Engineering graphical captcha and AES crypto hash functions for secure online authentication

N Kheshaifaty, A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
Password alone is not trusted for user online authentication since mere password cannot
give full surety of proper access control. The authentication of the users is one of the key …

Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication

A Gutub, N Kheshaifaty - Multimedia Tools and Applications, 2023 - Springer
Abstract CAPTCHA as “Completely Automated Public Turing test to tell Computers and
Humans Apart” is becoming an essential tool to help reduce many automated security …

[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions

N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
Authentication is the process of verifying the identity of online computer users. It can be
confirmed using various methods such as captchas or encrypted hashed passwords to …

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT

M Guerar, A Merlo, M Migliardi, F Palmieri - computers & security, 2018 - Elsevier
Smartphone devices are often assuming the role of edge systems in mobile IoT scenarios
and the access to cloud-based services through smartphones, for transmitting multiple …

ImageVeriBypasser: An image verification code recognition approach based on Convolutional Neural Network

T Ji, Y Luo, Y Lin, Y Yang, Q Zheng, S Lian… - Expert Systems, 2024 - Wiley Online Library
The recent period has witnessed automated crawlers designed to automatically crack
passwords, which greatly risks various aspects of our lives. To prevent passwords from …

A privacy preserving based multi-biometric system for secure identification in cloud environment

RM Jasmine, J Jasper - Neural Processing Letters, 2022 - Springer
Privacy-preserving biometrics identification has drawn greater attention that efficiently
provides secure storage of sensitive information in cloud servers. In this paper, we design a …

A machine vision attack model on image based captchas challenge: Large scale evaluation

A Singh, V Tiwari, AN Tentu - … , SPACE 2018, Kanpur, India, December 15 …, 2018 - Springer
Over the past decade, several public web services made an attempt to prevent automated
scripts and exploitation by bots by interrogating a user to solve a Turing-test challenge …

Review and comparison of captcha approaches and a new captcha model

M Baykara, F Alnıak, K Çınar - 2018 6th International …, 2018 - ieeexplore.ieee.org
Captcha is an abbreviation of Completely Automated Public Turing test to Tell Computers
and Humans Apart. It is a technique used for verification purposes in many applications …

Multi-tier authentication of user access in cloud storage–A survey

S Shiny, J Jasper, RM Jasmine… - AIP Conference …, 2023 - pubs.aip.org
The huge issues that emerge when user access the cloud for gaining the services are the
security and privacy preservation. So a way should have been discovered to keep up the …

Hybrid authentication and confidentiality framework for secure cloud computing

M Singh, S Gond - 2021 4th Biennial International Conference …, 2021 - ieeexplore.ieee.org
Cloud Computing has emerged as a revolutionary technology which has proven its impact
on various fields which require large data storage and high end processing services …