Abstract
A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a program that can generate and grade tests that humans can pass but current computer programs cannot. The humans can read distorted text as the one shown below, but current computer programs cannot. We have proposed a novel chaos-based CAPTCHA. We have utilized our proposed S-box and used chaotic iterative relation to select a completely random CAPTCHA for the security of web portal and other user interface multimedia where human interaction with the machine is verified.









Similar content being viewed by others
References
von Ahn, L, Blum, M, Hopper, N.J., Langford, J.: The CAPTCHA Web Page: http://www.captcha.net (2000)
von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (automatically) or how lazy cryptographers do AI. Commun. ACM 47, 57–60 (2004)
Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In 38th IEEE Symposium on Foundations of Computer Science (FOCS’ 97), pp. 374–383. IEEE Computer Society (1997)
Mikhail, M.: Bongard. Pattern Recognition. Spartan Books, Rochelle Park (1970)
Coates, A.L., Baird, H.S., Fateman, R.J.: Pessimal print: a reverse turing test. In proceedings of the international conference on document analysis and recognition (ICDAR’ 01), pp. 1154–1159. Seattle WA, (2001)
Craver, S.: On public-key steganography in the presence of an active warden. In Proceedings of the Second international information hiding workshop, pp. 355–368. Springer, (1998)
Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Barbara, S. (ed.) Advances in Cryptology. CRYPTO’ 02, volume 2442 of Lecture Notes in Computer Science, pp. 77–92. CA, (2002)
Lillibridge, M.D., Abadi, M., Bharat, K., Broder, A.: Method for selectively restricting access to computer systems. US Patent 6,195,698. Applied April 1998 and Approved Feb 2001
Mori, G., Malik, J.: Breaking a visual CAPTCHA. Unpublished Manuscript, 2002. Available electronically: http://www.cs.berkeley.edu/~mori/gimpy/gimpy.pdf
Naor, M.: Verification of a human in the loop or Identification via the Turing Test. Unpublished Manuscript, 1997. Available electronically: http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human.ps
Pinkas, B, Sander, T.: Securing passwords against dictionary attacks. In Proceedings of the ACM Computer and Security Conference (CCS’ 02), pp. 161–170. ACM Press, (2002)
Rice, S., Nagy, G., Nartker, T.: Optical Character Recognition: An Illustrated Guide to the Frontier. Kluwer Academic Publishers, Boston (1999)
Shamir, A., Tromer, E.: Factoring large numbers with the TWIRL device. Unpublished Manuscript, 2003. Available electronically: http://www.cryptome.org/twirl.ps.gz
Xu, J., Lipton, R., Essa, I..: Hello, are you human. Technical Report GIT-CC-00-28, Georgia Institute of Technology, November (2000)
Khan, M., Shah, T., Mahmood, H.: Muhammad Asif Gondal. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(2013), 493–504 (2013)
Khan, M., Shah, T.: Muhammad Asif Gondal. An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013), 1795–1801 (2013)
Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76, 377–382 (2014)
Khan, M., Shah, T.: An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. (2013). doi:10.1007/s11760-013-0577-4
Khan, M., Shah, T.: A novel image encryption technique based on Hénon chaotic map and S\(_8\) symmetric group, Neural Comput & Applic. (2014). doi:10.1007/s00521-014-1663-4
Khan, M., Shah, T.: A novel statistical analysis of chaotic s-box in image encryption. 3D Res 5, 16 (2014). doi:10.1007/s13319-014-0016-5