Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2702613.2732748acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Work in Progress

iHIP: Towards a User Centric Individual Human Interaction Proof Framework

Published: 18 April 2015 Publication History

Abstract

A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used Human Interaction Proof mechanism to protect on-line services against automated software agents. Nowadays, there is a consensus among researchers, practitioners and users that current design approaches of CAPTCHA need to be improved in order to provide a fair trade-off solution between security and usability. In this paper, we propose a shift from a generic Human Interaction Proof (HIP) to a more user-friendly Individual Human Interaction Proof (iHIP) approach by incorporating a dynamic and extendable human and technology factor based user-centric framework. Such an approach provides an alternative point of view to current state of the art practices aiming to deliver the best-fit CAPTCHA to each individual by taking into consideration contextual and behavioral interaction data.

References

[1]
Fidas, C., Voyiatzis, A., Avouris, N. On the necessity of user-friendly CAPTCHA. In Proc. CHI'11, ACM (2011), 2623--2626.
[2]
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J., Jurafsky, D. How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In Proc. SSP'10, IEEE Computer Society (2010), 399--413.
[3]
ISO 9241--210:2010. Ergonomics of human-system interaction, Part 210: Human-centred design for interactive systems.
[4]
Belk, M., Fidas, C., Germanakos, P., Samaras, G. Do cognitive styles of users affect preference and performance related to CAPTCHA challenges? Ext. Abstracts CHI'12, ACM (2012), 1487--1492.
[5]
Bigham, J., Cavender, A. Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use. In Proc. CHI'09, ACM (2009), 1829--1838.
[6]
Wismer, A., Madathil, K.C., Koikkara, R., Juang, K., Greenstein, J. Evaluating the usability of CAPTCHAs on a mobile device with voice and touch input. In Proc. HFES'12, 1228--1232.
[7]
Reynaga, G., Chiasson, S. The usability of CAPTCHAs on smartphones. In Proc. SECRYPT'13, 427434.
[8]
Shirali-Shahreza, S., Penn, G., Balakrishnan, R., Ganjali, Y. SeeSay and HearSay CAPTCHA for mobile interaction. In Proc. CHI'13, ACM (2013), 2147--2156.
[9]
Chow, R., Golle, P., Jakobsson, M., Wang, L., Wang, X. Making CAPTCHAs clickable. In Proc. HotMobile'08, ACM (2008), 91--94.
[10]
Bursztein, E., Martin, M., Mitchell, J. Text-based CAPTCHA strengths and weaknesses. In Proc. CCS'11, ACM (2011), 125--138.
[11]
Zhu, B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K. Attacks and design of image recognition CAPTCHAs. In Proc. CCS'10, ACM (2010), 187--200.

Cited By

View all
  • (2021)Applying Benford's Law as an Efficient and Low-cost Solution for Verifying the Authenticity of Users’ Video Streams in Learning Management SystemsIEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology10.1145/3486622.3493993(563-569)Online publication date: 14-Dec-2021
  • (2021)Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof SchemesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-77392-2_5(66-75)Online publication date: 24-Jul-2021
  • (2020)On the Effectiveness of Low-Cost Face Recognition with Deep LearningProceedings of the 24th Pan-Hellenic Conference on Informatics10.1145/3437120.3437275(57-60)Online publication date: 20-Nov-2020
  • Show More Cited By

Index Terms

  1. iHIP: Towards a User Centric Individual Human Interaction Proof Framework

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
    April 2015
    2546 pages
    ISBN:9781450331463
    DOI:10.1145/2702613
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 April 2015

    Check for updates

    Author Tags

    1. CAPTCHA
    2. framework design
    3. usable security

    Qualifiers

    • Work in progress

    Conference

    CHI '15
    Sponsor:
    CHI '15: CHI Conference on Human Factors in Computing Systems
    April 18 - 23, 2015
    Seoul, Republic of Korea

    Acceptance Rates

    CHI EA '15 Paper Acceptance Rate 379 of 1,520 submissions, 25%;
    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Applying Benford's Law as an Efficient and Low-cost Solution for Verifying the Authenticity of Users’ Video Streams in Learning Management SystemsIEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology10.1145/3486622.3493993(563-569)Online publication date: 14-Dec-2021
    • (2021)Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof SchemesHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-77392-2_5(66-75)Online publication date: 24-Jul-2021
    • (2020)On the Effectiveness of Low-Cost Face Recognition with Deep LearningProceedings of the 24th Pan-Hellenic Conference on Informatics10.1145/3437120.3437275(57-60)Online publication date: 20-Nov-2020
    • (2020)On the Extension of the Haar Cascade Algorithm for Face Recognition: Case Study and ResultsProceedings of the 24th Pan-Hellenic Conference on Informatics10.1145/3437120.3437274(53-56)Online publication date: 20-Nov-2020
    • (2019)Eye Tracking based Cognitive-Centered User ModelsIEEE/WIC/ACM International Conference on Web Intelligence10.1145/3350546.3352563(433-437)Online publication date: 14-Oct-2019
    • (2018)On Cultural-centered Graphical PasswordsProceedings of the 26th Conference on User Modeling, Adaptation and Personalization10.1145/3209219.3209254(245-249)Online publication date: 3-Jul-2018
    • (2017)Sweet-spotting security and usability for intelligent graphical authentication mechanismsProceedings of the International Conference on Web Intelligence10.1145/3106426.3106488(252-259)Online publication date: 23-Aug-2017
    • (2017)Utilizing Human Cognitive and Emotional Factors for User-Centered ComputingProceedings of the 22nd International Conference on Intelligent User Interfaces10.1145/3025171.3026366(191-192)Online publication date: 7-Mar-2017
    • (2017)The interplay between humans, technology and user authenticationComputers in Human Behavior10.1016/j.chb.2017.06.04276:C(184-200)Online publication date: 1-Nov-2017
    • (2017)EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans ApartICT Systems Security and Privacy Protection10.1007/978-3-319-58469-0_19(281-295)Online publication date: 4-May-2017
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media