Skip to main content
Log in

A new implementation of chaotic S-boxes in CAPTCHA

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a program that can generate and grade tests that humans can pass but current computer programs cannot. The humans can read distorted text as the one shown below, but current computer programs cannot. We have proposed a novel chaos-based CAPTCHA. We have utilized our proposed S-box and used chaotic iterative relation to select a completely random CAPTCHA for the security of web portal and other user interface multimedia where human interaction with the machine is verified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. von Ahn, L, Blum, M, Hopper, N.J., Langford, J.: The CAPTCHA Web Page: http://www.captcha.net (2000)

  2. von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (automatically) or how lazy cryptographers do AI. Commun. ACM 47, 57–60 (2004)

  3. Bellare, M., Impagliazzo, R., Naor, M.: Does parallel repetition lower the error in computationally sound protocols? In 38th IEEE Symposium on Foundations of Computer Science (FOCS’ 97), pp. 374–383. IEEE Computer Society (1997)

  4. Mikhail, M.: Bongard. Pattern Recognition. Spartan Books, Rochelle Park (1970)

    Google Scholar 

  5. Coates, A.L., Baird, H.S., Fateman, R.J.: Pessimal print: a reverse turing test. In proceedings of the international conference on document analysis and recognition (ICDAR’ 01), pp. 1154–1159. Seattle WA, (2001)

  6. Craver, S.: On public-key steganography in the presence of an active warden. In Proceedings of the Second international information hiding workshop, pp. 355–368. Springer, (1998)

  7. Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Barbara, S. (ed.) Advances in Cryptology. CRYPTO’ 02, volume 2442 of Lecture Notes in Computer Science, pp. 77–92. CA, (2002)

  8. Lillibridge, M.D., Abadi, M., Bharat, K., Broder, A.: Method for selectively restricting access to computer systems. US Patent 6,195,698. Applied April 1998 and Approved Feb 2001

  9. Mori, G., Malik, J.: Breaking a visual CAPTCHA. Unpublished Manuscript, 2002. Available electronically: http://www.cs.berkeley.edu/~mori/gimpy/gimpy.pdf

  10. Naor, M.: Verification of a human in the loop or Identification via the Turing Test. Unpublished Manuscript, 1997. Available electronically: http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human.ps

  11. Pinkas, B, Sander, T.: Securing passwords against dictionary attacks. In Proceedings of the ACM Computer and Security Conference (CCS’ 02), pp. 161–170. ACM Press, (2002)

  12. Rice, S., Nagy, G., Nartker, T.: Optical Character Recognition: An Illustrated Guide to the Frontier. Kluwer Academic Publishers, Boston (1999)

    Book  Google Scholar 

  13. Shamir, A., Tromer, E.: Factoring large numbers with the TWIRL device. Unpublished Manuscript, 2003. Available electronically: http://www.cryptome.org/twirl.ps.gz

  14. Xu, J., Lipton, R., Essa, I..: Hello, are you human. Technical Report GIT-CC-00-28, Georgia Institute of Technology, November (2000)

  15. Khan, M., Shah, T., Mahmood, H.: Muhammad Asif Gondal. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(2013), 493–504 (2013)

    MathSciNet  Google Scholar 

  16. Khan, M., Shah, T.: Muhammad Asif Gondal. An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013), 1795–1801 (2013)

    Article  MathSciNet  Google Scholar 

  17. Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76, 377–382 (2014)

    Article  MathSciNet  Google Scholar 

  18. Khan, M., Shah, T.: An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. (2013). doi:10.1007/s11760-013-0577-4

  19. Khan, M., Shah, T.: A novel image encryption technique based on Hénon chaotic map and S\(_8\) symmetric group, Neural Comput & Applic. (2014). doi:10.1007/s00521-014-1663-4

  20. Khan, M., Shah, T.: A novel statistical analysis of chaotic s-box in image encryption. 3D Res 5, 16 (2014). doi:10.1007/s13319-014-0016-5

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Shah, T. & Batool, S.I. A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10, 293–300 (2016). https://doi.org/10.1007/s11760-014-0741-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-014-0741-5

Keywords

Navigation