Skip to main content

An Efficient Password Authentication Method Using CAPTCHA

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6935))

Included in the following conference series:

Abstract

User authentication is one of the most important security requirements for online financial transactions services to support users on the web. These securityservices should posses features, such as secure tunneling connection, and sniping attackprevention, keylog attack prevention etc. Malicious attackers maycapture user information such as users entered authentication information (ID, Password, card number, bank account number, etc)through keyboard hooking.This paper proposesa keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, S.J., Kwon, J.O.: Secure Key Exchange Protocols against Leakage of Long-term Private Keys for Financial Security Servers. KIISC Journal 19(3), 119–131 (2009)

    Google Scholar 

  2. Seung, J., Lee, S.-M., Noh, B.-N., Ahn, S.-H.: Extensional End-to-End Encryption Technologies to Enhance User’s Financial Information Security and Considerable Security Issues. KIISC Journal 8(4), 145–154 (2011)

    Google Scholar 

  3. KISA, SecurePass (April 2010), http://news.donga.com/3/all/20100415/27578455/1

  4. Maeng, Y.J., Nyang, D.H., Lee, K.H.: Password Authentication and Transaction Confirmation Method Using Secret Puzzle on Mobile Banking. KIISC Journal 21(1), 187–199 (2011)

    Google Scholar 

  5. Carnegie Mellon University. The Official CAPTCHA Site, http://www.captcha.net/

  6. Kim, S.H., Nyang, D.H., Lee, K.H.: Breaking character-based CAPTCHA using color information. KIISC Journal 19(6) (December 2009)

    Google Scholar 

  7. Mori, G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: Proc. of the Computer Vision and Pattern Recognition (CVPR) Conference, pp. 134–141. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  8. Prasad, S.: Microsoft Live Hotmail Under Attack by Streamlined Anti-CAPTCHA and Mass-mailing Operations (2008), http://securitylabs.websense.com/content/Blogs/3063.asp

  9. Yan, J., El Ahmad, A.S.: A Low-costAttack on a Microsoft CAPTCHA. In: Proceedings of the 15th ACM Conference of Computer and Communications Security, pp. 543–554 (October 2008)

    Google Scholar 

  10. Prasad, S.: Google’s CAPTCHA busted in recent spammer tactics (2008), http://securitylabs.websense.com/content/Blogs/2919.aspx

  11. Bunbury-Blanchette, E.: An image-based CAPTCHA that Exploits the difficulties in Computer Vision (April 2010)

    Google Scholar 

  12. Bongo CAPTCHA, http://www.captcha.net/captchas/bongo/

  13. PIX CAPTCHA, http://www.captcha.net/captchas/pix/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, BS., Choudhury, A.J., Lee, YS., Kim, TY., Lee, HJ. (2011). An Efficient Password Authentication Method Using CAPTCHA. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Lecture Notes in Computer Science, vol 6935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24082-9_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24082-9_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24081-2

  • Online ISBN: 978-3-642-24082-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics