تعداد نشریات | 418 |
تعداد شمارهها | 10,005 |
تعداد مقالات | 83,622 |
تعداد مشاهده مقاله | 78,340,845 |
تعداد دریافت فایل اصل مقاله | 55,384,128 |
IMPTCHA: A Creative Image CAPTCHA | ||
Journal of Computer & Robotics | ||
مقاله 6، دوره 13، شماره 2، اسفند 2020، صفحه 75-83 اصل مقاله (590.93 K) | ||
نویسنده | ||
Reza Shali* | ||
Faculty of Computer and Information Technology Engineering, Qazvin Branch, Inslamic Azad University, Qazvin, Iran | ||
چکیده | ||
Abstract We present IMPTCHA, a new CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) as a security measure to recognize human users. The proposed system uses images instead of distorted text to label images as a valuable output. IMPTCHA is generated from images on the Web. For passing this CAPTCHA, users must type two words for description of two images. When users pass the challenge, the provided meaningful labels are used to determine the content of images. In addition, semantic graphs for labels and images are created and according of it we’ll able to develop an image semantic search engine. Due to usage of images in this system, and its architecture, it is highly secure compared to its counterparts. In a user study involving 60 participants, IMPTCHA’s word accuracy is measured to be 98.18% while 61.26% of users could pass the challenge. Keywords:CAPTCHA, Ontology, Image labeling, Security | ||
کلیدواژهها | ||
CAPTCHA؛ Ontology؛ Image labeling؛ Security | ||
مراجع | ||
[1] L. Von Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum, "reCaptcha: Human-based character recognition via web security measures," Science, vol. 321, pp. 1465-1468, 2008. [2] ElieBursztein , Matthieu Martin , John Mitchell, Textbased CAPTCHA strengths and weaknesses, Proceedings of the 18th ACM conference on Computer and communications security, October 17-21, 2011, Chicago, Illinois, USA . [3] Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. CAPTCHA: Using hard AI problems for security. In Eli Biham, editor, Advances in Cryptology – EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 294– 311. Springer, 2003. [4] Turing Test, http://en.wikipedia.org/wiki/Turing_test, visited Date: 05/05/2019. [5] What is reCAPTCHA?, http://www.google.com/recaptcha/learnmore,Visited Date: 10/05/2012. [6] J. Elson, J. R. Doucerur, J. Howell, and J. Saul.Asirra: A Captcha that exploits interest-aligned manual image categorization. In Proceedings of the 14th ACM conference on Computer and communications security, CCS ’07, pages 366–374, New York, NY, USA, 2007. ACM. [7] Nucaptcha,www.nucaptcha.com, visited date: 05/05/2012. [8] Kluever, K.A., and Zanibbi, R. (2009) Balancing Usability and Security in a Video CAPTCHA. Paper presented at the 5th Symposium on Usable Privacy and Security. July 2009. Mountain View, California. [9] How we broke the NuCaptcha video scheme and what we propose to fix it, http://elie.im/blog/security/how-webroke- the-nucaptcha-video-scheme-and-what-wepropose- to-fix-it/, Visited Date: 25/04/2012. [10] It’s 1999. Lowe, David G. (1999). "Object recognition from local scale-invariant features". Proceedings of the International Conference on Computer Vision. 2. pp. 1150–1157. DOI:10.1109/ICCV.1999.790410. [11] Von Ahn, L.; Dabbish, L. (2004)."Labeling images with a computer game".Proceedings of the 2004 conference on Human factors in computing systems - CHI '04. pp. 319–326. DOI:10.1145/985692.985733. ISBN 1581137028. | ||
آمار تعداد مشاهده مقاله: 283 تعداد دریافت فایل اصل مقاله: 198 |