SlideShare a Scribd company logo
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189
188 | P a g e
A SURVEY ON CAPTCHA TECHNIQUE BASED
ON DRAG AND DROP MOUSE ACTION
Samruddhi D. Bhalani, Shailendra Mishra
Computer Science & Engineering Department
Parul Institute of Technology(PIT)
Limda, India
samruddhibhalani21@gmail.com, shailendrabemtech@gmail.com
Abstract—CAPTCHA, Completely Automated Public
Turning Test to tell Computers and Humans Apart, it is a one
type of test. CAPTCHA is standard internet security they
protect online emails and services from being abused by
malicious computer program or BOT. CAPTCHA is a one type
of test program that protects websites from BOTs on web by
generating tests that computer cannot pass but human can
easily pass. For web security we are using different type of
CAPTCHA. In this paper describe different type of
CAPTCHA technique based on drag and drop mouse action
because drag and drop mouse action is performed by human
not by BOT. This paper is deal with survey and comparison of
different technique of CAPTCHA.
Keywords— BOT, CAPTCHA, DDIM CAPTCHA, DnD
CAPTCHA, Drag and Drop, Human, Third-party human
attack.
I. INTRODUCTION
CAPTCHA stands for Completely Automated Public
Turning Test to tell Computers and Humans Apart [5]. It is
a one type test that describes which is human or BOT. Now
a day’s CAPTHCA is internet standard security to secure
and protect online emails and services. A CAPTCHA is a
test but form of Turing Test that distinguishes human users
and computer BOTs automatically. The test is develop
according to that human users can answer any questions or
challenges easily, but computer-program based imitators
face considerably greater difficulty. The quality or
correctness of a response from considering, a judge
computer can decide whether the tested user is a human or a
current computer program. There are so many type of
CAPTCHA technique based on drag and drop mouse action.
This paper is organized as follow. In section II, we
describe different technique of image based CAPTCHA. In
section III, we describe comparative analysis of different
technique of CAPTCHA. In section IV, represents
conclusion and future work.
II. DIFFERENT TECHNIQUE OF IMAGE BASED
CAPTCHA
A. DnD CAPTCHA [3]
‘DnD CAPTCHA’ or ‘Drag and Drop CAPTCHA’ is
comprehensive explanation against optical character
recognize (OCR) and laundry attacks [3]. Presents the DnD
CAPTCHA technique to differentiate between human and
computers whether uses mouse actions. Here Dragging and
Dropping familiar action of mouse is uses for items drag and
drop in to their specific region according to given CPTCHA.
User can not any type of typing on text box for CAPTCHA
test but in reverse user has to just simple drag and drop
character blocks in to their various blank blocks [3]. Follow
in the figure 1 the DnD CAPTCHA image.
Fig. 1. DnD CAPTCHA[3]
DnD CAPTCHA challenge uses ordinary mouse events
to see human interference proof. In this DnD CAPTCHA
BOT or malicious computer program knows the key of test
but it can not fully pass this DnD CAPTCHA test without
human interference.
B. DDIM CAPTCHA[1]
DDIM stands for Drag-n-Drop Interactive Masking
CAPTCHA [1]. This DDIM CAPTCHA deal with both the
traditional attacks and the third-party human attack.
In DDIM CAPTCHA user collaborate with the system to
find the confirmed answers. The main purpose to design this
CAPTCHA technique is protection against the third-party
human attacks and forces the users do some interactions
with real CAPTCHA system, because computer can not
performed interaction automatically. They can give principle
like Hiding mechanism and interaction and other principles
for designing a CAPTCHA to resist the third-party human
attacks. Candidate region have many layer like two or three.
Candidate region is dividing into several invisible blocks
and each block will accommodate a range of numbers of
candidates [1].
The DDIM CAPTCHA maintains the basic prerequisites
of CAPTCHA and with added interaction and masking
properties to the traditional text-based scheme. Following
figure 2 is DDIM CAPTCHA.
Fig. 2. DDIM CAPTCHA[1]
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189
189 | P a g e
C. Internet poll MosaHIP[2]
In internet polls are deploy in many websites for
collecting information about several topics. So, in this type
of websites to stopping automatic voting, cookie-based, and
securing internet polls they develop Internet poll MosaHIP
CAPTCHA [2].
For internet polls, they have proposed two-phase
technique, and it is base on image based CAPTCHA. In this
CAPTCHA, users must only drag and drop his or her
desired choice on the area of mosaic picture containing the
images of footballs [2]. In added on this CAPTCHA have
TTS (text-To-Speech) system and that TTS system is
optional. Main advantages of TTS system is for children
who may unable to read CAPTCHA question. It called is
Visual CAPTCHA.
Fig. 3. Internet polls MosaHIP [2]
This CAPTCHA is protecting to automatic voting,
securing internet poll.
D. Drag and Drop Image CAPTCHA [4]
In this Drag and Drop Image CAPTCHA technique
developing aims to find legitimate users and at the same
time does not alienate them [4].
In this CAPTCHA user see CAPTCHA image of a
reasonable dimension and resolution. The user has to find to
small and simple embedded images (source image and target
image) from the shown composite image as asked in the
message appearing in the composite image itself [4].
Fig. 4. Drag and Drop Image CAPTCHA [4]
Drag source image and drop it over the target image that
work has been prove by user for proof of human
interference. Drag and Drop Image CAPTCHA is show in
figure 4.
III. COMPARATIVA ANAYSIS OF DIFFERENT TECHNIQUE
OF CAPTCHA
In this section describe comparison of different drag and
drop mouse action CAPTCHA techniques which we discuss
in section II.
TABLE I. COMPARISION OF DIFFERENT TECHNIQUE
Technique Advantages Limitation
DnD
CAPTCHA
Human can pass this
test easily and BOT or
computer program
can’t pass this test.
Third party
human attacks
can’t protect DnD
CAPTCHA.
DDIM
CAPTCHA
Addition of
interaction and
masking properties to
the traditional text-
based scheme on
DDIM CAPTCHA.
And high scalability.
Test is confusing
and hard to solve.
Internet polls
MosaHIP
It can be used by all
ages and Also visual
impaired people using
visual CAPTCHA
option. The method
can considered
resistant and robust
due to having high
level security and
strong CAPTCHA
properties.
Using dynamic IP
address people
connect to the
Internet.
Drag and Drop
Image
CAPTCHA
In database each
images are store in
different places with
encoded key within a
single database.
It takes more
time.
IV. CONCLUSION AND FUTURE WORK
In this paper, we have carried out drag and drop mouse
action’s different technique of CAPTCHA with their
advantage and limitation. Comparative analysis of different
CAPTCHA technique is also discus. In future we will carry
out new CAPTCHA that test is very easy for human but
impossible to pass for BOT.
ACKNOWLEDGMENT
Thanking to Dr. Shital Shah, principal of Parul Institute
of Technology, for this valuable knowledge and support and
guiding us to the right path. And at last but not least, grateful
towards my parents and friends who had supported a lot and
provided inspiration and motivate to go ahead.
REFERENCES
[1] Quan-bin Ye, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee,
and Kuo-Ping Wu, “DDIM-CAPTCH: A Novel Drag-n-Drop
Interactive Masking CAPTCHA Against the Third Party
Human Attacks,” IEEE-2013.
[2] Shahriar Mohammadi and Hossein Abbasimehr, “A High
Level Security Mechanism for Internet Polls,” IEEE-2010.
[3] Arpan Desai, Pragnesh Patadia, “Drag and Drop: A Better
Approach to CAPTCHA,” IEEE, 2009.
[4] Prof. N. A. Shah and M. Tariq Banday, “Drag and Drop
Image CAPTCHA,” Sprouts-2008.
[5] Wei-Bin Lee, Che-Wei Fan ,Kevin Ho, Chyi-Ren Dow , and
"A CAPTCHA with Tips Related to Alphabets Upper or
Lower Case," in Seventh International Conference on
broadband,Communication, Wireless Computing and
Applications, 2012.

More Related Content

What's hot

Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKSDEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
cscpconf
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
IJECEIAES
 
Captcha
CaptchaCaptcha
Captcha
Vruti Surani
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
Aurobindo Nayak
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
Gopinath Ramanna
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
avinash2008
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
Kanchan Dixit
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
IRJET Journal
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
WebCrazyLabs
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
vinit1991
 
Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar
Vivek Maskara
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
Abhishek Anand
 

What's hot (19)

Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKSDEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Captcha
CaptchaCaptcha
Captcha
 
289 292
289 292289 292
289 292
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
 
Jean captcha-ppt
Jean captcha-pptJean captcha-ppt
Jean captcha-ppt
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
Captcha1
Captcha1Captcha1
Captcha1
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
 
Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar Captcha and Recaptcha Seminar
Captcha and Recaptcha Seminar
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 

Viewers also liked

RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
STIGA CX
 
New tools, tool bags, tethers and more
New tools, tool bags, tethers and moreNew tools, tool bags, tethers and more
New tools, tool bags, tethers and more
Project Sales Corp India
 
PVDIS-II
PVDIS-IIPVDIS-II
PVDIS-IIrenjm
 
4hassess ginevra
4hassess ginevra4hassess ginevra
4hassess ginevraambritweb
 
Jewelry-Watch_after
Jewelry-Watch_afterJewelry-Watch_after
Jewelry-Watch_after
Jerome Bush
 
Blogfesores 2009: Open Access
Blogfesores 2009: Open AccessBlogfesores 2009: Open Access
Blogfesores 2009: Open Access
University of Puerto Rico-Mayaguez
 
LIBRO DE 10mo AÑO
LIBRO DE 10mo AÑOLIBRO DE 10mo AÑO
LIBRO DE 10mo AÑO
melissa zumba
 
7 qualities to be a successful entrepreneurs
7 qualities to be a successful entrepreneurs7 qualities to be a successful entrepreneurs
7 qualities to be a successful entrepreneurs
Priya Kadam
 
tax.utah.gov forms current tc tc-305
tax.utah.gov forms current tc  tc-305tax.utah.gov forms current tc  tc-305
tax.utah.gov forms current tc tc-305taxman taxman
 
Plan de gestion ie jose maria carbonel
Plan de gestion ie jose maria carbonelPlan de gestion ie jose maria carbonel
Plan de gestion ie jose maria carbonelcentroeducativoburbura
 
gov revenue formsandresources forms DCAC fill-in
gov revenue formsandresources forms DCAC fill-ingov revenue formsandresources forms DCAC fill-in
gov revenue formsandresources forms DCAC fill-intaxman taxman
 
Biomoleculas tatiana carvajal
Biomoleculas tatiana carvajalBiomoleculas tatiana carvajal
Biomoleculas tatiana carvajal
Tatiana Carvajal
 
Galápagos PowerPoint 2013
Galápagos PowerPoint 2013Galápagos PowerPoint 2013
Galápagos PowerPoint 2013
birdnut
 
Sec A the earth & universe
Sec A  the earth & universeSec A  the earth & universe
Sec A the earth & universe
winnahafiz
 
CODIGO ELECTRICO NACIONAL
CODIGO ELECTRICO NACIONALCODIGO ELECTRICO NACIONAL
CODIGO ELECTRICO NACIONAL
Gabino Vega D
 

Viewers also liked (17)

Brian K. Hollier
Brian K. HollierBrian K. Hollier
Brian K. Hollier
 
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...
 
New tools, tool bags, tethers and more
New tools, tool bags, tethers and moreNew tools, tool bags, tethers and more
New tools, tool bags, tethers and more
 
PVDIS-II
PVDIS-IIPVDIS-II
PVDIS-II
 
4hassess ginevra
4hassess ginevra4hassess ginevra
4hassess ginevra
 
Jewelry-Watch_after
Jewelry-Watch_afterJewelry-Watch_after
Jewelry-Watch_after
 
Blogfesores 2009: Open Access
Blogfesores 2009: Open AccessBlogfesores 2009: Open Access
Blogfesores 2009: Open Access
 
LIBRO DE 10mo AÑO
LIBRO DE 10mo AÑOLIBRO DE 10mo AÑO
LIBRO DE 10mo AÑO
 
7 qualities to be a successful entrepreneurs
7 qualities to be a successful entrepreneurs7 qualities to be a successful entrepreneurs
7 qualities to be a successful entrepreneurs
 
tax.utah.gov forms current tc tc-305
tax.utah.gov forms current tc  tc-305tax.utah.gov forms current tc  tc-305
tax.utah.gov forms current tc tc-305
 
Plan de gestion ie jose maria carbonel
Plan de gestion ie jose maria carbonelPlan de gestion ie jose maria carbonel
Plan de gestion ie jose maria carbonel
 
gov revenue formsandresources forms DCAC fill-in
gov revenue formsandresources forms DCAC fill-ingov revenue formsandresources forms DCAC fill-in
gov revenue formsandresources forms DCAC fill-in
 
Donna Firks CV1
Donna Firks CV1Donna Firks CV1
Donna Firks CV1
 
Biomoleculas tatiana carvajal
Biomoleculas tatiana carvajalBiomoleculas tatiana carvajal
Biomoleculas tatiana carvajal
 
Galápagos PowerPoint 2013
Galápagos PowerPoint 2013Galápagos PowerPoint 2013
Galápagos PowerPoint 2013
 
Sec A the earth & universe
Sec A  the earth & universeSec A  the earth & universe
Sec A the earth & universe
 
CODIGO ELECTRICO NACIONAL
CODIGO ELECTRICO NACIONALCODIGO ELECTRICO NACIONAL
CODIGO ELECTRICO NACIONAL
 

Similar to A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION

IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET Journal
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
IRJET Journal
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
IJCSES Journal
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
theijes
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
Imperva
 
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing TechniquesCaptcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing Techniques
IOSR Journals
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
IJERA Editor
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
Monika Keerthi
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
sachin narang
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
IRJET Journal
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
chirag patil
 
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHAAN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
ijaia
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs
Fatima Qayyum
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
IRJET Journal
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
IOSR Journals
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Karthikeyan Umapathy
 
Performance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniquesPerformance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniques
IJECEIAES
 

Similar to A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION (20)

IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
 
289 292
289 292289 292
289 292
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
Captcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing TechniquesCaptcha Recognition and Robustness Measurement using Image Processing Techniques
Captcha Recognition and Robustness Measurement using Image Processing Techniques
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
 
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHAAN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs
 
Captchas
CaptchasCaptchas
Captchas
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
 
Performance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniquesPerformance evaluation of botnet detection using machine learning techniques
Performance evaluation of botnet detection using machine learning techniques
 

More from International Journal of Technical Research & Application

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 

More from International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189 188 | P a g e A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION Samruddhi D. Bhalani, Shailendra Mishra Computer Science & Engineering Department Parul Institute of Technology(PIT) Limda, India samruddhibhalani21@gmail.com, shailendrabemtech@gmail.com Abstract—CAPTCHA, Completely Automated Public Turning Test to tell Computers and Humans Apart, it is a one type of test. CAPTCHA is standard internet security they protect online emails and services from being abused by malicious computer program or BOT. CAPTCHA is a one type of test program that protects websites from BOTs on web by generating tests that computer cannot pass but human can easily pass. For web security we are using different type of CAPTCHA. In this paper describe different type of CAPTCHA technique based on drag and drop mouse action because drag and drop mouse action is performed by human not by BOT. This paper is deal with survey and comparison of different technique of CAPTCHA. Keywords— BOT, CAPTCHA, DDIM CAPTCHA, DnD CAPTCHA, Drag and Drop, Human, Third-party human attack. I. INTRODUCTION CAPTCHA stands for Completely Automated Public Turning Test to tell Computers and Humans Apart [5]. It is a one type test that describes which is human or BOT. Now a day’s CAPTHCA is internet standard security to secure and protect online emails and services. A CAPTCHA is a test but form of Turing Test that distinguishes human users and computer BOTs automatically. The test is develop according to that human users can answer any questions or challenges easily, but computer-program based imitators face considerably greater difficulty. The quality or correctness of a response from considering, a judge computer can decide whether the tested user is a human or a current computer program. There are so many type of CAPTCHA technique based on drag and drop mouse action. This paper is organized as follow. In section II, we describe different technique of image based CAPTCHA. In section III, we describe comparative analysis of different technique of CAPTCHA. In section IV, represents conclusion and future work. II. DIFFERENT TECHNIQUE OF IMAGE BASED CAPTCHA A. DnD CAPTCHA [3] ‘DnD CAPTCHA’ or ‘Drag and Drop CAPTCHA’ is comprehensive explanation against optical character recognize (OCR) and laundry attacks [3]. Presents the DnD CAPTCHA technique to differentiate between human and computers whether uses mouse actions. Here Dragging and Dropping familiar action of mouse is uses for items drag and drop in to their specific region according to given CPTCHA. User can not any type of typing on text box for CAPTCHA test but in reverse user has to just simple drag and drop character blocks in to their various blank blocks [3]. Follow in the figure 1 the DnD CAPTCHA image. Fig. 1. DnD CAPTCHA[3] DnD CAPTCHA challenge uses ordinary mouse events to see human interference proof. In this DnD CAPTCHA BOT or malicious computer program knows the key of test but it can not fully pass this DnD CAPTCHA test without human interference. B. DDIM CAPTCHA[1] DDIM stands for Drag-n-Drop Interactive Masking CAPTCHA [1]. This DDIM CAPTCHA deal with both the traditional attacks and the third-party human attack. In DDIM CAPTCHA user collaborate with the system to find the confirmed answers. The main purpose to design this CAPTCHA technique is protection against the third-party human attacks and forces the users do some interactions with real CAPTCHA system, because computer can not performed interaction automatically. They can give principle like Hiding mechanism and interaction and other principles for designing a CAPTCHA to resist the third-party human attacks. Candidate region have many layer like two or three. Candidate region is dividing into several invisible blocks and each block will accommodate a range of numbers of candidates [1]. The DDIM CAPTCHA maintains the basic prerequisites of CAPTCHA and with added interaction and masking properties to the traditional text-based scheme. Following figure 2 is DDIM CAPTCHA. Fig. 2. DDIM CAPTCHA[1]
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189 189 | P a g e C. Internet poll MosaHIP[2] In internet polls are deploy in many websites for collecting information about several topics. So, in this type of websites to stopping automatic voting, cookie-based, and securing internet polls they develop Internet poll MosaHIP CAPTCHA [2]. For internet polls, they have proposed two-phase technique, and it is base on image based CAPTCHA. In this CAPTCHA, users must only drag and drop his or her desired choice on the area of mosaic picture containing the images of footballs [2]. In added on this CAPTCHA have TTS (text-To-Speech) system and that TTS system is optional. Main advantages of TTS system is for children who may unable to read CAPTCHA question. It called is Visual CAPTCHA. Fig. 3. Internet polls MosaHIP [2] This CAPTCHA is protecting to automatic voting, securing internet poll. D. Drag and Drop Image CAPTCHA [4] In this Drag and Drop Image CAPTCHA technique developing aims to find legitimate users and at the same time does not alienate them [4]. In this CAPTCHA user see CAPTCHA image of a reasonable dimension and resolution. The user has to find to small and simple embedded images (source image and target image) from the shown composite image as asked in the message appearing in the composite image itself [4]. Fig. 4. Drag and Drop Image CAPTCHA [4] Drag source image and drop it over the target image that work has been prove by user for proof of human interference. Drag and Drop Image CAPTCHA is show in figure 4. III. COMPARATIVA ANAYSIS OF DIFFERENT TECHNIQUE OF CAPTCHA In this section describe comparison of different drag and drop mouse action CAPTCHA techniques which we discuss in section II. TABLE I. COMPARISION OF DIFFERENT TECHNIQUE Technique Advantages Limitation DnD CAPTCHA Human can pass this test easily and BOT or computer program can’t pass this test. Third party human attacks can’t protect DnD CAPTCHA. DDIM CAPTCHA Addition of interaction and masking properties to the traditional text- based scheme on DDIM CAPTCHA. And high scalability. Test is confusing and hard to solve. Internet polls MosaHIP It can be used by all ages and Also visual impaired people using visual CAPTCHA option. The method can considered resistant and robust due to having high level security and strong CAPTCHA properties. Using dynamic IP address people connect to the Internet. Drag and Drop Image CAPTCHA In database each images are store in different places with encoded key within a single database. It takes more time. IV. CONCLUSION AND FUTURE WORK In this paper, we have carried out drag and drop mouse action’s different technique of CAPTCHA with their advantage and limitation. Comparative analysis of different CAPTCHA technique is also discus. In future we will carry out new CAPTCHA that test is very easy for human but impossible to pass for BOT. ACKNOWLEDGMENT Thanking to Dr. Shital Shah, principal of Parul Institute of Technology, for this valuable knowledge and support and guiding us to the right path. And at last but not least, grateful towards my parents and friends who had supported a lot and provided inspiration and motivate to go ahead. REFERENCES [1] Quan-bin Ye, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, and Kuo-Ping Wu, “DDIM-CAPTCH: A Novel Drag-n-Drop Interactive Masking CAPTCHA Against the Third Party Human Attacks,” IEEE-2013. [2] Shahriar Mohammadi and Hossein Abbasimehr, “A High Level Security Mechanism for Internet Polls,” IEEE-2010. [3] Arpan Desai, Pragnesh Patadia, “Drag and Drop: A Better Approach to CAPTCHA,” IEEE, 2009. [4] Prof. N. A. Shah and M. Tariq Banday, “Drag and Drop Image CAPTCHA,” Sprouts-2008. [5] Wei-Bin Lee, Che-Wei Fan ,Kevin Ho, Chyi-Ren Dow , and "A CAPTCHA with Tips Related to Alphabets Upper or Lower Case," in Seventh International Conference on broadband,Communication, Wireless Computing and Applications, 2012.