Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations
Irtiqa Amin1 , Mohd Umar John2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 60-67, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.6067
Online published on Mar 31, 2019
Copyright © Irtiqa Amin, Mohd Umar John . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Irtiqa Amin, Mohd Umar John, “Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.60-67, 2019.
MLA Style Citation: Irtiqa Amin, Mohd Umar John "Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations." International Journal of Computer Sciences and Engineering 7.3 (2019): 60-67.
APA Style Citation: Irtiqa Amin, Mohd Umar John, (2019). Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations. International Journal of Computer Sciences and Engineering, 7(3), 60-67.
BibTex Style Citation:
@article{Amin_2019,
author = {Irtiqa Amin, Mohd Umar John},
title = {Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {60-67},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3797},
doi = {https://doi.org/10.26438/ijcse/v7i3.6067}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.6067}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3797
TI - Evaluating and Designing a Secure Text-Based CAPTCHA and Picture Password for Online Examinations
T2 - International Journal of Computer Sciences and Engineering
AU - Irtiqa Amin, Mohd Umar John
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 60-67
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
653 | 442 downloads | 207 downloads |
Abstract
Online Examination System is a software solution, which allows any industry or institute to arrange, conduct and manage examinations via an online environment. It can be done through the Internet/Intranet and/ Local Area Network environments. Problems arising from human hacking or technical difficulties may lead to questioning of reliability and efficiency of the online exams. The system architecture proposed in this paper provides integrated management of passwords that prevent unauthorized access by the other users who nowadays are a havoc for security of the portals. In this paper, the combination of CAPTCHA and picture password system is proposed which improved the capability of resistance to the attack by malicious programs. CAPTCHAs are used to improve the security of Internet based applications in order to ensure that a web based application which is intended to be used by a human being is not maliciously used by Artificially Intelligent programs called bots. Graphical passwords, which consist of clicking on images rather than typing alphanumeric strings, may help to overcome the problem of creating secure and memorable passwords. Our results showed that this combination is practical in the aspects of security and usability.
Key-Words / Index Term
CATCHA, Online Exam Portal, Picture Password, Security
References
[1]. Tugrul.Tasci, Parlek,. Z., Kiber, A., Tasbasi, M., and Cebeci, H.I. “A Novel Agent Supported Academic Online Examination System”. Educational Technology and Society. Vol.17, Issue. 1pp. 154-168, 2014
[2]. Gawali, R. D., &Meshram, B. B. “Agent-based autonomous examination systems.” In the Proceedings of the International Conference on Intelligent Agent & Multi-Agent Systems.pp 1-7. 2009.
[3]. Tallent. Runnels, M. K., Thomas, J. A., Lan, W. Y., Cooper, S., Ahern, T. C., Shaw, S. M., & Liu, X. “Teaching courses online: A review of the research.” Review of Educational Research, Vol. 76, Issue. 1; 93-135. 2006.
[4]. Aye, M. M., &Thwin, M. M. T. Mobile agent based online examination system. Proceedings of the 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology . pp. 193-196. 2008.
[5]. Zhang, L., Zhuang, Y. T., Yuan, Z. M., & Zhan, G. H. “A web-based examination and evaluation system for computer education”.In the Proceedings of the Sixth International Conference on Advanced Learning Technologies. pp. 120-124. 2006.
[6]. Jung, Y. “Enhanced security for online exams using group cryptography”. IEEE. Transaction Vol. 52 Issue. 3. pp.340-349. 2009.
[7]. Freeda, A.A., Sindhu, J. M., and Sujitha, K. “Image Captcha based authentication using virtual cryptography”. International Journal of Research in Engineering and Advanced Technology.Vol. 1sssue.2. pp.2320-2322. 2013.
[8]. Yogdhar Pandey and Darshika Lothe. “Evaluating the Usability and Security of a Spelling Based Captcha System”. International Journal of Computer Science and Information Technologies. Vol. 5 Issue. 3. pp. 4728-4731. . 2014 .
[9]. Kiranjot Kaur and Sunny Behal. “Designing a Secure Text-Based CAPTCHA.” In the 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) Procedia Computer Science Vol. 57. 122 – 125. 2015
[10]. Wahid Abdul. “A study on the secure Online Examination System.” Dissertation Abstract. Division of Electrical Engineering and Computer Science. Kanawaza University. 2016.
[11]. Swapnaja Ubale, Rekha Babar, Pooja Bhise, ShubhamNehere, TanujaPawar. “Strong Security Mechanism through Two Factor Authentication Text and Graphical Password.” International Journal of General Science and Engineering Research Vol. 4 Issue. 2pp.18-21. 2018.
[12]. Tamang, Tsheten, and Pattarasinee Bhattarakosol. “Uncover impact factors of text based CAPTCHA identification.” In the 7th International Conference on Computing and Convergence Technology (ICCCT)..Pp. 556-560. 2012.
[13]. Kuo. Feng Hwang., Cian-Cih Huang, and GeengNeng Y. “A Spelling based CAPTCHA system by using click.” In the International Symposium. On Biometrics and Security Technologies (ISBAST), pp. 1-8. 2012.
[14]. Sudheer. R. G., Venkata. G.P. and Hari. V.P. “Graphical Secure Password Method against Online Password Hackers (Guessing Attacks)”. International Journal of Computer Science and Mobile Computing.Vol 2 Issue 8. pp.163-168. 2013.
[15]. Wayne J. , Gavrika. S., Korolev . V., Ayers R. and Swanstrom. R. “Picture Password: A Visual Login Terchnique for mobile devices.”in the Tech. Report. NISTIR 7030, NIST, 2003.
[16]. Wazir Zada Khan, Mohammed Y Aalsalemand Yang Xiang. “A Graphical Password Based System for Small Mobile Devices” International Journal of Computer Science Issues,Vol. 8. Issuie. 5. pp.1694-1698. 2011
[17]. Andrew, F., Pullen, Darren and Harper, Colleen. “Case study of a computer based examination system.” Australian Journal of Educational Technology. Vol. 25 Issue. 4.pp 509- 523. 2009.
[18]. Fagbola Temitayo M., Adigun Adebisi A., Oke Alice O. “Computer-Based Test (Cbt) System For University Academic Enterprise Examination” International Journal Of Scientific & Technology Research .Vol 2, Issue 8. 2013.
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
2008
William Stallings and Lawrie Brown. Computer Se-
curity: Principle and Practices. Pearson Education,
William Stalings and lawrie brown: cpmputer security:priciple and practices. Pearson education 2008.
[19]. William Stalings and Lawrie Brown . “Computer Security:Principle and Practices”. Pearson Education 2008.
[20]. Greg Mori and Malik. J. “Recognizing Objects in Adversarial Clutter:Breaking a Visual CAPTCHA” . In the IEEE Computer Society Conference: Computer Vision and pattern Recognition CVPR’03..Vol 1. June 2003.
[21]. Kumari. R and Nand P. “Performance Analysis of Existing Routing Protocols”. International Journal of Science and Engineering . Vol5 Issue 5. 2017.
[22]. Okolie. S and Adetoba.B. “Comparative Analysis of Performance Chracteristics of well known Symmetric Key Encryption Algorithms.” International Journal of Network Security and Communication. Vol4 Issue 3 pp 1-6. 2016.