نتایج جستجو برای: Semantic Image CAPTCHA

تعداد نتایج: 475899  

As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...

2014
M. Korakakis E. Magkos

CAPTCHAs exploit the gap in the ability between a human and a machine to understand the semantics of specific multimedia content, with vast applications in computer security. In this paper we compare two techniques in automated CAPTCHA solving for text-based CAPTCHA schemes, i.e., classification based on the Vector Space Model (VSM) versus a popular Optical Character Recognition (OCR) engine. F...

2006
Bruno Norberto da Silva Ana Cristina Bicharra Garcia

We present a new method for image taxonomy. Our formulation shows how the combination of automated metadata-based analysis and knowledge-acquisition tools can help build better image search applications. We build on top of existing metadata-based techniques to image taxonomy and combine them to human assistance, in order to guarantee some minimal level of semantic soundness. Knowledge from huma...

To distinguish between human user and computer program to enhance security, a popular test called CAPTCHA is used on Web. CAPTCHA has an important role in preventing Denial Of Service (DOS) attacks in computer networks. There are many different types of CAPTCHA in different languages. Due to the expansion of Persian-language and documents on internet, creating a suitable Persian CAPTCHA seems t...

2011
Maryam Mehrnejad Abbas Ghaemi Bafghi Ahad Harati Ehsan Toreini

As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...

2015
Zhen Ye Yufeng Wu Wenyao Zhu Mingjun Wang

CAPTCHA is an important technology to prevent auto-script attack. Currently most of the CAPTCHA systems are text based, which firstly distort, rotate different characters and then use some obfuscation, aiming to make the text difficult to be recognized by autoscript while still can be learnt easily by real users. However, such kind of CAPTCHA schema either too simple, which can be attacked easi...

The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...

2014
Tapan Chauhan Nisha Shah

Captcha is a popular real user detection or autobot/robot rejection technique used in websites for Desktops. Captcha is also in use in some of the mobile websites. Captcha are difficult to read on the smartphone and portable computer screens. Users stuck in zooming in/zooming out while reading and filling the captcha and other required fields. Old aged users feel it more difficult to view and t...

2014
Joy Winnie Wise

Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing framework based on visual cryptography" to solve the problem of phishing. Here an im...

2015
R Abinaya S Janani P Nathiya Devi

Evolution in the world of internet has given rise to several online attacks and the most common attack is phishing. Victims are tricked into providing such information by a combination of spoofing techniques and social engineering. Phishing is an attempt by an individual or a group to acquire sensitive information such as usernames, passwords, and credit card details from unsuspecting victims. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید