Confident Multi-Factor Authentication on web application via Captcha Technologies
K Siva Nagalakshmi, P.Suman Prakash, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSE, Assistant professor Department of Computer Science and EngineeringAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Evaluation of Captcha technologies towards prevention of phishing attacks as User Authentication Online
guessing attacks, relay attacks and shoulder surfing attacks are handled, where Captcha as graphical passwords
(CaRPS). CaRPS is click-based graphical passwords it performs a sequence of clicks on an image is used to derive a
password. Confident Multi-Factor Authentication. Consumers now have strong protection from the thousands of fraudulent
attacks that occur daily, without compromising the user experience. Confident Multi-Factor Authentication generates onetime passwords by prompting users to solve an image-based challenge on their mobile phone. Multi-Factor Authentication is
a secure, out-of-band (OOB) authentication process for you and easy-to-use additional security for your users Confident
Multi-Factor Authentication makes it easy to add strong authentication to your web application.
K Siva Nagalakshmi,P.Suman Prakash,Dr S.Prem Kumar."Confident Multi-Factor Authentication on web application via Captcha Technologies". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 08,pp.516-522, August - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I810.pdf,
 R. Biddle, S. Chiasson, and P. C. van Oorschot, ‚Graphical passwords: Learning from the first twelve years,‛ ACM Comput. Surveys, vol. 44, no. 4, 2012.
 The Science Behind Passfaces [Online].http://www.realuser.com/published/ScienceBe hindPassface s.pdf
 HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks 2010.
 H. Tao and C. Adams, ‚Pass-Go: A proposal to improve the usability of graphical passwords,‛ Int. J. Netw. Security, vol. 7, no. 2, pp. 273–292, 2008.
 D. Weinshall, ‚Cognitive authentication schemes safe against spyware,‛ in Proc. IEEE Symp, 2006.
 P. Dunphy and J. Yan, ‚Do background images improve ‘Draw a Secret’ graphical passwords,‛ in Proc. ACM CCS,2007.
 Napa Sae-Bae and Kowsar Ahmed, ‚Multitouch Gesture-Based Authentication‛, IEEE Transactions On Information Forensics And Security, April 2014.
 S. Chiasson, P. C. van Oorschot, and R. Biddle,‚Graphical password authentication using cued click points,‛ in Proc. ESORICS, 2007, pp. 359–374.
 S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, ‚Influencing users towards better passwords:Persuasive cued click-points,‛ in Proc. Brit. HCI Group Annu. Conf. vol. 1. 2008.
 Sooyeon Shin and Sarang Na, ‚Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected‛, IEEE Transactions On Systems, Man,And Cybernetics: Systems, June 2014.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.