2010 3rd International Conference on Emerging Trends in Engineering and Technology 2010
DOI: 10.1109/icetet.2010.126
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm for Secured Online Authentication Using CAPTCHA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Generally, different kinds of phishing attacks include deceptive phishing [3], phishing based on destructive software [4], web trojans [5], pharming [6], phishing injection [7], phishing using fake applications [8], domain hijacking [9], spear phishing [10] and changing user system settings attacks [6]. To confront these attacks many techniques and methods have been invented such Sign-in Seal [11], developing expert system based on characteristics of web pages in order to detect phishing websites [12], genetic algorithm based on anti-phishing techniques [13], detection of phishing attacks based on categorizing super links [14], attribute-based prevention of phishing attacks [15], content based on anti-phishing approach [16], confronting phishing attacks by two step identification [17], detection of phishing pages based on associated relationships [18], detection of phishing pages by comparing the amount of difference between the address string and the white list [19], ranking based antiphishing approach [20], and using data mining algorithms [21].…”
Section: Introductionmentioning
confidence: 99%
“…Generally, different kinds of phishing attacks include deceptive phishing [3], phishing based on destructive software [4], web trojans [5], pharming [6], phishing injection [7], phishing using fake applications [8], domain hijacking [9], spear phishing [10] and changing user system settings attacks [6]. To confront these attacks many techniques and methods have been invented such Sign-in Seal [11], developing expert system based on characteristics of web pages in order to detect phishing websites [12], genetic algorithm based on anti-phishing techniques [13], detection of phishing attacks based on categorizing super links [14], attribute-based prevention of phishing attacks [15], content based on anti-phishing approach [16], confronting phishing attacks by two step identification [17], detection of phishing pages based on associated relationships [18], detection of phishing pages by comparing the amount of difference between the address string and the white list [19], ranking based antiphishing approach [20], and using data mining algorithms [21].…”
Section: Introductionmentioning
confidence: 99%
“…Apart, is a computer program that human can pass but the current computer programs cannot [1]. It is mainly used to protect web-based services against automated computer programs.…”
Section: Captcha Stands For Completely Automated Public Turing Test Tmentioning
confidence: 99%
“…Another common method of breaking CAPTCHAs is using an image processing method. There are three major steps in this method: pre-processing, segmentation, and character recognition [1]. First, the color of distorted image of a CAPTCHA challenge is converted into a limited color (e.g.…”
Section: How Captchas Are Brokenmentioning
confidence: 99%
“…Noises are removed and the image is segmented into segments that may represent a character. Finally, in the character recognition phase the segmented characters are deciphered using pattern-matching techniques [1]. Figure 2 shows typical architecture of a CAPTCHA breaker system.…”
Section: How Captchas Are Brokenmentioning
confidence: 99%
See 1 more Smart Citation