Open Access Open Access  Restricted Access Subscription or Fee Access

A Comparative Study of Techniques used in Breaking CAPTCHA

Amar U. Khopade, Dr. Emmanuel M

Abstract


Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA) is a type of challenge response test used to differentiate computers and human being. Nowadays, many harmful computer programs attempts on attacking security and availability. CAPTCHA is the solution for such kind of problems. Breaking CAPTCHA can be considered as advantageous as well as disadvantageous, if someone is capable of implementing a technique to break difficult CAPTCHAs their solution can be used in solving unsolved hard AI problems. Most online payment and transaction systems use CAPTCHA in differentiating bots and humans. Different types of CAPTCHA includes text based, image based, audio and motion based CAPTCHAs. In this paper, we have discussed various techniques such as IMAGINAION, CNN, Naive attack used in solving a CAPTCHA. Over a decade there are many algorithms proposed by researchers to break CAPTCHA.


Keywords


CAPTCHA, Security, Image, AI Problems, Bots.

Full Text:

PDF

References


. Bursztein and S. Bethard, “DeCAPTCHA: Breaking 75% of eBay Audio CAPTCHAs,” Proc. Third USENIX Workshop Offensive Technologies, 2009.

. Bin B. Zhu, Jeff Yan, GuanboBao, Maowei Yang, and NingXu, "Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems", IEEE Transactions On Information Forensics And Security, Vol. 9, No. 6, June 2014.

. NuCaptcha, “Whitepaper: NuCaptcha& Traditional Captcha,” http://nucaptcha.com, 2011.

. Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, and Paul C. van Oorschot," Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion", IEEE Transactions On Dependable And Secure Computing, Vol. 11, No. 5, September/October 2014

. S. Ullman, High-Level Vision: Object Recognition and Visual Cognition MIT Press, July 2000.

. N.J. Mitra, H.-K. Chu, T.-Y. Lee, L. Wolf, H. Yeshurun, and D. Cohen-Or, “Emerging Images,” ACM Trans. Graphics, vol. 28, no. 5, article 163, 2009.

. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “CAPTCHA: Using hard AI problems for security,” in Proc. Eurocrypt, 2003,pp. 294–311.

. Yahoo CAPTCHA Hacked, [Online]. Available: http://it.slashdot.org/article.pl?sid=08/01/30/0037254, retrieved on 01/30/2008, Slashdot

. RitendraDatta, Jia Li, and James Z. Wang" Exploiting the Human–Machine Gap in Image Recognition for Designing CAPTCHAs", IEEE Transactions On Information Forensics And Security, Vol. 4, No. 3, September 2009.

. RitendraDatta, Jia Li, and James Z. Wang, "IMAGINATION: A Robust Image-based CAPTCHAGeneration System", MM’05, November 6–11, 2005, Singapore.

. Miller, “WordNet: A Lexical Database for English,”Comm. of the ACM, 38(11):39-41, 1995.

. N. Friedman and S.J. Russell, “Image Segmentation in Video Sequences: A Probabilistic Approach,” CoRR (technical report) vol. abs/1302.1539, http://arxiv.org/abs/1302.1539, 2013.

. Ian J. Goodfellow, YaroslavBulatov, Julian Ibarz, SachaArnoud, VinayShet," Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks",Street View and reCAPTCHA Teams, Google Inc 14 Apr 2014.

. https://www.google.com/recaptcha

. www.captcha.net/


Refbacks

  • There are currently no refbacks.