SlideShare a Scribd company logo
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ABSTRACT Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security. Existing System Security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. A FUNDAMENTAL task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable. Disadvantages 
1. This paradigm has achieved just a limited success as compared with the cryptographic primitives based on hard math problems and their wide applications.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
1. Using hard AI (Artificial Intelligence) problems for security, initially proposed in [17], is an exciting new paradigm. Under this paradigm, the most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge. 
Proposed System We present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.We present exemplary CaRPs built on both text Captcha and image-recognition Captcha. One of them is a text CaRP wherein a password is a sequence of characters like a text password, but entered by clicking the right character sequence on CaRP images. CaRP offers protection against online dictionary attacks on passwords, which have been for long time a major security threat for various online services. This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear. Advantages: 
1. It offers reasonable security and usability and appears to fit well with some practical applications for improving online security. 
2. This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:- 
1. Graphical Password : 
In this module, Users are having authentication and security to access the detail which is presented in the Image system. Before accessing or searching the details user should have the account in that otherwise they should register first. 
2. Captica in Authentication: 
It was introduced in [14] to use both Captcha and password in a user authentication protocol, which we call Captcha-based Password Authentication (CbPA) protocol, to counter online dictionary attacks. The CbPA-protocol in requires solving a Captcha challenge after inputting a valid pair of user ID and password unless a valid browser cookie is received. For an invalid pair of user ID and password, the user has a certain probability to solve a Captcha challenge before being denied access. 3. Thwart Guessing Attacks : 
In a guessing attack, a password guess tested in an unsuccessful trial is determined wrong and excluded from subsequent trials. The number of undetermined password guesses decreases with more trials, leading to a better chance of finding the password. To counter guessing attacks, traditional approaches in designing graphical passwords aim at increasing the effective password space to make passwords harder to guess and thus require more trials. No matter how secure a
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
graphical password scheme is, the password can always be found by a brute force attack. In this paper, we distinguish two types of guessing attacks: automatic guessing attacks apply an automatic trial and error process but S can be manually constructed whereas human guessing attacks apply a manual trial and error process. 4. Security Of Underlying Captcha: Computational intractability in recognizing objects in CaRP images is fundamental to CaRP. Existing analyses on Captcha security were mostly case by case or used an approximate process. No theoretic security model has been established yet. Object segmentation is considered as a computationallyexpensive, combinatorially-hard problem, which modern text Captcha schemes rely on. 
System Configuration:- 
H/W System Configuration:- 
Processor - Pentium –III 
Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 5.0 
 Database Connectivity : JDBC.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218

More Related Content

PPTX
Efficient Securing System Using Graphical Captcha
PPTX
captcha as a graphical password
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
PDF
Captcha as Graphical Password- CaRP
PPTX
Captcha as graphical password
PDF
CARP: AN IMAGE BASED SECURITY USING I-PAS
PDF
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
DOCX
Engineering Project of Venkata Krishna
Efficient Securing System Using Graphical Captcha
captcha as a graphical password
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as Graphical Password- CaRP
Captcha as graphical password
CARP: AN IMAGE BASED SECURITY USING I-PAS
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Engineering Project of Venkata Krishna

What's hot (19)

PDF
IRJET- Carp a Graphical Password: Enhancing Security using AI
PDF
Image authentication for secure login
PDF
Behavioural biometrics and cognitive security authentication comparison study
PDF
E0962833
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
PDF
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
PDF
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
PPTX
Image-Based Authentication from Confident Technologies
PDF
Online Payment System using Steganography and Visual Cryptography
PDF
Cw4201656660
PDF
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
PDF
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
PDF
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
PDF
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
PDF
Ethical hacking interview questions and answers
PDF
OA_Cyber security course with AI
PDF
Online applications using strong authentication with OTP grid cards
PDF
A countermeasure for security intensification in cloud using CaPGP
IRJET- Carp a Graphical Password: Enhancing Security using AI
Image authentication for secure login
Behavioural biometrics and cognitive security authentication comparison study
E0962833
Pass byo bring your own picture for securing graphical passwords
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
Image-Based Authentication from Confident Technologies
Online Payment System using Steganography and Visual Cryptography
Cw4201656660
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...
Ethical hacking interview questions and answers
OA_Cyber security course with AI
Online applications using strong authentication with OTP grid cards
A countermeasure for security intensification in cloud using CaPGP
Ad

Viewers also liked (13)

DOC
Designing truthful spectrum double auctions with local markets
PDF
Decentralized access control with anonymous authentication of data stored in ...
PDF
Preserving location privacy in geo social applications
DOCX
Secure ordered bucketization
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A system for denial of-service attack detection based on multivariate correla...
DOC
Keyword query routing
PDF
Privacy preserving optimal meeting location determination on mobile devices
PDF
Supporting privacy protection in personalized web search (1)
DOC
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
DOC
Governing software process improvements in globally distributed product devel...
DOCX
A scalable and mobility resilient data search system for large-scale mobile w...
DOC
WEB IMAGE RE-RANKING USING QUERY-SPECIFIC SEMANTIC SIGNATURES
Designing truthful spectrum double auctions with local markets
Decentralized access control with anonymous authentication of data stored in ...
Preserving location privacy in geo social applications
Secure ordered bucketization
Privacy preserving multi-keyword ranked search over encrypted cloud data
A system for denial of-service attack detection based on multivariate correla...
Keyword query routing
Privacy preserving optimal meeting location determination on mobile devices
Supporting privacy protection in personalized web search (1)
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
Governing software process improvements in globally distributed product devel...
A scalable and mobility resilient data search system for large-scale mobile w...
WEB IMAGE RE-RANKING USING QUERY-SPECIFIC SEMANTIC SIGNATURES
Ad

Similar to Captcha as graphical passwords a new security primitive based on hard ai problems (20)

PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
DOCX
captcha and graphical
DOCX
captcha as graphical passwords—a new security primitive based on hard ai prob...
PDF
Security for Hard AI Problems Using CaRP Authentication
DOCX
captcha as graphical passwords—a new security
PDF
Ijsrdv8 i10355
DOCX
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
DOCX
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
PDF
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
DOCX
How a CAPTCHA Breaking Tool Using Machine Learning Is Changing Online Securit...
PDF
Evolution of captcha technologies
PDF
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
PDF
Ipas implicit password_authentication_system
PDF
ipas implicit password authentication system ieee 2011
PDF
Assurance of security and privacy requirements for cloudd eployment model
PDF
Stamp enabling privacy preserving location proofs for mobile users
PPTX
finale.ppt.pptx
PDF
Adaptive authentication to determine login attempt penalty from multiple inpu...
Captcha as graphical passwords a new security primitive based on hard ai prob...
captcha and graphical
captcha as graphical passwords—a new security primitive based on hard ai prob...
Security for Hard AI Problems Using CaRP Authentication
captcha as graphical passwords—a new security
Ijsrdv8 i10355
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
CAPTCHA as Graphical Password: A Novel Approach to Enhance the Security in WWW
Key aggregate cryptosystem for scalable data sharing in cloud storage
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
How a CAPTCHA Breaking Tool Using Machine Learning Is Changing Online Securit...
Evolution of captcha technologies
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Ipas implicit password_authentication_system
ipas implicit password authentication system ieee 2011
Assurance of security and privacy requirements for cloudd eployment model
Stamp enabling privacy preserving location proofs for mobile users
finale.ppt.pptx
Adaptive authentication to determine login attempt penalty from multiple inpu...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Pre independence Education in Inndia.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Insiders guide to clinical Medicine.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Institutional Correction lecture only . . .
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
GDM (1) (1).pptx small presentation for students
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pre independence Education in Inndia.pdf
Anesthesia in Laparoscopic Surgery in India
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Institutional Correction lecture only . . .
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
master seminar digital applications in india
Classroom Observation Tools for Teachers

Captcha as graphical passwords a new security primitive based on hard ai problems

  • 1. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ABSTRACT Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security. Existing System Security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. A FUNDAMENTAL task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable. Disadvantages 1. This paradigm has achieved just a limited success as compared with the cryptographic primitives based on hard math problems and their wide applications.
  • 2. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 1. Using hard AI (Artificial Intelligence) problems for security, initially proposed in [17], is an exciting new paradigm. Under this paradigm, the most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge. Proposed System We present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as graphical passwords (CaRP). CaRP is both a Captcha and a graphical password scheme. CaRP addresses a number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual-view technologies, shoulder-surfing attacks. Notably, a CaRP password can be found only probabilistically by automatic online guessing attacks even if the password is in the search set. CaRP also offers a novel approach to address the well-known image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. CaRP is not a panacea, but it offers reasonable security and usability and appears to fit well with some practical applications for improving online security.We present exemplary CaRPs built on both text Captcha and image-recognition Captcha. One of them is a text CaRP wherein a password is a sequence of characters like a text password, but entered by clicking the right character sequence on CaRP images. CaRP offers protection against online dictionary attacks on passwords, which have been for long time a major security threat for various online services. This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear. Advantages: 1. It offers reasonable security and usability and appears to fit well with some practical applications for improving online security. 2. This threat is widespread and considered as a top cyber security risk. Defense against online dictionary attacks is a more subtle problem than it might appear.
  • 3. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:- 1. Graphical Password : In this module, Users are having authentication and security to access the detail which is presented in the Image system. Before accessing or searching the details user should have the account in that otherwise they should register first. 2. Captica in Authentication: It was introduced in [14] to use both Captcha and password in a user authentication protocol, which we call Captcha-based Password Authentication (CbPA) protocol, to counter online dictionary attacks. The CbPA-protocol in requires solving a Captcha challenge after inputting a valid pair of user ID and password unless a valid browser cookie is received. For an invalid pair of user ID and password, the user has a certain probability to solve a Captcha challenge before being denied access. 3. Thwart Guessing Attacks : In a guessing attack, a password guess tested in an unsuccessful trial is determined wrong and excluded from subsequent trials. The number of undetermined password guesses decreases with more trials, leading to a better chance of finding the password. To counter guessing attacks, traditional approaches in designing graphical passwords aim at increasing the effective password space to make passwords harder to guess and thus require more trials. No matter how secure a
  • 4. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218 graphical password scheme is, the password can always be found by a brute force attack. In this paper, we distinguish two types of guessing attacks: automatic guessing attacks apply an automatic trial and error process but S can be manually constructed whereas human guessing attacks apply a manual trial and error process. 4. Security Of Underlying Captcha: Computational intractability in recognizing objects in CaRP images is fundamental to CaRP. Existing analyses on Captcha security were mostly case by case or used an approximate process. No theoretic security model has been established yet. Object segmentation is considered as a computationallyexpensive, combinatorially-hard problem, which modern text Captcha schemes rely on. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0  Database Connectivity : JDBC.
  • 5. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: Shakastech@gmail.com Phone No: 0416-6066663/2247353 Mobile No: 9500218218