Cover
Vol. 15 No. 2 (2024)

Published: November 15, 2024

Pages: 121-130

Research Paper

CAPTCHA Mechanism to Protect User Information on Online Platforms

Abstract

CAPTCHA, which stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart, is a commonly employed security measure to distinguish between humans and computers. The Turing Test, designed to guarantee network security, is the foundation of this security technique. Usability is a crucial concern that can prevent human users from engaging in laborious and time-consuming tasks. When designing CAPTCHA, security and usability must be addressed simultaneously. When designing CAPTCHA, it is crucial to address security and usability simultaneously. A concerted effort is required to protect online data and guarantee privacy and security. The personal information of Internet users remains susceptible to theft. This study uses an information extraction technique called CAPTCHA to investigate the hazards associated with violating user privacy. It is a highly harmful process due to hacking, theft, unauthorized reuse, and the breach of user information. This study proposes a privacy preservation system employing concurrent encryption techniques, multilateral security computing, and zero-knowledge proof. The objective is to create a system that allows for uncomplicated and secure puzzle-solving using dice gas. CAPTCHA limits access to users' information. In the overview and application of evidentiary measurable methods, we can draw significant conclusions about the more extensive client group's discernments and encounters with CAPTCHA as a privacy-preserving component.

References

  1. Wang, P., Gao, H., Xiao, C., Guo, X., Gao, Y., & Zi, Y. (2023). Extended research on the security of visual reasoning captcha. IEEE Transactions on Dependable and Secure Computing, 20(6), 4976-4992.
  2. Sakhare, S. R., & Patil, V. D. (2023). Implementation of Captcha Mechanisms using Deep Learning to Prevent Automated Bot Attacks. Research Journal of Computer Systems and Engineering, 4(2), 01-15.
  3. Guerar M, Verderame L, Migliardi M, Palmieri F, Merlo A. Gotta CAPTCHA’Em all: a survey of 20 Years of the human-or-computer Dilemma. ACM Computing Surveys (CSUR). 2021;54(9):1-33.
  4. Sakhare, S. R., & Patil, V. D. (2023). Implementation of Captcha Mechanisms using Deep Learning to Prevent Automated Bot Attacks. Research Journal of Computer Systems and Engineering, 4(2), 01-15.
  5. Dinh, N. T., & Hoang, V. T. (2023). Recent advances of Captcha security analysis: a short literature review. Procedia Computer Science, 218, 2550-2562.
  6. Fanelle V, Karimi S, Shah A, Subramanian B, Das S. Blind and human: Exploring more usable audio {CAPTCHA} designs. InSixteenth Symposium on Usable Privacy and Security (SOUPS 2020) 2020 (pp. 111-125).
  7. Chen J, Luo X, Hu J, Ye D, Gong D. An attack on hollow captcha using accurate filling and nonredundant merging. IETE Technical Review. 2018 ;35:106-18.
  8. Al Smadi, K. A., Al_ Rababah, M. A. A., & Al Smadi, T. (2021). Analytical Survey : Speech Recognition Methods Used In Voice Recognition Techniques. Journal of Advanced Sciences and Engineering Technologies, 1(2), 1–8. https://doi.org/10.32441/jaset.01.02.07
  9. Liu J, Tian Y, Zhou Y, Xiao Y, Ansari N. Privacy-preserving distributed data mining based on secure multi-party computation. Computer Communications 2020;153:208-16.
  10. Al-Maitah M, Al Smadi TA, Al-Zoubi HQ. Scalable User Interface. Research Journal of Applied Sciences, Engineering and Technology 2014;7(16):3273-9.
  11. Khaldoon A., O., kamil N., Y., A. Abbas, A., & Al Smadi, T. (2024). A Novel Flying Robot Swarm Formation Technique Based on Adaptive Wireless Communication using MUSIC Algorithm. International Journal of Electrical and Electronics Research, 12(2), 688–695. CLOCKSS. https://doi.org/10.37391/ijeer.120247
  12. Igried AK, Takialddin AS, Igried AK. Risk and Vulnerability Analyses for protecting Information for Future Communication Security Security Based Neural Networks. Journal of Advanced Sciences and Engineering Technologies. 2019;2(1):31-9.
  13. Dinh NT, Hoang VT. Recent advances of Captcha security analysis: a short literature review. Procedia Computer Science 2023 ;218:2550-62.
  14. Zhang X, Liu X, Sarkodie-Gyan T, Li Z. Developing a character CAPTCHA recognition system for the visually impaired community using deep learning. Machine vision and applications. 2021 Jan;32:1-9.
  15. Querejeta-Azurmendi I, Papadopoulos P, Varvello M, Nappa A, Zhang J, Livshits B. ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices. arXiv preprint arXiv:1911.07649. 2019 No18.
  16. Gilbert LS, Jackson K, Di Gregorio S. Tools for analyzing qualitative data: The history and relevance of qualitative data analysis software. Handbook of research on educational communications and technology 2014:221-36.
  17. Poongodi M, Bose S. Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET. Cluster Computing 2015;18:1549-59.
  18. Daş, R., Baykara, M., & Tuna, M. (2023, April). Novel CAPTCHA approaches to protect web forms against bots. In The Third International Symposium on Digital Forensics and Security (ISDFS 2015). https://silo. tips/download/isdfs-2015-program-0930-0945-opening-speeches-prof-eref-sairolu-chair-isdfs-prof. Accessed (Vol. 29).
  19. Algwil, A. M. (2023). A Survey on Captcha: Origin, Applications And Classification. Journal of Basic Sciences, 36(1), 1-37.
  20. Wang P, Gao H, Xiao C, Guo X, Gao Y, Zi Y. Extended research on the security of visual reasoning captcha. IEEE Transactions on Dependable and Secure Computing. 2023 Jan 20.