal
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET Journal
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...IRJET Journal
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET Journal
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPIRJET Journal
 
Geo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicGeo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicMeghanaNS
 

Similar to iCAPTCHA (20)

Captcha
CaptchaCaptcha
Captcha
 
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
 
Captcha
CaptchaCaptcha
Captcha
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha1
Captcha1Captcha1
Captcha1
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
Captcha
CaptchaCaptcha
Captcha
 
Geo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicGeo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographic
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

iCAPTCHA

  • 2.
  • 3. CAPTCHA AND iCAPTCHACAPTCHA AND iCAPTCHA TECHNOLOGYTECHNOLOGY  CAPTCHACAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) i. Standard security mechanism. ii. Prevent attack of automatic scripts.  iCAPTCHA (Interactive Completely Automated Public Turing Test to Tell Computers and Humans Apart) 1. next generation of CAPTCHA 2. against 3rd party human attacks( legitimate user or not).
  • 4. Welcome to the CAPTCHA worldWelcome to the CAPTCHA world
  • 5. CAPTCHACAPTCHA  Simple test , easy for humans . But difficult forSimple test , easy for humans . But difficult for computers to solve.computers to solve.  Protect resource from attack by the use ofProtect resource from attack by the use of timing values.timing values.  Unable to distinguish between human attackerUnable to distinguish between human attacker and a legitimate user.and a legitimate user.  ApplicationsApplications face-book ,e-mail services.face-book ,e-mail services.
  • 6. IMCA( Instant MessengerIMCA( Instant Messenger CAPTCHA Attack )CAPTCHA Attack ) System used in CAPTCHA.System used in CAPTCHA.  Instant Messenger (IM) network .Instant Messenger (IM) network .  IM allow communication between two or moreIM allow communication between two or more participants over a network .participants over a network .  Data exchange .Data exchange .  IMCA ComponentsIMCA Components  Attack script : custom made to attackAttack script : custom made to attack  IM connector : send and receive instantIM connector : send and receive instant messagesmessages
  • 8. iCAPTCHA ( InteractiveiCAPTCHA ( Interactive CAPTCHACAPTCHA))  Reliable technique.Reliable technique.  Concept and implementationConcept and implementation a)a) use sequence of mouse clicks.use sequence of mouse clicks. b)b) first click -CAPTCHA image creating.first click -CAPTCHA image creating. c)c) mouse click- iCAPTCHA input.mouse click- iCAPTCHA input. d)d) correct – perform functions.correct – perform functions.
  • 10. interactioninteraction Legitimate Web Server User 1..Download CAPTCHA Challenge 2.. Response to CAPTCHA Fig. Legitimate user’s interaction with iCAPTCHA
  • 11. CAPTCHA in different searchCAPTCHA in different search engineengine
  • 12. Security FeaturesSecurity Features • CAPTCHA - time out value measuring .CAPTCHA - time out value measuring . ( not detect legitimate user or not .)( not detect legitimate user or not .) • iCAPTCHA - time out value measuring periCAPTCHA - time out value measuring per character.character. ( detect legitimate user or not .)( detect legitimate user or not .)
  • 13. Attack Detection AlgorithmsAttack Detection Algorithms Algorithms:Algorithms: 1.1. single slow response detection algorithmsingle slow response detection algorithm 2.2. two consecutive slow response algorithmtwo consecutive slow response algorithm 3.3. dynamic detection threshold algorithmdynamic detection threshold algorithm
  • 14. LIMITATIONSLIMITATIONS  users with impaired vision or motor skills.users with impaired vision or motor skills.  iCAPTCHA performance against characteriCAPTCHA performance against character recognition based attacks.recognition based attacks.
  • 15. CONCLUSIONCONCLUSION  protecting resources from attacks.protecting resources from attacks.  provide statistical timing for evaluating theprovide statistical timing for evaluating the mechanism.mechanism.  attack detection based on detection algorithms.attack detection based on detection algorithms.  we hope iCAPTCHA encourage researches andwe hope iCAPTCHA encourage researches and develop more secure and reliable CAPTCHA.develop more secure and reliable CAPTCHA.