Nobody downloaded yet

CAPTCHA - Thesis Proposal Example

Comments (0) Cite this document
Summary
Internets increase in size and services has brought about a lot of many conveniences but in order for this to be achieved a lot of challenges are being faced. Some of these challenges are in differentiating between legitimate computer users and unauthorized computer bots. This…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
CAPTCHA
Read TextPreview

Extract of sample "CAPTCHA"

Download file to see previous pages This thesis will also give a proposal on the future directions of creating reliable CAPTCHAS.
The main of this study is to determine the major visual visula CAPTCHAS being used and how they are created. The anti-segmentation and and anti-recognition techniques that are currently being used to make CAPTCHAS very hard for automated computer attacks and bots to segment the CAPTCHAS. This is intended to eventually help in creation of reliable CAPTCHAS.
There is increased insecurity by many web users in maintaining their privacy due to many hackers being able to acquire users personal information details. This study is to impact and increase users confidence in the use of CAPTCHAS as a security tool and to help visual CAPTCHA designers to formulate the best algorithms that will be used in creation of reliable anti-recognition and anti-segmentation techniques. This will eventually make user information and use of CAPTCHAS very secure against automated computer bots.
We will perform a deep analysis of the different anti-segmentation techniques that are used to prevent separation of CAPTCHAS characters in order to make a sense from them like collapsing, distortion and noise. We will also study some anti-recognition techniques like collapsing, distortion, waving and using multiple-fonts and sizes. We will be conducting a comparative research based on existing research in this area and concerns over information security. We will collect data and statistics and represent the finding in forms of tables and charts.
`This study will be done through analysis and comparisons of previously researches done on the increase of security of CAPTCHAS. This will involve acquiring sample data and statistics relating to anti-segmentation, anti-recognition success rates of various visual CAPTCHAS. Comparing some algorithms used in the design of CAPTCHAS.
The data in this study will be mostly acquired from previous researches done on the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CAPTCHA Thesis Proposal Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1644897-captcha
(CAPTCHA Thesis Proposal Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1644897-captcha.
“CAPTCHA Thesis Proposal Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1644897-captcha.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CAPTCHA

Philosophy

...to the human senses. Turing test is the one that actually measures up to this level and thus it is much sufficient test to measure the thinking ability of any machine. The achievements of Turing Test prove its efficiency like none of the machines is able to still pass this test. AOLiza, IRC chatbots, Loebner Prize, CAPTCHA all are the achievements of Turing test making it an efficient test to measure the intelligence. Conclusion Thus, we can say that to pass a Turing test is not a compulsion or necessity to conclude a person capable of thinking and possessing intelligence. Though Turing test appears to be quite effective for assessing computers, it is not that much effective in certain social and ethical issues. All this...
10 Pages(2500 words)Essay

IT Security Threats and Countermeasures

.... Distributed denial of service attacks (DDoS) are initiated from multiple hosts, rather than the participation of a single host. 3.1.1 Repercussions of the Attack Roberts stated that the nation of Mynamar faced a massive denial of service attack in 2010 when their Ministry of Post and Telecommunication were attacked by denial of service. The investigation of the matter revealed that it was initiated from numerous sources thereby making it a distributed attack. It involved 10 to 15 Gbps of traffic to make the servers unavailable to legitimate users. This type of attack threatens the availability of the systems and services. 3.1.2 Countermeasures CAPTCHAs technology was introduced in the world of computing numerous years...
8 Pages(2000 words)Research Paper

Information Security Small Businesses

...be maintaining a whole network of compromised and effected computers which are used to send requests repeatedly on an automated basis. According to GossWeiler, Kamvar and Baluja (2009), Completely Automated Public Turing test to Tell Computers and Humans Apart (CAPTCHA) is a program that requires the reproduction of letters or figures that might be written in an ambiguous and unclear manner. The given phrases are always written in such a way that only a human eye can recognize the characters in a better manner than computer character recognition systems. Therefore, the reproduction of these characters ensures the computer that the request is legitimate and not attempting a DOS attack. In the light of the above arguments...
4 Pages(1000 words)Research Paper

Information Security

...made into bots (NIST). Recommendations As Lin and Chiueh (n.d.) describe, a denial of service attack (DOS attack) or distributed denial of service attack (DDOS attack) is an attempt by hackers to cut the availability of a network resource to its intended users. This type of attacks generally involves efforts to interrupt services of a host linked to internet temporarily. Common security solutions like filtering or anomalous packets based rate limiting are not sufficient to prevent DOS attacks. At present, the most effective way to handle DOS attacks is employing the Turing Test mechanism. Nowadays graphical CAPTCHAs are widely used to deal with this kind of situation. Graphical CAPTCHA “consists of a...
3 Pages(750 words)Research Proposal

Automation Tools Math Problem

... step. 3. Populate the suggestion in the associated frame. 4. Display the count of votes against each suggestion. 5. Display the captcha/security code below the text area in which the user can type the text for suggestion. Any steps you will take to make sure that the site is robust and secure. 1. Before posting suggestion, anonymous user must enter captcha /security code to minimize risks of scripting attack. 2. The web application must perform basic input validations like check for null and invalid characters which cannot be stored or accepted by database.... a VBA might be created within Excel by recording a macro. Even so it often proves necessary to resort to hand coding. Provide threeexamples where hand coding rather than recording a...
11 Pages(2750 words)Math Problem

Internet

..., the facility to enlarge the text is there. The text of the web site can be varied in the size but the text embedded in the images cannot be resized and so an alternative to images is kept which can render plain text against the images. The figures show that 1 in 12 men and 1 in 200 woman have some form of colour blindness (Webcredible, 2008). As a solution to this, the sites are trying to provide more flexibility in changing the text colour, size and type. A point under consideration is majority of the sites uses CAPTCHA images to register new users. This creates an inequality for disabled people having vision problems (blind or poor sight) to register on such sites. (Shirali-Shahreza, Mohammad Shirali-Shahreza...
3 Pages(750 words)Essay

Reverse Social Engineering Attacks in Online Social Networks

...be an attack profile. CAPTCHA is a tool that builds a bar for the incoming threats and should be regularly used by the members of networking sites. The reasons for the existence of fraud and social engineering attacks and the immediate failure of existing security mechanisms should be addressed through collaboration between criminologists, psychologists, economists and psychologists. The existent framework should be enhanced and improvised to meet the demanding infrastructure and work for a better solution for this dilemma should be initiated. References Irani, D. , Balduzzi, M. , Balzarotti, E.K and Pu, C. Reverse Social Engineering Attacks in Online Social Networks...
4 Pages(1000 words)Essay

Information systems 2

...photos can be chosen to allow people share or email your photos. Another vital feature is the option of who is eligible to send me some messages. For instance, in the spam section only friends are allowed to you messages. One is also eligible to keeping strangers from asking for a friend request. Another vital feature is the Captcha which controls on how one can keep out spam. Question 4 (ii) – Features of facebook Facebook there are three main entities. The profile page is a personal people’s page. In this section, there are friends and one has to own a profile page in order to be a participant in fan page or the group page. Obesphere (2010) asserts that fan page is a very vital section in facebook. This page is meant...
4 Pages(1000 words)Coursework

How to Use your Facebook Homepage

...HOW TO BUILD YOUR PROFILE 1.Fill out the sign up form-one needs to enter his/her first and last name, gender, address, and birthday, as well as the email address which you will use to log in to Facebook. In order to maintain the profile’s privacy, you will be required to come up a password. 2. Click the sign up button. One will be required to enter a captcha phrase just to ensure that you are human. After clicking the sign up button, the process of creating the account will commence. 3. Add friends-before beginning the process of creating your profile, Facebook will make a suggestion of individuals you would want to add as friends. If you do not recognize any of them, you can skip the step and proceed to the next. You... TO BUILD...
2 Pages(500 words)Assignment

How to Use Facebook

...which needs you to enter your first and last name, address, birthday, and finally, your gender. You would be required to come up with password and an email which you will use to log in into the Facebook account. Click the sign up form that will require you to enter the captcha phrase just to ensure you are human. After clicking the sign up button, the process of creating the account starts. Facebook would then suggest the individuals to add as friends. If you do not recognize any of them, you can skip to the next process. Entering your education and current employer is optional but useful in assisting others to connect with you (Harri, 2104). Then you can add a photo of your self. Verify your account: once you have...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis Proposal on topic CAPTCHA for FREE!

Contact Us