Advertisement

Security and Understanding Techniques for Visual CAPTCHA Interpretation

  • Natalia Krzyworzeka
  • Lidia OgielaEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 13)

Abstract

This paper attempts to present a new idea of data understanding and security processes for visual CAPTCHA recognition and interpretation. The proposition is dedicated to using visual CAPTCHA application including understanding processes, semantic analysis and recognition, to information security aspects. A new CAPTCHA scheme dedicated to authentication procedures with distortion algorithms will also be presented. In our solution we propose various shape and size distortions as well as new type of added noise. Paper in particular will present new directions of CAPTCHA applications, especially for understanding, security and support data management processes.

Keywords

Security algorithms Understanding processes Visual captcha Data management processes 

Notes

Acknowledgments

This work has been supported by the AGH University of Science and Technology Research Grant No. 11.11.200.307.

References

  1. 1.
    Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Building segmentation based human friendly human interaction proofs (HIPs). In: The 2nd International Workshop on Human Interactive Proofs (2005)Google Scholar
  2. 2.
    Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)Google Scholar
  3. 3.
    Iyobe, M., Ishida, T., Miyakawa, A., Uchida, N., Sugita, K., Shibata, Y.: Development of a mobile virtual traditional crafting presentation system using augmented reality technology. Int. J. Space Based Situat. Comput. 6, 239–251 (2014). doi: 10.1504/IJSSC.2016.082769 CrossRefGoogle Scholar
  4. 4.
    Nishino, H., Goto, R., Fukakusa, Y., Lin, J., Kagawa, T., Yoshida, K., Utsumiya, K., Hirooka, J., Osada, T., Nagatomo, N., Aoki, E.: A touch screen interface design with tactile feedback for practical applications. Int. J. Space Based Situat. Comput. 3, 18–21 (2013). doi: 10.1504/IJSSC.2013.051974 CrossRefGoogle Scholar
  5. 5.
    Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008, Fourth International Conference on Natural Computation, Proceedings. Jian, Peoples Republic China, October 18–20, vol. 6. pp. 245–247 (2008)Google Scholar
  6. 6.
    Ogiela, L.: Towards cognitive economy. Soft. Comput. 18(9), 1675–1683 (2014)CrossRefGoogle Scholar
  7. 7.
    Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, September 10–12, pp. 257–261 (2014)Google Scholar
  8. 8.
    Ogiela, L., Ogiela, M.R.: Management Information Systems. Lecture Notes in Electrical Engineering, vol. 331, pp. 449–456 (2015)Google Scholar
  9. 9.
    Ogiela, M.R., Ogiela, U.: Grammar Encoding in DNA-Like Secret Sharing Infrastructure. Lecture Notes in Computer Science, vol. 6059, pp. 175–182 (2010)Google Scholar
  10. 10.
    Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, London (2014)CrossRefzbMATHGoogle Scholar
  11. 11.
    Ogiela, U., Takizawa, M., Ogiela, L.: Security of Selected Secret Sharing Schemes, in Innovative Mobile and Internet Services in Ubiquitous Computing. Advances in Intelligent Systems and Computing, vol. 612, Springer International Publishing AG (2018). doi: 10.1007/978-3-319-61542-4_37
  12. 12.
    Roshanbin, N.: Interweaving Unicode, Color, and Human Interactions to Enhance CAPTCHA Security. Software Engineering and Intelligent Systems Department of Electrical and Computer Engineering University of Alberta Narges Roshanbin (2014)Google Scholar
  13. 13.
    Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)zbMATHGoogle Scholar
  14. 14.
    Zhou, E., Niibori, M., Okamoto, S., Kamada, M., Yonekura, T.: IslayTouch: an educational visual programming environment for tablet devices. Int. J. Space Based Situat. Comput. 6, 183–197 (2016). doi: 10.1504/IJSSC.2016.080285 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.AGH University of Science and TechnologyKrakowPoland

Personalised recommendations