Providing Security to User Data using OTP and Image CAPTCHA

International Journal of Computer & Organization Trends  (IJCOT)          
© 2016 by IJCOT Journal
Volume - 6 Issue - 6
Year of Publication : 2016
Authors :  K. L. R. S. Himaja, Mrs.T. Sri Lakshmi
DOI : 10.14445/22492593/IJCOT-V37P304


K. L. R. S. Himaja, Mrs.T. Sri Lakshmi"Prevention Of Attacks And Mitigates The Packet Drop In Wireless Adhoc Networks", International Journal of Computer & organization Trends (IJCOT), V6(6):17-19 Nov - Dec 2016, ISSN:2249-2593, Published by Seventh Sense Research Group.

AbstractData Security is that preventing from unauthorized disclosure and modification. The basic and old method of computer authentication is to use alphanumerical usernames and passwords. This method has been shown to have important drawbacks i.e., These passwords are prone to be stolen and vulnerable to different types of attacks. Then Captcha technology came into existence but again it fails as an individual. Then after graphical password came into existence and has its own drawbacks. This paper provides OTP and image captcha together which provides high security.


[1] Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin, oPass: “A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks”, Ieee Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012.
[2] Prof. Bogiri Nagaraju Computer KJCOEMR Pune, Maharashtra,"Authentication Schemes for Session Passwords using Hybrid and Paired based Techniques", Multidisciplinary Journal of Research in Engineering and Technology Volume 1, Issue 2, Pg.175-182.
[3] Michel Abdalla , Emmanuel Bresson, Olivier Chevassut Provably Secure Password-Based Authentication in TLS March 21–24, 2006.
[4] Introduction to Basic Security Concepts by Robert H. Williams III, 2007.
[5] Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin Active One-Time Password Mechanism for User Authentication.
[6] Introduction to Basic Security Concepts by Robert H. Williams III, 2007.
[7] A Survey on Different CAPTCHA Techniques Volume 3, No.2, February 2014 Advances in Computer Science and Technology.
[8] R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[9] Y.Yesu Jyothi, D.Srinivas, K.Govindaraju, THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION, International Journal of Research in Computer and Communication Technology, Vol 2, Issue 9, September -2013

Captcha, Otp, User Authentication.