2016
DOI: 10.1016/j.cose.2016.03.007
|View full text |Cite
|
Sign up to set email alerts
|

Development of two novel face-recognition CAPTCHAs: A security and usability study

Abstract: CAPTCHAs are challenge-response tests that aim at preventing unwanted machines, including bots, from accessing web services while providing easy access for humans. Recent advances in artificial-intelligence based attacks show that the level of security provided by many state-ofthe-art text-based CAPTCHAs is declining. At the same time, techniques for distorting and obscuring the text, which are used to maintain the level of security, make text-based CAPTCHAs difficult to solve for humans, and thereby further d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 56 publications
0
6
0
Order By: Relevance
“…In the implementation process of the proposed CAPTCHA, we considered the essential security requirements that make the CAPTCHA method more secure and eligible [23,24]. The IRemember CAPTCHA is implemented based on these requirements, including distortion levels, challenge type, randomness, time constraints, and size.…”
Section: Iremember Captcha Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In the implementation process of the proposed CAPTCHA, we considered the essential security requirements that make the CAPTCHA method more secure and eligible [23,24]. The IRemember CAPTCHA is implemented based on these requirements, including distortion levels, challenge type, randomness, time constraints, and size.…”
Section: Iremember Captcha Securitymentioning
confidence: 99%
“…reCAPGen schemes depend on choosing audio clips from old radio programs, podcasts, and YouTube lectures and adding the amount of noise. Noising minimally affects the human ability to solve the generated audio CAPTCHAs [4].…”
Section: Introductionmentioning
confidence: 99%
“…Process of information sharing usually refers to classified information. The personal verification method is used to reproduce the information [8]. In [9], if users biometric are compromised, it might be impossible or highly difficult to replace it in a particular system.…”
Section: Related Workmentioning
confidence: 99%
“…While the studies we referenced in this section, examined Usable Security evaluation in domains like health, and financial services, others were more component specific. For instance, Realpe et al (2016) examined the Usable Security of user authentication, Eskandari et al (2018) examined Usable Security of bitcoin key management, Green and Smith (2016) examined the usability of security APIs for developers and Schryen et al (2016) examined the usability of CAPTCHAs.…”
Section: Usable Security Evaluationmentioning
confidence: 99%