Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 22
Year of Publication: 2013
Authors:
Varun Ambrose Thomas
Karanvir Kaur
10.5120/11526-7253

Varun Ambrose Thomas and Karanvir Kaur. Article: Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor. International Journal of Computer Applications 67(22):13-17, April 2013. Full text available. BibTeX

@article{key:article,
	author = {Varun Ambrose Thomas and Karanvir Kaur},
	title = {Article: Cursor CAPTCHA – Captcha Mechanism using Mouse Cursor},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {22},
	pages = {13-17},
	month = {April},
	note = {Full text available}
}

Abstract

With the growing and prevalent usage of Internet, threat for the service providers has arisen. One of the most important aspects of modern security concerns is to deal with users that are computer programs or bots. These programs pretend to be human users and exploit servers by submitting data automatically, thereby, hindering the services of the server. Security mechanism dealing with such attacks is called Completely Automated Turing test to tell Computers and Humans Apart (CAPTCHA). This paper discusses and analyzes broad CAPTCHA mechanisms and recent researches that have either reformed or flunked, previous techniques and methods. Also, a technique is proposed that counteracts the shortcomings or inabilities of such techniques.

References

  • Ahn, Luis von, Blum, Manuel, Hopper, Nicholas J. , Langford, John 2003. CAPTCHA: Using Hard AI Problems for Security. In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, pp 294-311
  • Chew, Monica, Tygar, J. D. 2004. Image Recognition CAPTCHAs. In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, pp. 268-279
  • Chow, Richard, Golle, Philippe, Jakobsson, Markus, Wang, Lusha, Wang, Xiaofeng 2008. Making CAPTCHAs Clickable. In proceedings of the 9th workshop on Mobile computing systems and applications, CA, USA , pp 91-94
  • Yan, Jeff, Ahmad, Ahmad Salah El 2008. Usability of CAPTCHAs Or usability issues in CAPTCHA design. In Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA
  • Bursztein, Elie, Martin, Matthieu, Mitchell, John C. 2011. Text-based CAPTCHA strengths and weaknesses. In ACM Computer and Communication Security
  • Raj, Aditya, Jain, Ashish, Pahwa, Tushar, Jain, Abhimanyu 2010. Picture CAPTCHAs with Sequencing:
  • Their Types and Analysis. In International Journal of Digital Society (IJDS), Volume 1, Issue 3
  • Bursztein, Elie, Bethard, Steven, Fabry, Celine, Mitchell, John C. , Jurafsky, Dan 2010. How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In IEEE Symposium on Security and Privacy
  • Fritsch, Christoph, Netter, Michael, Reisser, Andreas, Pernul, Günther 2010. Attacking Image Recognition Captchas – A Naïve but E?ective Approach. In 7th International Conference, TrustBus, Bilbao, Spain, pp 13-25
  • Turbobit – A File Sharing Service "http://turbobit. net/captcha/securimg_1"
  • Desai, Arpan, Patadia, Pragnesh 2009. Drag and Drop: A Better Approach to CAPTCHA. In Annual IEEE India Conference (INDICON) , Gujarat, India, pp 1-4
  • Amrinder, Arora 2007. Statistics Hacking – Exploiting Vulnerabilities in News Websites. In International Journal of Computer Science and Network Security Vol. 7 No. 3
  • Bursztein Elie, Beauxis Romain, Paaskov Hristo, Perito Daniele, Fabry Celine and Mitchell John, 2011. The Failure of Noise-Based Non-Continuous Audio CAPTCHAs. In IEEE Symposium on Security and Privacy, Berkeley, California pp 19 – 31