Nothing Special   »   [go: up one dir, main page]

Skip to main content

Security of Visual Captcha for Authentication Procedures

  • Conference paper
  • First Online:
Advances in Network-Based Information Systems (NBiS 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 7))

Included in the following conference series:

  • 1551 Accesses

Abstract

In this paper will be described new idea of security procedures using visual captcha, and dedicated to authentication procedures. In particular will be presented the most important aspects connected with security of visual captcha used in security procedures, implemented in service management solutions in Cloud environment. Services management in Cloud Computing will be connected with application of secure cognitive information and cognitive management systems, supporting management activities and securing data using visual captcha solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intell. 226, 13–20 (2009)

    MATH  Google Scholar 

  2. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-Like secret sharing infrastructure. In: Lecture Notes in Computer Science, vol. 6059, pp. 175–182 (2010)

    Google Scholar 

  3. Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)

    MATH  Google Scholar 

  4. Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, 13–15 December 2008, Hainan Island, China, vol. 1, pp. 377–380 (2008)

    Google Scholar 

  5. Ogiela, M.R., Ogiela, U.: Secure Information Management using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014)

    MATH  Google Scholar 

  6. Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. Commun. Comput. Inf. Sci. 58, 35–42 (2009)

    MATH  Google Scholar 

  7. Ohkawara, T., Aikebaier, A., Enokido, T., Takizawa, M.: Quorum-based synchronization protocols for multimedia replicas. Int. J. Cluster Comput. 16(4), 979–988 (2013)

    Article  Google Scholar 

  8. Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquit. Comput. 17(2/3), 100–109 (2014)

    Article  Google Scholar 

  9. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)

    Google Scholar 

  10. Ogiela, U., Takizawa, M., Ogiela, L.: Security of selected secret sharing schemes, in innovative mobile and internet services in ubiquitous computing. In: Advances in Intelligent Systems and Computing, vol. 612. Springer International Publishing AG (2018). doi:10.1007/978-3-319-61542-4_37

  11. Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intell. 309, 347–369 (2010)

    Google Scholar 

  12. Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science, in advances in cognitive information systems. Cogn. Syst. Monogr. 17, 1–18 (2012)

    Article  MATH  Google Scholar 

  13. Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58–69 (2013)

    Article  Google Scholar 

  14. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, 10–12 September 2014, pp. 257–261 (2014)

    Google Scholar 

  15. Ogiela, L., Ogiela, M.R.: Management information systems. In: Lecture Notes in Electrical Engineering, vol. 331, pp. 449–456 (2015)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by JSPS KAKENHI grant number 15H0295.

This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lidia Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ogiela, U., Takizawa, M., Ogiela, L. (2018). Security of Visual Captcha for Authentication Procedures. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65521-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65520-8

  • Online ISBN: 978-3-319-65521-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics