Collective Intelligence. CAPTCHAs. Eran Hershko

Size: px
Start display at page:

Download "Collective Intelligence. CAPTCHAs. Eran Hershko"

Transcription

1 Collective Intelligence CAPTCHAs Eran Hershko

2 Outline 1) Introduction to CAPTCHA. 2) recaptcha (and Collective Intelligence). 3) How To Break Two CAPTCHAs: EZ- GIMPY & GIMPY. 4) Summery & Future Work.

3

4 CAPTCHA A CAPTCHA is a test that can be automatically generated, which most humans can pass, but most computers can t. Who Uses CAPTCHAs & Why? * e- mail websites- in order to stop spam. * Blogs & forums- in order to stop automatic posting. * Websites that sell tickets- in order to prevent scalpers from buying a lot of tickets. *

5 CAPTCHA EZ- GIMPY Code Completely Automated Public Turing test to tell Computers and Humans Apart

6 Part I Part II CAPTCHA The CAPTCHA achieves two opposite goals: 1) If the CAPTCHA is not broken- there is a way to differentiate humans from computers. 2) If the CAPTCHA is broken- a useful computer vision problem is solved. The CAPTCHA Paradox: A CAPTCHA is a program that can generate and grade tests that it itself can t pass!

7 The Evolution Of CAPTCHA EZ- GIMPY GIMPY ESP-PIX rechaptcha SQUIGL-PIX

8

9 recaptcha Collective Intelligence is a shared or group intelligence that emerges from the collaboration of many individuals. recpatcha uses Collective Intelligence in order to contribute to humanity!

10 Who uses recaptcha? * recaptcha is used by more than 40,000 websites! * Google purchased recaptcha in 2009.

11 How Does It Work? Romeo & Juliet control word Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Church incorporate two in one. suspicious word Optical Character Recognition (OCR) I Optical Character Recognition (OCR) II Dictionary Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Come, come with me, and we will Till holy Ohurch incorporate two in make short work; one. For, by your leaves, you shall not stay alone Till holy Church incorporate two in one. Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Come, come with me, and we will Till holy Chulch incorporate two in make short work; one. For, by your leaves, you shall not stay alone Till holy Chulch incorporate two in one. Ohurch Church Chulch Chulch

12 How Does It Work? fiery Church fiery Bhurch

13 How Does It Work? fiery Church Church chief Church overlooks Inquiry Church OCR = 1 point = 1/2 point A Suspicious word is Correct if Suspicious word > 2.5 points

14 How Does It Work? fiery Church Church chief Church overlooks Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Ohurch incorporate two in one. OCR Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Chulch incorporate two in one. OCR The Suspicious word becomes a Control word!

15 How Does It Work? Reject Reject Reject Reject Reject Reject The word is Unreadable!

16 Some Statistics How many humans are required for a word to be considered correct? 3.11% 4.06% * 7.10% 67.87% 17.86% * Including words which are considered unreadable.

17 Why is recaptcha more secure than CAPTCHA? 1) recaptcha uses only words that OCR already failed to decipher. 2) CAPTCHAs generate their own artificial distorted characters. A smart learning algorithm can recognize them. 3) recaptcha has two natural distortions and one artificial: a. The fading of the text in time (natural). b. The noise introduced by the scanning process (natural). c. The added distortion (artificial). Algorithms that succeeded in more than 90% in recognizing CAPTCHA were completely unable to recognize recaptcha!

18 Several Results 50 = 99.1% OCR = 83.5%

19 Several Results * After one year of running: More than 1.2 billion recaptchas were solved! More than 440 million suspicious words were correctly deciphered! recaptcha has successfully achieved its goal in efficiently harnessing Collective Intelligence!

20 Breaking EZ- GIMPY CAPTCHA

21 EZ- GIMPY- How is it done? 1) Choosing a word out of 561 words dictionary. 2) Distorting and blurring its characters. 3) Adding a cluttered and confusing background.

22 The Algorithm This algorithm treats every letter as an individual: The algorithm s steps: Step A & B- Finding individual letters in the image and extracting candidate words. Step C- Choosing the most likely word. requires low computational power requires high computational power

23 Step A Producing a training set: 1) Extracting a letter from a EZ- GIMPY image. 2) Running a Canny edge detection. 3) Sampling 100 points from the letter s interior and exterior edges. 4) Extracting the 2600 (26*100) Shape Contexts. 1) 2) 3) 4)

24 Step A Finding letters in the image: 1) Choosing randomly several sample points from the image. 2) Generating a shape context for each point. 3) Finding the letters from the training set with closest shape contexts. 1) 3)

25 Step B Finding Sequences of letters that form candidate words: For every letter, trying to construct a possible word. There are several constrains: letters must be from left to right, not be too far from each other nor too close and the candidate words must be from the dictionary. profit roll

26 Step C Choosing the most likely word: 1) For each letter, building generalized shape contexts (which assumes many possible deformations in the letters). 2) Giving a score to each letter according to the distance. 3) The answer to EZ- GIMPY is the word with the highest score.

27 Results * This algorithm has a success rate of 83% of the time. collar canvas jewel smile spade soap line here till

28 Breaking GIMPY CAPTCHA

29 GIMPY- How is it done? 1) Choosing words out of 411 words dictionary. 2) Distorting and blurring the characters. 3) Locating the words randomly in the image in 5 pairs (one on the other). 4) Adding a cluttered and confusing background. * The user must recognize 3 words correctly.

30 The Algorithm This algorithm treats every word as a whole and not individual letters: The algorithm s steps: Step A & B- Finding candidate words in the image. Step C- Choosing the most likely words. requires low computational power requires high computational power

31 Step A Finding candidate words in the image: 1) Finding the suspicious places which contain pairs of words. 2) For every pair, conducting edge detection and finding the first two letters and the last two letters, by using shape contexts. 3) Producing a list of the possible candidate words from the dictionary. The result is a list of approximately 4 candidate words. 1) 2)

32 Step B Removing layers of words: 1) Removing the edges of the candidate word from the image and repeating step A (trying to find candidate words). 2) Each pair of words in the image has approximately 16 pairs of candidate words. r o u n d

33 Step C Giving final score: 1) For each pair, producing a synthetic image of the two words overlaid with their estimated locations. 2) Computing the shape contexts of the synthetic image. 3) Every suspicious word in a pair of the original image gets a score according to the distance of its shape contexts from the shape contexts of the synthetic word. 4) The three words with the highest scores are chosen as the answer to the GIMPY CAPTCHA. r c o o u w n d r o w r o u n d

34 Results * This algorithm has a success rate of 33% in guessing the correct three words of GIMPY. * Applying this algorithm on EZ- GIMPY results in a success rate of 92% (The previous algorithm gave only 83%).. true, with, sponge carriage, potato, clock door, farm, important narrow, bulb, right church, tongue, bad sudden, oven, apple

35 Summery 1) EZ GIMPY is successfully broken (92% success). There is still work to be done on GIMPYas a Computer Vision challenge. 2) The reason of recaptcha s success: Solving a recaptcha is an action that people have to do anyway. They feel better when it s for an important cause. 3) The new CAPTCHAs will set new challenges in the Computer Vision field.

36 Future Work The constant battle between Good and Evil The Evil Side: Breaking recaptcha and the new image based CAPTCHAs with a reasonable rate of success. The Good Side: Finding new forms of image based problems that humans can easily solve but computers and computer vision algorithms can t.

37 Questions?

38 References 1) recaptcha: Human-Based Character Recognition via Web Security Measures - Luis von Ahn et al. 2) Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA - G Mori et al. 3) Shape Matching and Object Recognition Using Shape Context - Serge Belongie et al. 4) Telling Humans And Computers Apart Automatically - Luis von Ahn et al. 5) Breaking recaptcha: A Holistic Approach via Shape Recognition -Paul Baecher et al. 6)

39

40 Related Work From 2011

41 New CAPTCHA Which Uses Empathy

Human Computation. Melissa Winstanley

Human Computation. Melissa Winstanley Human Computation Melissa Winstanley mwinst@cs.washington.edu What computers do badly Open-ended, unstructured tasks Creativity Writing stories Composing music Making art Conversation Loebner Prize (chatbots)

More information

UNDERSTANDING CAPTCHA

UNDERSTANDING CAPTCHA UNDERSTANDING CAPTCHA The Need for CAPTCHAs To Prevent Abuse of Online Systems William Sembiante University of New Haven What is CAPTCHA? Term coined in 2000 at Carnegie Mellon by Luis von Ahn, Manuel

More information

Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA

Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA Greg Mori Jitendra Malik Computer Science Division Computer Science Division University of California, Berkeley University of California,

More information

Biometrics&CAPTCHA. 11/29/2010 EJ Jung

Biometrics&CAPTCHA. 11/29/2010 EJ Jung Biometrics&CAPTCHA 11/29/2010 EJ Jung Announcements Guest lecture on Wed. December 1st. readings in the Schedule page report after the lecture - extra credit for quiz Service lab presentation on Mon. December

More information

The Robustness of Connecting Characters Together CAPTCHAs *

The Robustness of Connecting Characters Together CAPTCHAs * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 347-369 (2014) The Robustness of Connecting Characters Together CAPTCHAs * Software Engineering Institute Xidian University Xi an, Shaanxi, 710071 P.R.

More information

A Generalized Method to Solve Text-Based CAPTCHAs

A Generalized Method to Solve Text-Based CAPTCHAs A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method

More information

Web Forms Security, Attack and Defense: Theory and Practice of CAPTCHA Technique

Web Forms Security, Attack and Defense: Theory and Practice of CAPTCHA Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

CS 343H: Honors AI. Lecture 23: Kernels and clustering 4/15/2014. Kristen Grauman UT Austin

CS 343H: Honors AI. Lecture 23: Kernels and clustering 4/15/2014. Kristen Grauman UT Austin CS 343H: Honors AI Lecture 23: Kernels and clustering 4/15/2014 Kristen Grauman UT Austin Slides courtesy of Dan Klein, except where otherwise noted Announcements Office hours Kim s office hours this week:

More information

Usable Security Introduction to User Authentication and Human Interaction Proof Research

Usable Security Introduction to User Authentication and Human Interaction Proof Research Usable Security Introduction to User Authentication and Human Interaction Proof Research Argyris C. Constantinides PhD Student Department of Computer Science University of Cyprus 1 Agenda Introduction

More information

Balancing Usability and Security in a Video CAPTCHA

Balancing Usability and Security in a Video CAPTCHA Balancing Usability and Security in a Video CAPTCHA Google, Inc. kak@google.com Rochester Institute of Technology rlaz@cs.rit.edu Symposium on Usable Privacy and Security (SOUPS) 2009 July 15th-17th, 2009,

More information

PICATCHA MIMS 2011 FINAL PROJECT REPORT SUMMARY

PICATCHA MIMS 2011 FINAL PROJECT REPORT SUMMARY A platform to monetize usable & secure CAPTCHAs for desktop and mobile devices May 5th, 2011 School of Information, University of California Berkeley Final Project Report Team: Dhawal Mujumdar and Satish

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

Comprehensive Study on Performance Analysis of Various Captcha Systems

Comprehensive Study on Performance Analysis of Various Captcha Systems International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Review Article Comprehensive

More information

Telling Humans and Computers Apart (Automatically) How Lazy Cryptographers do AI

Telling Humans and Computers Apart (Automatically) How Lazy Cryptographers do AI Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI Luis von Ahn Manuel Blum John Langford If you try to get a new email account at Yahoo, you ll be asked to prove that

More information

Enhancing Web-Security with Stronger Captchas

Enhancing Web-Security with Stronger Captchas Enhancing Web-Security with Stronger Captchas Dilip Kumar Kushwaha Department of MCA BBDIT, Ghaziabad, India Harleen Kaur FMIT, JAMIA HAMDARD New Delhi, India KM Priyanka Department of MCA BBDIT, Ghaziabad,

More information

CAPTCHAs and Information Hiding

CAPTCHAs and Information Hiding CAPTCHAs and Information Hiding Neal R. Wagner The University of Texas at San Antonio Department of Computer Science San Antonio, Texas 78249 USA wagner@cs.utsa.edu Abstract. The goal of steganography

More information

A deep learning model for recognition of complex Text-based CAPTCHAs

A deep learning model for recognition of complex Text-based CAPTCHAs IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.2, February 2018 103 A deep learning model for recognition of complex Text-based CAPTCHAs Rafaqat Hussain Arain 1, Riaz

More information

B reaking Audio CAPTCHAs

B reaking Audio CAPTCHAs B reaking Audio CAPTCHAs Jennifer Tam Computer Science Department Carnegie Mellon University 5000 Forbes Ave, Pittsburgh 15217 jdtam@cs.cmu.edu Sean Hyde Electrical and Computer Engineering Carnegie Mellon

More information

A Survey on Graphical Passwords in Providing Security

A Survey on Graphical Passwords in Providing Security A Survey on Graphical Passwords in Providing Security Mrs. Anuradha. V #, Mr.M.Nagesh *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering & Technology, JNTU Hyderabad

More information

CS4495/6495 Introduction to Computer Vision. 1A-L1 Introduction

CS4495/6495 Introduction to Computer Vision. 1A-L1 Introduction CS4495/6495 Introduction to Computer Vision 1A-L1 Introduction Outline What is computer vision? State of the art Why is this hard? Course overview Software Why study Computer Vision? Images (and movies)

More information

Keywords gimpy, Turing test, CAPTCHA, bongo, recaptcha.

Keywords gimpy, Turing test, CAPTCHA, bongo, recaptcha. Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Understanding Captcha:

More information

Decoding recaptcha. COSC 174 Term project Curtis R. Jones & Jacob Russell

Decoding recaptcha. COSC 174 Term project Curtis R. Jones & Jacob Russell Decoding recaptcha COSC 174 Term project Curtis R. Jones & Jacob Russell May 28, 2012 Curtis Jones & Jacob Russell Decoding recaptcha Page 1 Project Objective Our project is on solving recaptcha puzzles.

More information

ISeCure. The ISC Int'l Journal of Information Security. Image Flip CAPTCHA.

ISeCure. The ISC Int'l Journal of Information Security. Image Flip CAPTCHA. The ISC Int'l Journal of Information Security July 2009, Volume 1, Number 2 (pp. 105 123) http://www.isecure-journal.org Image Flip CAPTCHA M. Tariq Banday a,, Nisar A. Shah a a P. G. Department of Electronics

More information

ESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test

ESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test ESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test Andrew Dempsey Mentor: Ming Chow Fall 2014 Abstract In this paper, we will examine the effectiveness of a variety of forms of the Completed

More information

Only attaches labels to random images from the internet. Given label, can we identify where label actually is? Given label can we identify where label

Only attaches labels to random images from the internet. Given label, can we identify where label actually is? Given label can we identify where label Peekaboom: A Game for Locating Objects in Images By Luis von Ahn, Ruoran Liu, and Manuel Blum ESP Game Only attaches labels to random images from the internet Does not specify location o of image Thus,

More information

Facilitating Form Filling For Visually Impaired By Automatic Detection Of Captcha In Web Forms

Facilitating Form Filling For Visually Impaired By Automatic Detection Of Captcha In Web Forms Facilitating Form Filling For Visually Impaired By Automatic Detection Of Captcha In Web Forms Ms. Priyanka, Assistant Professor, Department of MCA, BBDIT, Ghaziabad, Dr. Harleen Kaur, Assistant Professor,

More information

OSN Attack Automated Identity Theft Attacks

OSN Attack Automated Identity Theft Attacks OSN Attack Automated Identity Theft Attacks John LePage Department of Electrical & Computer Engineering Missouri University of Science and Technology jlpc5@mst.edu 9 November 2016 2014 John LePage Introduction

More information

A Review on Various Interactive CAPTCHA Techniques Concerning Web Security

A Review on Various Interactive CAPTCHA Techniques Concerning Web Security Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX

JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-5, November 2012 JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX

More information

How to Tell a Human apart from a Computer. The Turing Test. (and Computer Literacy) Spring 2013 ITS B 1. Are Computers like Human Brains?

How to Tell a Human apart from a Computer. The Turing Test. (and Computer Literacy) Spring 2013 ITS B 1. Are Computers like Human Brains? How to Tell a Human apart from a Computer The Turing Test (and Computer Literacy) Spring 2013 ITS102.23 - B 1 Are Computers like Human Brains? The impressive contributions of computers during World War

More information

Experimental study of CAPTCHA: A Security Primitive

Experimental study of CAPTCHA: A Security Primitive Experimental study of CAPTCHA: A Security Primitive Pawar Sonali 1, Kalyankar Pravin 2 1, 2 T.P.C.T. s College of Engineering,Osmanabad, Solapur-Osmanabad Road, Osmanabad, India Abstract: Captcha as graphical

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Animated Handwritten CAPTCHA based on 3D Effect Mutha Neha Chandrakant 1 1 Department

More information

Keywords: Web Security, CAPTCHA, Evaluation and limitation, cognitive power of human, Computer Architecture.

Keywords: Web Security, CAPTCHA, Evaluation and limitation, cognitive power of human, Computer Architecture. Volume 4, Issue 6, June 2014 ISSN 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at www.ijarcsse.com Evolving New CAPTCHA

More information

OCR and OCV. Tom Brennan Artemis Vision Artemis Vision 781 Vallejo St Denver, CO (303)

OCR and OCV. Tom Brennan Artemis Vision Artemis Vision 781 Vallejo St Denver, CO (303) OCR and OCV Tom Brennan Artemis Vision Artemis Vision 781 Vallejo St Denver, CO 80204 (303)832-1111 tbrennan@artemisvision.com www.artemisvision.com About Us Machine Vision Integrator Turnkey Systems OEM

More information

Multi-Modal CAPTCHA: A User Verification Scheme

Multi-Modal CAPTCHA: A User Verification Scheme Multi-Modal CAPTCHA: A User Verification Scheme Abdulaziz S Almazyad Yasir Ahmad Shouket Ahmad Kouchay Deptt of Computer Engg Deptt of Computer Science Deptt of Information Systems King Saud University

More information

2. Basic Task of Pattern Classification

2. Basic Task of Pattern Classification 2. Basic Task of Pattern Classification Definition of the Task Informal Definition: Telling things apart 3 Definition: http://www.webopedia.com/term/p/pattern_recognition.html pattern recognition Last

More information

On the Security of recaptcha

On the Security of recaptcha On the Security of recaptcha Bachelor-Thesis by Benjamin Milde from Darmstadt July 2010 Darmstadt University of Technology Department of Computer Science Minimizing Cryptographic Assumptions (MiniCrypt)

More information

CAPTCHA Suitable for Smartphones

CAPTCHA Suitable for Smartphones CAPTCHA Suitable for Smartphones Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura To cite this version: Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura. CAPTCHA Suitable for Smartphones. David Hutchison;

More information

Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services

Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 05 9 Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services Moin Mahmud

More information

SURVEY ON CAPTCHA SYSTEMS

SURVEY ON CAPTCHA SYSTEMS Volume 3, No. 6, June 2012 Journal of Global Research in Computer Science TECHNICAL NOTE Available Online at www.jgrcs.info SURVEY ON CAPTCHA SYSTEMS Rizwan Ur Rahman Maulana Azad National Institute of

More information

SemCAPTCHA user-friendly alternative for OCR-based CAPTCHA systems

SemCAPTCHA user-friendly alternative for OCR-based CAPTCHA systems Proceedings of the International Multiconference on Computer Science and Information Technology pp. 325 329 ISBN 978-83-60810-14-9 ISSN 1896-7094 SemCAPTCHA user-friendly alternative for OCR-based CAPTCHA

More information

Persian/Arabic Baffletext CAPTCHA 1

Persian/Arabic Baffletext CAPTCHA 1 Journal of Universal Computer Science, vol. 12, no. 12 (2006), 1783-1796 submitted: 20/3/06, accepted: 22/12/06, appeared: 28/12/06 J.UCS Persian/Arabic Baffletext CAPTCHA 1 Mohammad Hassan Shirali-Shahreza

More information

CS 418/518 Web Programming Spring CAPTCHA and Search. Dr. Michele Weigle. Outline ! CAPTCHA. !

CS 418/518 Web Programming Spring CAPTCHA and Search. Dr. Michele Weigle.  Outline ! CAPTCHA. ! CS 418/518 Web Programming Spring 2014 CAPTCHA and Search Dr. Michele Weigle http://www.cs.odu.edu/~mweigle/cs418-s14/ Outline! CAPTCHA! Search 2 CAPTCHA! Completely Automated Public Turing test to tell

More information

Graphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar

Graphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar Graphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar Computer Science and Engineering, Dr. B.A.M.University, Aurangabad e-mail: sonali.pawar052@gmail.com Contact No. :9665144137

More information

Novel CAPTCHA schemes

Novel CAPTCHA schemes Novel CAPTCHA schemes Ville Saalo Helsinki University of Technology Ville.Saalo@iki.fi Abstract A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a program that

More information

CAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics

CAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics A Seminar report On CAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Acknowledgement

More information

In this example on 20X200, the contrast ratio between the navigation text and its background is 1.57:1.

In this example on 20X200, the contrast ratio between the navigation text and its background is 1.57:1. ACCESSIBLITY COMMON DEVELOPER MISTAKES Web Council Meeting, May 11 th 2011 1. Too Low Contrast The contrast between text and background is a major contributing factor to the readability of a website. This

More information

Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms

Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms 23rd Annual Computer Security Applications Conference Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms Jeff Yan, Ahmad Salah El Ahmad School of Computing Science, Newcastle University,

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution

More information

Shape Context and Chamfer Matching in Cluttered Scenes

Shape Context and Chamfer Matching in Cluttered Scenes Shape Context and Chamfer Matching in Cluttered Scenes A. Thayananthan Λ B. Stenger Λ P. H. S. Torr y R. Cipolla Λ Λ University of Cambridge y Microsoft Research Ltd. Department of Engineering 7 JJ Thompson

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons

More information

To The Graduate Council:

To The Graduate Council: To The Graduate Council: I am submitting a thesis written by Sumit Khanna entitled Breaking the Multi- Colored Box: A Study of CAPTCHA. I have examined the final copy of this thesis and recommend that

More information

The Kinect Sensor. Luís Carriço FCUL 2014/15

The Kinect Sensor. Luís Carriço FCUL 2014/15 Advanced Interaction Techniques The Kinect Sensor Luís Carriço FCUL 2014/15 Sources: MS Kinect for Xbox 360 John C. Tang. Using Kinect to explore NUI, Ms Research, From Stanford CS247 Shotton et al. Real-Time

More information

Application of the Technology Acceptance Model to OCR-based CAPTCHA systems

Application of the Technology Acceptance Model to OCR-based CAPTCHA systems Application of the Technology Acceptance Model to OCR-based CAPTCHA systems Pawel Lupkowski a,, Pawel Kleka a a Institute of Psychology, Adam Mickiewicz University, Szamarzewskiego 89a, 60-568 Poznan,

More information

Strategic White Paper

Strategic White Paper Strategic White Paper Automated Handwriting Recognition Takeaways In this paper you ll learn: How recognition works, accuracy, applications and benefits Differences between earlier ICR programs and more

More information

A Review of Bot Protection using CAPTCHA for Web Security

A Review of Bot Protection using CAPTCHA for Web Security IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 6 (Jan. - Feb. 2013), PP 36-42 1 Baljit Singh Saini, 2 Anju Bala Asst. Professor, Deptt. CSE/IT, Research

More information

Attacking CAPTCHAs for Fun and Profit

Attacking CAPTCHAs for Fun and Profit Attacking Author: Gursev Singh Kalra Managing Consultant Foundstone Professional Services Table of Contents Attacking... 1 Table of Contents... 2 Introduction... 3 A Strong CAPTCHA Implementation... 3

More information

Breaking an Animated CAPTCHA Scheme

Breaking an Animated CAPTCHA Scheme Breaking an Animated CAPTCHA Scheme Vu Duc Nguyen 1, Yang-Wai Chow 2 and Willy Susilo 1 1 Centre for Computer and Information Security Research 2 Advanced Multimedia Research Laboratory School of Computer

More information

Improving Online Security Using Graphical Password

Improving Online Security Using Graphical Password Improving Online Security Using Graphical Password Avinash Manne M.Tech Student, Department of Computer Science and Engineering, Chilukuri Balaji Institute of Technology. Hyderabad. Abstract: Online security

More information

Image Recognition CAPTCHAs

Image Recognition CAPTCHAs In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, September 2004, pp. 268-279 Image Recognition CAPTCHAs Monica Chew and J. D. Tygar, UC Berkeley {mmc,tygar}@cs.berkeley.edu

More information

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 09. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2017 April 17, 2017 CS 419 2017 Paul Krzyzanowski 1 Biometrics Identify a person based on physical or behavioral

More information

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information

More information

Exploration of 3D Texture and Projection for New CAPTCHA Design

Exploration of 3D Texture and Projection for New CAPTCHA Design Exploration of 3D Texture and Projection for New CAPTCHA Design Simon S. Woo 1,2, Jingul Kim 1,3, Duoduo Yu 1, and Beomjun Kim 1 1 Computer Science Department University of Southern California Los Angeles,

More information

Cracking Captchas For Cash: A Review Of CAPTCHA Crackers

Cracking Captchas For Cash: A Review Of CAPTCHA Crackers Cracking Captchas For Cash: A Review Of CAPTCHA Crackers Merrill Serrao Shanu Salunke Amrita Mathur (Assistant Professor) Abstract The CAPTCHA [Completely Automated Public Turing test to tell Computers

More information

COMPUTING SCIENCE. The Robustness of Google CAPTCHAs. Ahmad S El Ahmad, Jeff Yan and Mohamad Tayara TECHNICAL REPORT SERIES

COMPUTING SCIENCE. The Robustness of Google CAPTCHAs. Ahmad S El Ahmad, Jeff Yan and Mohamad Tayara TECHNICAL REPORT SERIES COMPUTING SCIENCE The Robustness of Google CAPTCHAs Ahmad S El Ahmad, Jeff Yan and Mohamad Tayara TECHNICAL REPORT SERIES No. CS-TR-1278 September 2011 TECHNICAL REPORT SERIES No. CS-TR-1278 September,

More information

Chapter 2 An Introduction to Linear Programming

Chapter 2 An Introduction to Linear Programming Chapter 2 An Introduction to Linear Programming MULTIPLE CHOICE 1. The maximization or minimization of a quantity is the a. goal of management science. b. decision for decision analysis. c. constraint

More information

TA Section 7 Problem Set 3. SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999)

TA Section 7 Problem Set 3. SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999) TA Section 7 Problem Set 3 SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999) Sam Corbett-Davies TA Section 7 02-13-2014 Distinctive Image Features from Scale-Invariant

More information

Mining of Massive Datasets

Mining of Massive Datasets Mining of Massive Datasets Krzysztof Dembczyński Intelligent Decision Support Systems Laboratory (IDSS) Poznań University of Technology, Poland Software Development Technologies Master studies, second

More information

TABLE OF CONTENTS. Introduction Setting up Your Patriot Voice Controls Starting the System Controls...

TABLE OF CONTENTS. Introduction Setting up Your Patriot Voice Controls Starting the System Controls... USER MANUAL TABLE OF CONTENTS Introduction... 03 Setting up Your Patriot Voice... 04 Controls... 05 Starting the System... 06 Controls... 06 Additional Keys... 09 Menu Zone... 10 System Settings... 15

More information

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

Combining Gabor Features: Summing vs.voting in Human Face Recognition * Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu

More information

COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART

COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART 1 Varjith Anchuri, 2 K.Hanuman Krishna, 3 M.Gopi Chand, 4 S.Rishi, UG Scholar Dept Of CSE, SRM University,Chennai. Abstract A

More information

Security and Usability Challenges of Moving-Object CAPTCHAs

Security and Usability Challenges of Moving-Object CAPTCHAs Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose and Paul Van Oorschot 1 2 CAPTCHAs Application

More information

Feature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule.

Feature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule. CS 188: Artificial Intelligence Fall 2007 Lecture 26: Kernels 11/29/2007 Dan Klein UC Berkeley Feature Extractors A feature extractor maps inputs to feature vectors Dear Sir. First, I must solicit your

More information

An audio CAPTCHA to distinguish humans from computers

An audio CAPTCHA to distinguish humans from computers An audio CAPTCHA to distinguish humans from computers Haichang Gao, Honggang Liu, Dan Yao, Xiyang Liu Software Engineering Institute Xidian University Xi an, Shaanxi 7171, P.R.China hchgao@xidian.edu.cn

More information

Recognizing hand-drawn images using shape context

Recognizing hand-drawn images using shape context Recognizing hand-drawn images using shape context Gyozo Gidofalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract The objective

More information

Solving Word Jumbles

Solving Word Jumbles Solving Word Jumbles Debabrata Sengupta, Abhishek Sharma Department of Electrical Engineering, Stanford University { dsgupta, abhisheksharma }@stanford.edu Abstract In this report we propose an algorithm

More information

OCR Interfaces for Visually Impaired

OCR Interfaces for Visually Impaired OCR Interfaces for Visually Impaired TOPIC ASSIGNMENT 2 Author: Sachin FERNANDES Graduate 8 Undergraduate Team 2 TOPIC PROPOSAL Instructor: Dr. Robert PASTEL March 4, 2016 LIST OF FIGURES LIST OF FIGURES

More information

ASSESSING THE USABILITY ISSUES OF CAPTCHA

ASSESSING THE USABILITY ISSUES OF CAPTCHA International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X ASSESSING THE USABILITY ISSUES OF CAPTCHA Ragavi.V 1 and Dr.G. G.Geetha 2 1 Department of Computer Applications,

More information

Fast Company Homepage This ad is very distracting and grabs the viewer attention more than the logo and navigation. It could cause the user to overloo

Fast Company Homepage This ad is very distracting and grabs the viewer attention more than the logo and navigation. It could cause the user to overloo Competitive Review Fast Company Homepage Doing well: It has a bold and modern feel that appeals to the internet audience. Doing poorly: The layout is confusing as to which elements match up and it's unclear

More information

Different Implemented Captchas and Breaking Methods

Different Implemented Captchas and Breaking Methods Different Implemented Captchas and Breaking Methods Shadi Khawandi 1, Anis Ismail 2, Firas Abdallah 3 1,2,3Faculty of Technology, Lebanese University, Lebanon ---------------------------------------------------------------------***----------------------------------------------------------------------

More information

Chapter 2--An Introduction to Linear Programming

Chapter 2--An Introduction to Linear Programming Chapter 2--An Introduction to Linear Programming 1. The maximization or minimization of a quantity is the A. goal of management science. B. decision for decision analysis. C. constraint of operations research.

More information

GIS News. Embracing GIS. Sept/Oct Election Day Flood Protection Plan. So Now What You Ask. NEWS Issue 1. Page 1 IN THIS ISSUE

GIS News. Embracing GIS. Sept/Oct Election Day Flood Protection Plan. So Now What You Ask. NEWS Issue 1. Page 1 IN THIS ISSUE 111 gis NEWS Issue 1 GIS News Sept/Oct 2014 IN THIS ISSUE Embracing GIS by Aleesha Erickson, GIS Coordinator for the City of Minot, ND GIS is everywhere. What does it mean you ask? A Geographic Information

More information

How To Create Backlinks

How To Create Backlinks How To Create Backlinks 1 Page Contents Who Is This Book For?... 3 A Trip In The Way-Back Machine... 4 A Little Refresher... 4 How To Build Backlinks... 6 Build Backlinks With Guest Posts... 7 Build Backlinks

More information

COS 116 The Computational Universe Laboratory 1: Web 2.0

COS 116 The Computational Universe Laboratory 1: Web 2.0 COS 116 The Computational Universe Laboratory 1: Web 2.0 Must be completed by the noon Tuesday, February 9, 2010. In this week s lab, you ll explore some web sites that encourage collaboration among their

More information

IMPLEMENTING ON OPTICAL CHARACTER RECOGNITION USING MEDICAL TABLET FOR BLIND PEOPLE

IMPLEMENTING ON OPTICAL CHARACTER RECOGNITION USING MEDICAL TABLET FOR BLIND PEOPLE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 IMPLEMENTING ON OPTICAL CHARACTER

More information

CAPTCHAAttacks and Weaknesses against OCR Technology

CAPTCHAAttacks and Weaknesses against OCR Technology Global Journal of Computer Science and Technology Neural & Artificial Intelligence Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs

Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, APRIL 9 Exploiting the - Gap in Image Recognition for Designing CAPTCHAs Ritendra Datta, Member, IEEE, Jia Li, Senior Member, IEEE, and James Z.

More information

SCHOLAR CYCLE: SEMESTER: AUGUST-DECEMBER 2017 REVIEW ACTIVITY OF MATHEMATICS I DATE: OCTOBER 2017

SCHOLAR CYCLE: SEMESTER: AUGUST-DECEMBER 2017 REVIEW ACTIVITY OF MATHEMATICS I DATE: OCTOBER 2017 UANL UNIVERSIDAD AUTÓNOMA DE NUEVO LEÓN SCHOLAR CYCLE: 017 018 SEMESTER: AUGUST-DECEMBER 017 REVIEW ACTIVITY OF MATHEMATICS I DATE: OCTOBER 017 MADE BY: MATHEMATICS ACADEMY FIRST SEMESTER ACADEMY COORDINATOR

More information

AI Considerations for an Automated Cyber Security Strategy Ron Winward Security Evangelist

AI Considerations for an Automated Cyber Security Strategy Ron Winward Security Evangelist AI Considerations for an Automated Cyber Security Strategy Ron Winward Security Evangelist May 2018 2 Cyber Kill Chain by Lockheed Martin Targeted attacks Plenty of opportunities to detect and block attacks

More information

Case-Based Reasoning. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. Parametric / Non-parametric.

Case-Based Reasoning. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. Parametric / Non-parametric. CS 188: Artificial Intelligence Fall 2008 Lecture 25: Kernels and Clustering 12/2/2008 Dan Klein UC Berkeley Case-Based Reasoning Similarity for classification Case-based reasoning Predict an instance

More information

CS 188: Artificial Intelligence Fall 2008

CS 188: Artificial Intelligence Fall 2008 CS 188: Artificial Intelligence Fall 2008 Lecture 25: Kernels and Clustering 12/2/2008 Dan Klein UC Berkeley 1 1 Case-Based Reasoning Similarity for classification Case-based reasoning Predict an instance

More information

JavaScript Activites

JavaScript Activites Note: Email your work to mrsaem@yahoo.com make sure you have zipped/compressed the files into one folder. Rename the Folder according to your name. [A-Level IT] ----------------------------------------------------------

More information

ARTIFACIAL: AUTOMATED REVERSE TURING TEST USING FACIAL FEATURES

ARTIFACIAL: AUTOMATED REVERSE TURING TEST USING FACIAL FEATURES ARTIFACIAL: AUTOMATED REVERSE TURING TEST USING FACIAL FEATURES 1.1.1 Yong Rui and Zicheng Liu 4/15/2003 Technical Report MSR-TR-2003-48 Microsoft Research Microsoft Corporation One Microsoft Way Redmond,

More information

MARKETING VOL. 3

MARKETING VOL. 3 TITLE: Proven Tips For Being Successful With Network Marketing Author: Iris Carter-Collins Table Of Contents Proven Tips For Being Successful With Network Marketing 1 Are You Here To Learn About E-mail

More information

FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES

FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES Swathi Polamraju and Sricharan Ramagiri Department of Electrical and Computer Engineering Clemson University ABSTRACT: Being motivated by the

More information

django-antispam Documentation

django-antispam Documentation django-antispam Documentation Release 0.2.0 Vladislav Bakin Mar 22, 2018 Contents 1 Documentation 3 2 Indices and tables 7 i ii django-antispam Documentation, Release 0.2.0 Various anti-spam protection

More information

Using Character Recognition and Segmentation to Tell Computer from Humans

Using Character Recognition and Segmentation to Tell Computer from Humans Using Character Recognition and Segmentation to Tell Computer from Humans Patrice Y. Simard, Richard Szeliski, Josh Benaloh, Julien Couvreur, and Iulian Calinov One Microsoft Way, Redmond, WA 98052 {patrice,szeliski,benaloh,

More information

Novel Security Method Using Captcha as Graphical Password

Novel Security Method Using Captcha as Graphical Password International Journal of Emerging Engineering Research and Technology Volume 3, Issue 2, February 2015, PP 18-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Novel Security Method Using Captcha as

More information

Efficient Shape Matching Using Shape Contexts

Efficient Shape Matching Using Shape Contexts Efficient Shape Matching Using Shape Contexts Greg Mori, Serge Belongie, Member, IEEE, and Jitendra Malik, Senior Member, IEEE Abstract We demonstrate that shape contexts can be used to quickly prune a

More information