Javascript must be enabled to continue!
ProCAPTCHA: A profile-based CAPTCHA for personal password authentication
View through CrossRef
CAPTCHA was introduced decades ago to distinguish between humans and bots. However, solving CAPTCHA has been a challenging issue for intruders. Various techniques, such as 3rd-party attacks, have been invented to break CAPTCHA. This research proposes ProCAPTCHA, a CAPTCHA system individually generated for each user by merging biometrics and user profiles. ProCAPTCHA leverages keystroke dynamics and personal information to create unique CAPTCHAs that are difficult for intruders to solve. ProCAPTCHA’s algorithm generates CAPTCHA based on the user’s profile data, ensuring randomness and uniqueness for each login. Performance evaluation shows that ProCAPTCHA can identify legitimate users with 100% accuracy, while only 60% of intruders are misclassified as true users. Bots face significant delays, often failing due to system time limits. Nonetheless, the bot’s attack must spend a very long time solving which, in real life, could be interrupted by the time limit of the system. Therefore, all bots cannot gain access as required.
Title: ProCAPTCHA: A profile-based CAPTCHA for personal password authentication
Description:
CAPTCHA was introduced decades ago to distinguish between humans and bots.
However, solving CAPTCHA has been a challenging issue for intruders.
Various techniques, such as 3rd-party attacks, have been invented to break CAPTCHA.
This research proposes ProCAPTCHA, a CAPTCHA system individually generated for each user by merging biometrics and user profiles.
ProCAPTCHA leverages keystroke dynamics and personal information to create unique CAPTCHAs that are difficult for intruders to solve.
ProCAPTCHA’s algorithm generates CAPTCHA based on the user’s profile data, ensuring randomness and uniqueness for each login.
Performance evaluation shows that ProCAPTCHA can identify legitimate users with 100% accuracy, while only 60% of intruders are misclassified as true users.
Bots face significant delays, often failing due to system time limits.
Nonetheless, the bot’s attack must spend a very long time solving which, in real life, could be interrupted by the time limit of the system.
Therefore, all bots cannot gain access as required.
Related Results
AUTHENTICATION INDICATORS USING BIO-DETECTION FUNCTION WITH TEXT-BASED CAPTCHA
AUTHENTICATION INDICATORS USING BIO-DETECTION FUNCTION WITH TEXT-BASED CAPTCHA
Currently, CAPTCHA (Completely Automated Public Turing test to tell Computer and Human Apart) is used in the daily life before the Internet accessing for preventing automatic progr...
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Devanagari CAPTCHA: For the Security in Web
Devanagari CAPTCHA: For the Security in Web
Completely Automated Public Turing Test to Tell Computers and Humans Apart or CAPTCHA is a solution for cyber-attack. CAPTCHA is a small challenge that an internet user has to pass...
Development of authentication-based CAPTCHA mechanism on touch screen environment
Development of authentication-based CAPTCHA mechanism on touch screen environment
CAPTCHA is a simple security test that was introduced to distinguish among humans and bots for decades. CAPTCHAs have been widely used on commercial sites, such as email service, a...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Graphical Password Authentication
Graphical Password Authentication
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the grap...


