SlideShare a Scribd company logo
Gamification of
Internet Security
by Next Generation
CAPTCHAs
What is CAPTCHA?
What does the acronym CAPTCHA stands
for?
Completely Automated Public Turing test to tell
Computers and Humans Apart
CAPTCHA
– Developed in the year 2000 at Carnegie Mellon
University by John Langford, Nicholas J. Hooper and
Luis Von Ahn.
– CAPTCHA is used to differentiate between the humans
and the computers.
– Also prevents system from the viruses or vulnerable
attacks
– A verification test found at the end of the sign-up page
form in Gmail or Yahoo account.
– And are used in websites that provide services like
surveys, polls, and registration forms.
CAPTCHA & AI
– CAPTCHAs are a type of Artificial Intelligence.
– That cannot be solved by a computer system
or by automated software.
– To understand CAPTCHA, you have to teach
computers about the human behaviour and
also to make the computer how the people
think.
– Algorithms are being made to make computers
understand the concept of captchas.
Why it is
needed?
– Preventing Comment Spam
– Protecting Website Registration
– Protecting Email Addresses from
Scrapers
– Online Polls
– Preventing Dictionary Attacks
– Search Engine Bots
– Worms & Spams
Types of CAPTCHAs
Text based
CAPTCHA
Image based
CAPTCHA
Audio based
CAPTCHA
Mathematical
CAPTCHA
Logic based
CAPTCHA
Ad Injected
CAPTCHA
SUPER CAPTCHA( SECURED USER
PERCEIVABLE EFFICACIOUS AND
RELIABLE)
System Architecture
Next Generation Game
CAPTCHAs
– The next generation CAPTCHAs are simple and light weighted mini games
– Used for differentiating human being from automated bots.
– Designed using HTML5 with JavaScript and transmitted to the client browser in
encrypted form.
– No additional plug required to implement them
Four different types of game-CAPTCHAs have experimented in this paper:
1. Bird Shooting
2. Connecting Dots
3. Duck Hunt
4. Drag-and-Drop
Types
1. Bird Shooting 2. Connecting Dots
Types
3. Duck Hunt 4. Drag-and-Drop
Security Analysis
A. Random Guessing Attack
B. Dictionary Attack
C. CAPTCHA in AI
D. Deniel-of-a-service attack in CAPTCHA
Usability Study
– 30 participants of different backgrounds were involved
– Study was made in terms of understanding, the level of complexity, time taken, and user
experience.
1. The first test is time taken to understand the mini game compared with text-based or
any other times of CAPTCHAs; the result shows its almost 20% easy to understand.
2. The second test is the level of complexity of game CAPTCHA, which is too simple to
complete the task.
3. Time taken to complete CAPTCHA is half of the time compared with any other types of
CAPTCHAs, because the user need not type anything to solve CAPTCHA, they can
simply click or drag-and-drop using a mouse in PC and tap or swipe in smartphones.
4. Since no plug-in are required to run the game-CAPTCHA, it can be supported almost
all king or browsers in either Mobile or PC.
Conclusion
Less time taking
More safe
Interesting
Easy to generate
Gamification of Internet Security by Next Generation CAPTCHAs

More Related Content

What's hot

Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
vinit1991
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
WebCrazyLabs
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
Kanchan Dixit
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
Preetam Rout
 
Demystifying captcha Bangalore Meet April 18
Demystifying captcha Bangalore Meet April 18Demystifying captcha Bangalore Meet April 18
Demystifying captcha Bangalore Meet April 18
n|u - The Open Security Community
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfGanesh Dhage
 
Introduction about Captcha and its types
Introduction about Captcha and its typesIntroduction about Captcha and its types
Introduction about Captcha and its types
bansarirajani
 
Captcha & its types
Captcha & its typesCaptcha & its types
Captcha & its types
indrathakur001
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attacks
eSAT Journals
 
captcha as a graphical password
captcha as a graphical passwordcaptcha as a graphical password
captcha as a graphical password
VishnuVardhan mooli
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
International Journal of Technical Research & Application
 

What's hot (20)

Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha system
Captcha  systemCaptcha  system
Captcha system
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Demystifying captcha Bangalore Meet April 18
Demystifying captcha Bangalore Meet April 18Demystifying captcha Bangalore Meet April 18
Demystifying captcha Bangalore Meet April 18
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
 
Introduction about Captcha and its types
Introduction about Captcha and its typesIntroduction about Captcha and its types
Introduction about Captcha and its types
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 
Captchas
CaptchasCaptchas
Captchas
 
Captcha & its types
Captcha & its typesCaptcha & its types
Captcha & its types
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attacks
 
Captcha a web security
Captcha a web securityCaptcha a web security
Captcha a web security
 
captcha as a graphical password
captcha as a graphical passwordcaptcha as a graphical password
captcha as a graphical password
 
49 captcha
49 captcha49 captcha
49 captcha
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
 

Similar to Gamification of Internet Security by Next Generation CAPTCHAs

Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
Rishabh Agarwal
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
IRJET Journal
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
Abhishek Anand
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
Imperva
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET Journal
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
IRJET Journal
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
IJERA Editor
 
Captcha
CaptchaCaptcha
Captcha
Vruti Surani
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
Monika Keerthi
 
Captcha
CaptchaCaptcha
Captcha
Gowthami T
 
Captcha
CaptchaCaptcha
Captcha
Gowthami T
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
PINKESH PATEL
 
Captcha
CaptchaCaptcha
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
sachin narang
 
iCAPTCHA
 iCAPTCHA iCAPTCHA
iCAPTCHA
Vishnu_Ra
 
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
Shujun Li
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
IRJET Journal
 

Similar to Gamification of Internet Security by Next Generation CAPTCHAs (20)

Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
captcha
captcha captcha
captcha
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
Captcha
CaptchaCaptcha
Captcha
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Captcha
CaptchaCaptcha
Captcha
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha
CaptchaCaptcha
Captcha
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
Captcha
CaptchaCaptcha
Captcha
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
iCAPTCHA
 iCAPTCHA iCAPTCHA
iCAPTCHA
 
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 

More from Fatima Qayyum

Keras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower RecognitionKeras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower Recognition
Fatima Qayyum
 
GPU Architecture NVIDIA (GTX GeForce 480)
GPU Architecture NVIDIA (GTX GeForce 480)GPU Architecture NVIDIA (GTX GeForce 480)
GPU Architecture NVIDIA (GTX GeForce 480)
Fatima Qayyum
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
Fatima Qayyum
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
Fatima Qayyum
 
DNS spoofing/poisoning Attack
DNS spoofing/poisoning AttackDNS spoofing/poisoning Attack
DNS spoofing/poisoning Attack
Fatima Qayyum
 
Srs (Software Requirement Specification Document)
Srs (Software Requirement Specification Document) Srs (Software Requirement Specification Document)
Srs (Software Requirement Specification Document)
Fatima Qayyum
 
Stress managment
Stress managmentStress managment
Stress managment
Fatima Qayyum
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
Fatima Qayyum
 
Artificial Intelligence presentation
Artificial Intelligence presentation Artificial Intelligence presentation
Artificial Intelligence presentation
Fatima Qayyum
 
Subnetting
SubnettingSubnetting
Subnetting
Fatima Qayyum
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
Fatima Qayyum
 
Define & Undefine in SQL
Define & Undefine in SQLDefine & Undefine in SQL
Define & Undefine in SQL
Fatima Qayyum
 
Security System using XOR & NOR
Security System using XOR & NOR Security System using XOR & NOR
Security System using XOR & NOR
Fatima Qayyum
 
Communication skills (English) 3
Communication skills (English) 3Communication skills (English) 3
Communication skills (English) 3
Fatima Qayyum
 
Creativity and arts presentation (1)
Creativity and arts presentation (1)Creativity and arts presentation (1)
Creativity and arts presentation (1)
Fatima Qayyum
 
BCD Adder
BCD AdderBCD Adder
BCD Adder
Fatima Qayyum
 
World religon (islam & judaism)
World religon (islam & judaism)World religon (islam & judaism)
World religon (islam & judaism)
Fatima Qayyum
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
Fatima Qayyum
 

More from Fatima Qayyum (18)

Keras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower RecognitionKeras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower Recognition
 
GPU Architecture NVIDIA (GTX GeForce 480)
GPU Architecture NVIDIA (GTX GeForce 480)GPU Architecture NVIDIA (GTX GeForce 480)
GPU Architecture NVIDIA (GTX GeForce 480)
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
A Low-Cost IoT Application for the Urban Traffic of Vehicles, Based on Wirele...
 
DNS spoofing/poisoning Attack
DNS spoofing/poisoning AttackDNS spoofing/poisoning Attack
DNS spoofing/poisoning Attack
 
Srs (Software Requirement Specification Document)
Srs (Software Requirement Specification Document) Srs (Software Requirement Specification Document)
Srs (Software Requirement Specification Document)
 
Stress managment
Stress managmentStress managment
Stress managment
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
Artificial Intelligence presentation
Artificial Intelligence presentation Artificial Intelligence presentation
Artificial Intelligence presentation
 
Subnetting
SubnettingSubnetting
Subnetting
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
 
Define & Undefine in SQL
Define & Undefine in SQLDefine & Undefine in SQL
Define & Undefine in SQL
 
Security System using XOR & NOR
Security System using XOR & NOR Security System using XOR & NOR
Security System using XOR & NOR
 
Communication skills (English) 3
Communication skills (English) 3Communication skills (English) 3
Communication skills (English) 3
 
Creativity and arts presentation (1)
Creativity and arts presentation (1)Creativity and arts presentation (1)
Creativity and arts presentation (1)
 
BCD Adder
BCD AdderBCD Adder
BCD Adder
 
World religon (islam & judaism)
World religon (islam & judaism)World religon (islam & judaism)
World religon (islam & judaism)
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 

Gamification of Internet Security by Next Generation CAPTCHAs

  • 1. Gamification of Internet Security by Next Generation CAPTCHAs
  • 2. What is CAPTCHA? What does the acronym CAPTCHA stands for? Completely Automated Public Turing test to tell Computers and Humans Apart
  • 3. CAPTCHA – Developed in the year 2000 at Carnegie Mellon University by John Langford, Nicholas J. Hooper and Luis Von Ahn. – CAPTCHA is used to differentiate between the humans and the computers. – Also prevents system from the viruses or vulnerable attacks – A verification test found at the end of the sign-up page form in Gmail or Yahoo account. – And are used in websites that provide services like surveys, polls, and registration forms.
  • 4. CAPTCHA & AI – CAPTCHAs are a type of Artificial Intelligence. – That cannot be solved by a computer system or by automated software. – To understand CAPTCHA, you have to teach computers about the human behaviour and also to make the computer how the people think. – Algorithms are being made to make computers understand the concept of captchas.
  • 5. Why it is needed? – Preventing Comment Spam – Protecting Website Registration – Protecting Email Addresses from Scrapers – Online Polls – Preventing Dictionary Attacks – Search Engine Bots – Worms & Spams
  • 6. Types of CAPTCHAs Text based CAPTCHA Image based CAPTCHA Audio based CAPTCHA Mathematical CAPTCHA Logic based CAPTCHA Ad Injected CAPTCHA
  • 7. SUPER CAPTCHA( SECURED USER PERCEIVABLE EFFICACIOUS AND RELIABLE) System Architecture
  • 8. Next Generation Game CAPTCHAs – The next generation CAPTCHAs are simple and light weighted mini games – Used for differentiating human being from automated bots. – Designed using HTML5 with JavaScript and transmitted to the client browser in encrypted form. – No additional plug required to implement them Four different types of game-CAPTCHAs have experimented in this paper: 1. Bird Shooting 2. Connecting Dots 3. Duck Hunt 4. Drag-and-Drop
  • 9. Types 1. Bird Shooting 2. Connecting Dots
  • 10. Types 3. Duck Hunt 4. Drag-and-Drop
  • 11. Security Analysis A. Random Guessing Attack B. Dictionary Attack C. CAPTCHA in AI D. Deniel-of-a-service attack in CAPTCHA
  • 12. Usability Study – 30 participants of different backgrounds were involved – Study was made in terms of understanding, the level of complexity, time taken, and user experience. 1. The first test is time taken to understand the mini game compared with text-based or any other times of CAPTCHAs; the result shows its almost 20% easy to understand. 2. The second test is the level of complexity of game CAPTCHA, which is too simple to complete the task. 3. Time taken to complete CAPTCHA is half of the time compared with any other types of CAPTCHAs, because the user need not type anything to solve CAPTCHA, they can simply click or drag-and-drop using a mouse in PC and tap or swipe in smartphones. 4. Since no plug-in are required to run the game-CAPTCHA, it can be supported almost all king or browsers in either Mobile or PC.
  • 13. Conclusion Less time taking More safe Interesting Easy to generate