Captcha Recognition and Robustness Measurement using Image Processing Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 1
Abstract
The advances in web-based technology have revolutionized the way people communicate and share information, necessitating firm security measures. Network security prevents and monitors unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a standard security mechanism for addressing undesirable or malicious Internet bot programs. CAPTCHA generates and grades tests that are human solvable, but beyond the capabilities of current computer programs. Captcha prevents quality degradation of a system by automated software, protect systems that are vulnerable to e- mail spam and minimizes automated posting to blogs, forums and wikis. This paper carries out a systematic study of various Text-based Captchas and proposes the application of Forepart based prediction and Character-Adaptive Masking to break these captchas to evaluate their robustness. Captcha segmentation and recognition is based on Forepart prediction, necessity sufficiency matching and Character-adaptive masking. Different classes of captchas like simple captchas, Botdetect captchas & Google captchas are taken into consideration
Authors and Affiliations
Ramya T
Survey on Security Vulnerabilities in Cloud Computing Environment
Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. Cloud services are becoming an...
Mobile Streaming: Android Based Mobile Tv
Cloud computing is an emerging technology aimed at providing various computing and storage services over the Internet. Multimedia cloud computing is generally related to multimedia computing over grids, content delivery,...
New Skills for Testers
In our world, software development and testing teams often work under ambitious deadlines, discovering what needs to be done at the same time as they’re discovering how to do [1]. On the other front, there is a...
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
[b]Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review [/b]
Abstract: MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults. Countless critical management schemes for MANETs are given to fix assorted protectio...