2023
DOI: 10.1007/s11042-023-15586-5
|View full text |Cite
|
Sign up to set email alerts
|

Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication

Abstract: CAPTCHA as “Completely Automated Public Turing test to tell Computers and Humans Apart” is becoming an essential tool to help reduce many automated security authentication attacks. This research focused on studying differences running text-based CAPTCHA vs. graphical-based CAPTCHA in a utilization applicable dominant practicality manner. The ordinary text-based CAPTCHA works simple to prevent automated submissions as thought of being relatively easy to exploit. On the other hand, graphic-based CAPTCHA can be m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…These advanced deep learning techniques are mainly used in image-based CAPTCHA generation models, focusing on image generation. According to the study, image-based CAPTCHA is more popular than text-based CAPTCHA [5] . Thus, besides security measurement, the user-friendly performance is also considered in most of the research [24,33,[43][44][45][46][47][48] .…”
Section: Deep Learning Modelsmentioning
confidence: 99%
See 3 more Smart Citations
“…These advanced deep learning techniques are mainly used in image-based CAPTCHA generation models, focusing on image generation. According to the study, image-based CAPTCHA is more popular than text-based CAPTCHA [5] . Thus, besides security measurement, the user-friendly performance is also considered in most of the research [24,33,[43][44][45][46][47][48] .…”
Section: Deep Learning Modelsmentioning
confidence: 99%
“…This indicates the tendency to balance the security and user-friendly in CAPTCHA generation process. However, there still exists issues with identifying an appropriate balance between effectively avoiding attacks and maintaining user-friendliness [5,49,50] .…”
Section: Deep Learning Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…This type of attack can deplete the energy resources of surrounding nodes, creating energy gaps within Wireless Sensor Networks (WSNs) [3]. Among various routing attacks, the sinkhole attack falls under the Denial of Service (DoS) category and poses a severe threat to IoT environments [20]. Its destructive impact is further amplified when combined with other attacks, potentially causing significant damage.…”
Section: Sinkhole Attackmentioning
confidence: 99%