Abstract
Text based CAPTCHAs are ubiquitous on the Internet since they are easily generated by machines, easily solvable by humans and yet not easily defeated by state-of-the-art computer algorithms. Over the years, several attacks have been designed by researchers to solve different types of CAPTCHAs. These attacks always assume that the type of CAPTCHA is known. However, in order to devise a common frame work, comprising of different attacks that can be launched automatically, the first prime step is to recognize the CAPTCHA scheme. In this paper we present a method based on geometric features to automatically identify text based CAPTCHA schemes. The proposed method is verified on a data set comprising of 25 different types of CAPTCHA (1,000 samples per type). We achieve an identification / classification accuracy of up to approximately 99%.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Naor, M.: Verification of a human in the loop or identification via the turing test, http://www.wisdom.weizmann.ac.il/~naor/PAPERS/humanabs.html (1996) (unpublished draft)
Von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM 47, 56–60 (2004)
Basso, A., Bergadano, F.: Anti-bot strategies based on human interactive proofs. In: Handbook Information and Communication Security, pp. 273–291. Springer (2010)
Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building segmentation based human-friendly human interaction proofs (hips). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol. 3517, pp. 1–26. Springer, Heidelberg (2005)
Yan, J., El Ahmad, A.S.: Captcha robustness: A security engineering perspective. Computer 44, 54–60 (2011)
Bursztein, E., Martin, M., Mitchell, J.: Text-based captcha strengths and weaknesses. In: Proceedings of 18th ACM Conference on Computer and Communications Security, pp. 125–138. ACM (2011)
Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: Proceedings of 4th Symposium on Usable Privacy and Security. ACM (2008)
Baird, H.S., Coates, A.L., Fateman, R.J.: Pessimalprint: a reverse turing test. International Journal on Document Analysis and Recognition 5, 158–163 (2003)
Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual captcha. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. I–134. IEEE (2003)
Cruz-Perez, C., Starostenko, O., Uceda-Ponga, F., Alarcon-Aquino, V., Reyes-Cabrera, L.: Breaking reCAPTCHAs with unpredictable collapse: Heuristic character segmentation and recognition. In: Carrasco-Ochoa, J.A., Martínez-Trinidad, J.F., Olvera López, J.A., Boyer, K.L. (eds.) MCPR 2012. LNCS, vol. 7329, pp. 155–165. Springer, Heidelberg (2012)
El Ahmad, A.S., Yan, J., Tayara, M.: The Robustness of Google CAPTCHA’s. Computing Science, Newcastle University (2011)
Gehler, P., Nowozin, S.: On feature combination for multiclass object classification. In: International Conference on Computer Vision (ICCV). IEEE (2009)
www.abchina.com , www.amazon.com , www.bankcomm.com , www.poynettebank.com , www.captcha.fr , www.captchacreator.com , www.captchator.com , www.captchas-asp.co.uk , www.puremango.co.uk , www.gmail.com , www.hotmail.com , www.lagom.nl , www.protectwebform.com , www.google.com/recaptcha , www.rediff.com , www.reddit.com , www.simplemachines.org , www.slashdot.org , www.en.wikipedia.org , www.webspamprotect.com , www.white-hat-web-design.co.uk , www.wyomingnationalbank.com , www.yahoo.com
Nazir, M., Javed, Y., Khan, M.M., Khayam, S.A., Li, S.: Poster: Captchæ cker–automating usability-security evaluation of textual captchas. In: SOUPS (2011)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explorations Newsletter 11, 10–18 (2009)
Lee, Y.L., Hsu, C.H.: Usability study of text-based captchas. Displays 32, 81–86 (2011)
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How good are humans at solving captchas? a large scale evaluation. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 399–413. IEEE (2010)
Ho, C.J., Wu, C.C., Chen, K.T., Lei, C.L.: Deviltyper: a game for captcha usability evaluation. Computers in Entertainment (CIE) 9, 3 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Jalwana, M.A.A.K., Khan, M.M., Ilyas, M.U. (2014). Automatic Identification of CAPTCHA Schemes. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2014. Lecture Notes in Computer Science, vol 8888. Springer, Cham. https://doi.org/10.1007/978-3-319-14364-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-14364-4_40
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14363-7
Online ISBN: 978-3-319-14364-4
eBook Packages: Computer ScienceComputer Science (R0)