Collective Intelligence. CAPTCHAs. Eran Hershko
|
|
- Corey Daniel
- 6 years ago
- Views:
Transcription
1 Collective Intelligence CAPTCHAs Eran Hershko
2 Outline 1) Introduction to CAPTCHA. 2) recaptcha (and Collective Intelligence). 3) How To Break Two CAPTCHAs: EZ- GIMPY & GIMPY. 4) Summery & Future Work.
3
4 CAPTCHA A CAPTCHA is a test that can be automatically generated, which most humans can pass, but most computers can t. Who Uses CAPTCHAs & Why? * e- mail websites- in order to stop spam. * Blogs & forums- in order to stop automatic posting. * Websites that sell tickets- in order to prevent scalpers from buying a lot of tickets. *
5 CAPTCHA EZ- GIMPY Code Completely Automated Public Turing test to tell Computers and Humans Apart
6 Part I Part II CAPTCHA The CAPTCHA achieves two opposite goals: 1) If the CAPTCHA is not broken- there is a way to differentiate humans from computers. 2) If the CAPTCHA is broken- a useful computer vision problem is solved. The CAPTCHA Paradox: A CAPTCHA is a program that can generate and grade tests that it itself can t pass!
7 The Evolution Of CAPTCHA EZ- GIMPY GIMPY ESP-PIX rechaptcha SQUIGL-PIX
8
9 recaptcha Collective Intelligence is a shared or group intelligence that emerges from the collaboration of many individuals. recpatcha uses Collective Intelligence in order to contribute to humanity!
10 Who uses recaptcha? * recaptcha is used by more than 40,000 websites! * Google purchased recaptcha in 2009.
11 How Does It Work? Romeo & Juliet control word Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Church incorporate two in one. suspicious word Optical Character Recognition (OCR) I Optical Character Recognition (OCR) II Dictionary Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Come, come with me, and we will Till holy Ohurch incorporate two in make short work; one. For, by your leaves, you shall not stay alone Till holy Church incorporate two in one. Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Come, come with me, and we will Till holy Chulch incorporate two in make short work; one. For, by your leaves, you shall not stay alone Till holy Chulch incorporate two in one. Ohurch Church Chulch Chulch
12 How Does It Work? fiery Church fiery Bhurch
13 How Does It Work? fiery Church Church chief Church overlooks Inquiry Church OCR = 1 point = 1/2 point A Suspicious word is Correct if Suspicious word > 2.5 points
14 How Does It Work? fiery Church Church chief Church overlooks Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Ohurch incorporate two in one. OCR Come, come with me, and we will make short work; For, by your leaves, you shall not stay alone Till holy Chulch incorporate two in one. OCR The Suspicious word becomes a Control word!
15 How Does It Work? Reject Reject Reject Reject Reject Reject The word is Unreadable!
16 Some Statistics How many humans are required for a word to be considered correct? 3.11% 4.06% * 7.10% 67.87% 17.86% * Including words which are considered unreadable.
17 Why is recaptcha more secure than CAPTCHA? 1) recaptcha uses only words that OCR already failed to decipher. 2) CAPTCHAs generate their own artificial distorted characters. A smart learning algorithm can recognize them. 3) recaptcha has two natural distortions and one artificial: a. The fading of the text in time (natural). b. The noise introduced by the scanning process (natural). c. The added distortion (artificial). Algorithms that succeeded in more than 90% in recognizing CAPTCHA were completely unable to recognize recaptcha!
18 Several Results 50 = 99.1% OCR = 83.5%
19 Several Results * After one year of running: More than 1.2 billion recaptchas were solved! More than 440 million suspicious words were correctly deciphered! recaptcha has successfully achieved its goal in efficiently harnessing Collective Intelligence!
20 Breaking EZ- GIMPY CAPTCHA
21 EZ- GIMPY- How is it done? 1) Choosing a word out of 561 words dictionary. 2) Distorting and blurring its characters. 3) Adding a cluttered and confusing background.
22 The Algorithm This algorithm treats every letter as an individual: The algorithm s steps: Step A & B- Finding individual letters in the image and extracting candidate words. Step C- Choosing the most likely word. requires low computational power requires high computational power
23 Step A Producing a training set: 1) Extracting a letter from a EZ- GIMPY image. 2) Running a Canny edge detection. 3) Sampling 100 points from the letter s interior and exterior edges. 4) Extracting the 2600 (26*100) Shape Contexts. 1) 2) 3) 4)
24 Step A Finding letters in the image: 1) Choosing randomly several sample points from the image. 2) Generating a shape context for each point. 3) Finding the letters from the training set with closest shape contexts. 1) 3)
25 Step B Finding Sequences of letters that form candidate words: For every letter, trying to construct a possible word. There are several constrains: letters must be from left to right, not be too far from each other nor too close and the candidate words must be from the dictionary. profit roll
26 Step C Choosing the most likely word: 1) For each letter, building generalized shape contexts (which assumes many possible deformations in the letters). 2) Giving a score to each letter according to the distance. 3) The answer to EZ- GIMPY is the word with the highest score.
27 Results * This algorithm has a success rate of 83% of the time. collar canvas jewel smile spade soap line here till
28 Breaking GIMPY CAPTCHA
29 GIMPY- How is it done? 1) Choosing words out of 411 words dictionary. 2) Distorting and blurring the characters. 3) Locating the words randomly in the image in 5 pairs (one on the other). 4) Adding a cluttered and confusing background. * The user must recognize 3 words correctly.
30 The Algorithm This algorithm treats every word as a whole and not individual letters: The algorithm s steps: Step A & B- Finding candidate words in the image. Step C- Choosing the most likely words. requires low computational power requires high computational power
31 Step A Finding candidate words in the image: 1) Finding the suspicious places which contain pairs of words. 2) For every pair, conducting edge detection and finding the first two letters and the last two letters, by using shape contexts. 3) Producing a list of the possible candidate words from the dictionary. The result is a list of approximately 4 candidate words. 1) 2)
32 Step B Removing layers of words: 1) Removing the edges of the candidate word from the image and repeating step A (trying to find candidate words). 2) Each pair of words in the image has approximately 16 pairs of candidate words. r o u n d
33 Step C Giving final score: 1) For each pair, producing a synthetic image of the two words overlaid with their estimated locations. 2) Computing the shape contexts of the synthetic image. 3) Every suspicious word in a pair of the original image gets a score according to the distance of its shape contexts from the shape contexts of the synthetic word. 4) The three words with the highest scores are chosen as the answer to the GIMPY CAPTCHA. r c o o u w n d r o w r o u n d
34 Results * This algorithm has a success rate of 33% in guessing the correct three words of GIMPY. * Applying this algorithm on EZ- GIMPY results in a success rate of 92% (The previous algorithm gave only 83%).. true, with, sponge carriage, potato, clock door, farm, important narrow, bulb, right church, tongue, bad sudden, oven, apple
35 Summery 1) EZ GIMPY is successfully broken (92% success). There is still work to be done on GIMPYas a Computer Vision challenge. 2) The reason of recaptcha s success: Solving a recaptcha is an action that people have to do anyway. They feel better when it s for an important cause. 3) The new CAPTCHAs will set new challenges in the Computer Vision field.
36 Future Work The constant battle between Good and Evil The Evil Side: Breaking recaptcha and the new image based CAPTCHAs with a reasonable rate of success. The Good Side: Finding new forms of image based problems that humans can easily solve but computers and computer vision algorithms can t.
37 Questions?
38 References 1) recaptcha: Human-Based Character Recognition via Web Security Measures - Luis von Ahn et al. 2) Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA - G Mori et al. 3) Shape Matching and Object Recognition Using Shape Context - Serge Belongie et al. 4) Telling Humans And Computers Apart Automatically - Luis von Ahn et al. 5) Breaking recaptcha: A Holistic Approach via Shape Recognition -Paul Baecher et al. 6)
39
40 Related Work From 2011
41 New CAPTCHA Which Uses Empathy
Human Computation. Melissa Winstanley
Human Computation Melissa Winstanley mwinst@cs.washington.edu What computers do badly Open-ended, unstructured tasks Creativity Writing stories Composing music Making art Conversation Loebner Prize (chatbots)
More informationUNDERSTANDING CAPTCHA
UNDERSTANDING CAPTCHA The Need for CAPTCHAs To Prevent Abuse of Online Systems William Sembiante University of New Haven What is CAPTCHA? Term coined in 2000 at Carnegie Mellon by Luis von Ahn, Manuel
More informationRecognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA
Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA Greg Mori Jitendra Malik Computer Science Division Computer Science Division University of California, Berkeley University of California,
More informationBiometrics&CAPTCHA. 11/29/2010 EJ Jung
Biometrics&CAPTCHA 11/29/2010 EJ Jung Announcements Guest lecture on Wed. December 1st. readings in the Schedule page report after the lecture - extra credit for quiz Service lab presentation on Mon. December
More informationThe Robustness of Connecting Characters Together CAPTCHAs *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 347-369 (2014) The Robustness of Connecting Characters Together CAPTCHAs * Software Engineering Institute Xidian University Xi an, Shaanxi, 710071 P.R.
More informationA Generalized Method to Solve Text-Based CAPTCHAs
A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method
More informationWeb Forms Security, Attack and Defense: Theory and Practice of CAPTCHA Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCS 343H: Honors AI. Lecture 23: Kernels and clustering 4/15/2014. Kristen Grauman UT Austin
CS 343H: Honors AI Lecture 23: Kernels and clustering 4/15/2014 Kristen Grauman UT Austin Slides courtesy of Dan Klein, except where otherwise noted Announcements Office hours Kim s office hours this week:
More informationUsable Security Introduction to User Authentication and Human Interaction Proof Research
Usable Security Introduction to User Authentication and Human Interaction Proof Research Argyris C. Constantinides PhD Student Department of Computer Science University of Cyprus 1 Agenda Introduction
More informationBalancing Usability and Security in a Video CAPTCHA
Balancing Usability and Security in a Video CAPTCHA Google, Inc. kak@google.com Rochester Institute of Technology rlaz@cs.rit.edu Symposium on Usable Privacy and Security (SOUPS) 2009 July 15th-17th, 2009,
More informationPICATCHA MIMS 2011 FINAL PROJECT REPORT SUMMARY
A platform to monetize usable & secure CAPTCHAs for desktop and mobile devices May 5th, 2011 School of Information, University of California Berkeley Final Project Report Team: Dhawal Mujumdar and Satish
More informationComputer Security 4/15/18
Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)
More informationComputer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();
More informationComprehensive Study on Performance Analysis of Various Captcha Systems
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Review Article Comprehensive
More informationTelling Humans and Computers Apart (Automatically) How Lazy Cryptographers do AI
Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI Luis von Ahn Manuel Blum John Langford If you try to get a new email account at Yahoo, you ll be asked to prove that
More informationEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas Dilip Kumar Kushwaha Department of MCA BBDIT, Ghaziabad, India Harleen Kaur FMIT, JAMIA HAMDARD New Delhi, India KM Priyanka Department of MCA BBDIT, Ghaziabad,
More informationCAPTCHAs and Information Hiding
CAPTCHAs and Information Hiding Neal R. Wagner The University of Texas at San Antonio Department of Computer Science San Antonio, Texas 78249 USA wagner@cs.utsa.edu Abstract. The goal of steganography
More informationA deep learning model for recognition of complex Text-based CAPTCHAs
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.2, February 2018 103 A deep learning model for recognition of complex Text-based CAPTCHAs Rafaqat Hussain Arain 1, Riaz
More informationB reaking Audio CAPTCHAs
B reaking Audio CAPTCHAs Jennifer Tam Computer Science Department Carnegie Mellon University 5000 Forbes Ave, Pittsburgh 15217 jdtam@cs.cmu.edu Sean Hyde Electrical and Computer Engineering Carnegie Mellon
More informationA Survey on Graphical Passwords in Providing Security
A Survey on Graphical Passwords in Providing Security Mrs. Anuradha. V #, Mr.M.Nagesh *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering & Technology, JNTU Hyderabad
More informationCS4495/6495 Introduction to Computer Vision. 1A-L1 Introduction
CS4495/6495 Introduction to Computer Vision 1A-L1 Introduction Outline What is computer vision? State of the art Why is this hard? Course overview Software Why study Computer Vision? Images (and movies)
More informationKeywords gimpy, Turing test, CAPTCHA, bongo, recaptcha.
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Understanding Captcha:
More informationDecoding recaptcha. COSC 174 Term project Curtis R. Jones & Jacob Russell
Decoding recaptcha COSC 174 Term project Curtis R. Jones & Jacob Russell May 28, 2012 Curtis Jones & Jacob Russell Decoding recaptcha Page 1 Project Objective Our project is on solving recaptcha puzzles.
More informationISeCure. The ISC Int'l Journal of Information Security. Image Flip CAPTCHA.
The ISC Int'l Journal of Information Security July 2009, Volume 1, Number 2 (pp. 105 123) http://www.isecure-journal.org Image Flip CAPTCHA M. Tariq Banday a,, Nisar A. Shah a a P. G. Department of Electronics
More informationESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test
ESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test Andrew Dempsey Mentor: Ming Chow Fall 2014 Abstract In this paper, we will examine the effectiveness of a variety of forms of the Completed
More informationOnly attaches labels to random images from the internet. Given label, can we identify where label actually is? Given label can we identify where label
Peekaboom: A Game for Locating Objects in Images By Luis von Ahn, Ruoran Liu, and Manuel Blum ESP Game Only attaches labels to random images from the internet Does not specify location o of image Thus,
More informationFacilitating Form Filling For Visually Impaired By Automatic Detection Of Captcha In Web Forms
Facilitating Form Filling For Visually Impaired By Automatic Detection Of Captcha In Web Forms Ms. Priyanka, Assistant Professor, Department of MCA, BBDIT, Ghaziabad, Dr. Harleen Kaur, Assistant Professor,
More informationOSN Attack Automated Identity Theft Attacks
OSN Attack Automated Identity Theft Attacks John LePage Department of Electrical & Computer Engineering Missouri University of Science and Technology jlpc5@mst.edu 9 November 2016 2014 John LePage Introduction
More informationA Review on Various Interactive CAPTCHA Techniques Concerning Web Security
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationJigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-5, November 2012 JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX
More informationHow to Tell a Human apart from a Computer. The Turing Test. (and Computer Literacy) Spring 2013 ITS B 1. Are Computers like Human Brains?
How to Tell a Human apart from a Computer The Turing Test (and Computer Literacy) Spring 2013 ITS102.23 - B 1 Are Computers like Human Brains? The impressive contributions of computers during World War
More informationExperimental study of CAPTCHA: A Security Primitive
Experimental study of CAPTCHA: A Security Primitive Pawar Sonali 1, Kalyankar Pravin 2 1, 2 T.P.C.T. s College of Engineering,Osmanabad, Solapur-Osmanabad Road, Osmanabad, India Abstract: Captcha as graphical
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Animated Handwritten CAPTCHA based on 3D Effect Mutha Neha Chandrakant 1 1 Department
More informationKeywords: Web Security, CAPTCHA, Evaluation and limitation, cognitive power of human, Computer Architecture.
Volume 4, Issue 6, June 2014 ISSN 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at www.ijarcsse.com Evolving New CAPTCHA
More informationOCR and OCV. Tom Brennan Artemis Vision Artemis Vision 781 Vallejo St Denver, CO (303)
OCR and OCV Tom Brennan Artemis Vision Artemis Vision 781 Vallejo St Denver, CO 80204 (303)832-1111 tbrennan@artemisvision.com www.artemisvision.com About Us Machine Vision Integrator Turnkey Systems OEM
More informationMulti-Modal CAPTCHA: A User Verification Scheme
Multi-Modal CAPTCHA: A User Verification Scheme Abdulaziz S Almazyad Yasir Ahmad Shouket Ahmad Kouchay Deptt of Computer Engg Deptt of Computer Science Deptt of Information Systems King Saud University
More information2. Basic Task of Pattern Classification
2. Basic Task of Pattern Classification Definition of the Task Informal Definition: Telling things apart 3 Definition: http://www.webopedia.com/term/p/pattern_recognition.html pattern recognition Last
More informationOn the Security of recaptcha
On the Security of recaptcha Bachelor-Thesis by Benjamin Milde from Darmstadt July 2010 Darmstadt University of Technology Department of Computer Science Minimizing Cryptographic Assumptions (MiniCrypt)
More informationCAPTCHA Suitable for Smartphones
CAPTCHA Suitable for Smartphones Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura To cite this version: Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura. CAPTCHA Suitable for Smartphones. David Hutchison;
More informationMove & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services
International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 05 9 Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services Moin Mahmud
More informationSURVEY ON CAPTCHA SYSTEMS
Volume 3, No. 6, June 2012 Journal of Global Research in Computer Science TECHNICAL NOTE Available Online at www.jgrcs.info SURVEY ON CAPTCHA SYSTEMS Rizwan Ur Rahman Maulana Azad National Institute of
More informationSemCAPTCHA user-friendly alternative for OCR-based CAPTCHA systems
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 325 329 ISBN 978-83-60810-14-9 ISSN 1896-7094 SemCAPTCHA user-friendly alternative for OCR-based CAPTCHA
More informationPersian/Arabic Baffletext CAPTCHA 1
Journal of Universal Computer Science, vol. 12, no. 12 (2006), 1783-1796 submitted: 20/3/06, accepted: 22/12/06, appeared: 28/12/06 J.UCS Persian/Arabic Baffletext CAPTCHA 1 Mohammad Hassan Shirali-Shahreza
More informationCS 418/518 Web Programming Spring CAPTCHA and Search. Dr. Michele Weigle. Outline ! CAPTCHA. !
CS 418/518 Web Programming Spring 2014 CAPTCHA and Search Dr. Michele Weigle http://www.cs.odu.edu/~mweigle/cs418-s14/ Outline! CAPTCHA! Search 2 CAPTCHA! Completely Automated Public Turing test to tell
More informationGraphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar
Graphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar Computer Science and Engineering, Dr. B.A.M.University, Aurangabad e-mail: sonali.pawar052@gmail.com Contact No. :9665144137
More informationNovel CAPTCHA schemes
Novel CAPTCHA schemes Ville Saalo Helsinki University of Technology Ville.Saalo@iki.fi Abstract A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a program that
More informationCAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics
A Seminar report On CAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Acknowledgement
More informationIn this example on 20X200, the contrast ratio between the navigation text and its background is 1.57:1.
ACCESSIBLITY COMMON DEVELOPER MISTAKES Web Council Meeting, May 11 th 2011 1. Too Low Contrast The contrast between text and background is a major contributing factor to the readability of a website. This
More informationBreaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms
23rd Annual Computer Security Applications Conference Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms Jeff Yan, Ahmad Salah El Ahmad School of Computing Science, Newcastle University,
More informationDistributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski
Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution
More informationShape Context and Chamfer Matching in Cluttered Scenes
Shape Context and Chamfer Matching in Cluttered Scenes A. Thayananthan Λ B. Stenger Λ P. H. S. Torr y R. Cipolla Λ Λ University of Cambridge y Microsoft Research Ltd. Department of Engineering 7 JJ Thompson
More informationDistributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski
Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons
More informationTo The Graduate Council:
To The Graduate Council: I am submitting a thesis written by Sumit Khanna entitled Breaking the Multi- Colored Box: A Study of CAPTCHA. I have examined the final copy of this thesis and recommend that
More informationThe Kinect Sensor. Luís Carriço FCUL 2014/15
Advanced Interaction Techniques The Kinect Sensor Luís Carriço FCUL 2014/15 Sources: MS Kinect for Xbox 360 John C. Tang. Using Kinect to explore NUI, Ms Research, From Stanford CS247 Shotton et al. Real-Time
More informationApplication of the Technology Acceptance Model to OCR-based CAPTCHA systems
Application of the Technology Acceptance Model to OCR-based CAPTCHA systems Pawel Lupkowski a,, Pawel Kleka a a Institute of Psychology, Adam Mickiewicz University, Szamarzewskiego 89a, 60-568 Poznan,
More informationStrategic White Paper
Strategic White Paper Automated Handwriting Recognition Takeaways In this paper you ll learn: How recognition works, accuracy, applications and benefits Differences between earlier ICR programs and more
More informationA Review of Bot Protection using CAPTCHA for Web Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 6 (Jan. - Feb. 2013), PP 36-42 1 Baljit Singh Saini, 2 Anju Bala Asst. Professor, Deptt. CSE/IT, Research
More informationAttacking CAPTCHAs for Fun and Profit
Attacking Author: Gursev Singh Kalra Managing Consultant Foundstone Professional Services Table of Contents Attacking... 1 Table of Contents... 2 Introduction... 3 A Strong CAPTCHA Implementation... 3
More informationBreaking an Animated CAPTCHA Scheme
Breaking an Animated CAPTCHA Scheme Vu Duc Nguyen 1, Yang-Wai Chow 2 and Willy Susilo 1 1 Centre for Computer and Information Security Research 2 Advanced Multimedia Research Laboratory School of Computer
More informationImproving Online Security Using Graphical Password
Improving Online Security Using Graphical Password Avinash Manne M.Tech Student, Department of Computer Science and Engineering, Chilukuri Balaji Institute of Technology. Hyderabad. Abstract: Online security
More informationImage Recognition CAPTCHAs
In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, September 2004, pp. 268-279 Image Recognition CAPTCHAs Monica Chew and J. D. Tygar, UC Berkeley {mmc,tygar}@cs.berkeley.edu
More informationComputer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 09. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2017 April 17, 2017 CS 419 2017 Paul Krzyzanowski 1 Biometrics Identify a person based on physical or behavioral
More informationThe Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering
The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationExploration of 3D Texture and Projection for New CAPTCHA Design
Exploration of 3D Texture and Projection for New CAPTCHA Design Simon S. Woo 1,2, Jingul Kim 1,3, Duoduo Yu 1, and Beomjun Kim 1 1 Computer Science Department University of Southern California Los Angeles,
More informationCracking Captchas For Cash: A Review Of CAPTCHA Crackers
Cracking Captchas For Cash: A Review Of CAPTCHA Crackers Merrill Serrao Shanu Salunke Amrita Mathur (Assistant Professor) Abstract The CAPTCHA [Completely Automated Public Turing test to tell Computers
More informationCOMPUTING SCIENCE. The Robustness of Google CAPTCHAs. Ahmad S El Ahmad, Jeff Yan and Mohamad Tayara TECHNICAL REPORT SERIES
COMPUTING SCIENCE The Robustness of Google CAPTCHAs Ahmad S El Ahmad, Jeff Yan and Mohamad Tayara TECHNICAL REPORT SERIES No. CS-TR-1278 September 2011 TECHNICAL REPORT SERIES No. CS-TR-1278 September,
More informationChapter 2 An Introduction to Linear Programming
Chapter 2 An Introduction to Linear Programming MULTIPLE CHOICE 1. The maximization or minimization of a quantity is the a. goal of management science. b. decision for decision analysis. c. constraint
More informationTA Section 7 Problem Set 3. SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999)
TA Section 7 Problem Set 3 SIFT (Lowe 2004) Shape Context (Belongie et al. 2002) Voxel Coloring (Seitz and Dyer 1999) Sam Corbett-Davies TA Section 7 02-13-2014 Distinctive Image Features from Scale-Invariant
More informationMining of Massive Datasets
Mining of Massive Datasets Krzysztof Dembczyński Intelligent Decision Support Systems Laboratory (IDSS) Poznań University of Technology, Poland Software Development Technologies Master studies, second
More informationTABLE OF CONTENTS. Introduction Setting up Your Patriot Voice Controls Starting the System Controls...
USER MANUAL TABLE OF CONTENTS Introduction... 03 Setting up Your Patriot Voice... 04 Controls... 05 Starting the System... 06 Controls... 06 Additional Keys... 09 Menu Zone... 10 System Settings... 15
More informationCombining Gabor Features: Summing vs.voting in Human Face Recognition *
Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu
More informationCOMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART
COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART 1 Varjith Anchuri, 2 K.Hanuman Krishna, 3 M.Gopi Chand, 4 S.Rishi, UG Scholar Dept Of CSE, SRM University,Chennai. Abstract A
More informationSecurity and Usability Challenges of Moving-Object CAPTCHAs
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose and Paul Van Oorschot 1 2 CAPTCHAs Application
More informationFeature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule.
CS 188: Artificial Intelligence Fall 2007 Lecture 26: Kernels 11/29/2007 Dan Klein UC Berkeley Feature Extractors A feature extractor maps inputs to feature vectors Dear Sir. First, I must solicit your
More informationAn audio CAPTCHA to distinguish humans from computers
An audio CAPTCHA to distinguish humans from computers Haichang Gao, Honggang Liu, Dan Yao, Xiyang Liu Software Engineering Institute Xidian University Xi an, Shaanxi 7171, P.R.China hchgao@xidian.edu.cn
More informationRecognizing hand-drawn images using shape context
Recognizing hand-drawn images using shape context Gyozo Gidofalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract The objective
More informationSolving Word Jumbles
Solving Word Jumbles Debabrata Sengupta, Abhishek Sharma Department of Electrical Engineering, Stanford University { dsgupta, abhisheksharma }@stanford.edu Abstract In this report we propose an algorithm
More informationOCR Interfaces for Visually Impaired
OCR Interfaces for Visually Impaired TOPIC ASSIGNMENT 2 Author: Sachin FERNANDES Graduate 8 Undergraduate Team 2 TOPIC PROPOSAL Instructor: Dr. Robert PASTEL March 4, 2016 LIST OF FIGURES LIST OF FIGURES
More informationASSESSING THE USABILITY ISSUES OF CAPTCHA
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X ASSESSING THE USABILITY ISSUES OF CAPTCHA Ragavi.V 1 and Dr.G. G.Geetha 2 1 Department of Computer Applications,
More informationFast Company Homepage This ad is very distracting and grabs the viewer attention more than the logo and navigation. It could cause the user to overloo
Competitive Review Fast Company Homepage Doing well: It has a bold and modern feel that appeals to the internet audience. Doing poorly: The layout is confusing as to which elements match up and it's unclear
More informationDifferent Implemented Captchas and Breaking Methods
Different Implemented Captchas and Breaking Methods Shadi Khawandi 1, Anis Ismail 2, Firas Abdallah 3 1,2,3Faculty of Technology, Lebanese University, Lebanon ---------------------------------------------------------------------***----------------------------------------------------------------------
More informationChapter 2--An Introduction to Linear Programming
Chapter 2--An Introduction to Linear Programming 1. The maximization or minimization of a quantity is the A. goal of management science. B. decision for decision analysis. C. constraint of operations research.
More informationGIS News. Embracing GIS. Sept/Oct Election Day Flood Protection Plan. So Now What You Ask. NEWS Issue 1. Page 1 IN THIS ISSUE
111 gis NEWS Issue 1 GIS News Sept/Oct 2014 IN THIS ISSUE Embracing GIS by Aleesha Erickson, GIS Coordinator for the City of Minot, ND GIS is everywhere. What does it mean you ask? A Geographic Information
More informationHow To Create Backlinks
How To Create Backlinks 1 Page Contents Who Is This Book For?... 3 A Trip In The Way-Back Machine... 4 A Little Refresher... 4 How To Build Backlinks... 6 Build Backlinks With Guest Posts... 7 Build Backlinks
More informationCOS 116 The Computational Universe Laboratory 1: Web 2.0
COS 116 The Computational Universe Laboratory 1: Web 2.0 Must be completed by the noon Tuesday, February 9, 2010. In this week s lab, you ll explore some web sites that encourage collaboration among their
More informationIMPLEMENTING ON OPTICAL CHARACTER RECOGNITION USING MEDICAL TABLET FOR BLIND PEOPLE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 IMPLEMENTING ON OPTICAL CHARACTER
More informationCAPTCHAAttacks and Weaknesses against OCR Technology
Global Journal of Computer Science and Technology Neural & Artificial Intelligence Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationExploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, APRIL 9 Exploiting the - Gap in Image Recognition for Designing CAPTCHAs Ritendra Datta, Member, IEEE, Jia Li, Senior Member, IEEE, and James Z.
More informationSCHOLAR CYCLE: SEMESTER: AUGUST-DECEMBER 2017 REVIEW ACTIVITY OF MATHEMATICS I DATE: OCTOBER 2017
UANL UNIVERSIDAD AUTÓNOMA DE NUEVO LEÓN SCHOLAR CYCLE: 017 018 SEMESTER: AUGUST-DECEMBER 017 REVIEW ACTIVITY OF MATHEMATICS I DATE: OCTOBER 017 MADE BY: MATHEMATICS ACADEMY FIRST SEMESTER ACADEMY COORDINATOR
More informationAI Considerations for an Automated Cyber Security Strategy Ron Winward Security Evangelist
AI Considerations for an Automated Cyber Security Strategy Ron Winward Security Evangelist May 2018 2 Cyber Kill Chain by Lockheed Martin Targeted attacks Plenty of opportunities to detect and block attacks
More informationCase-Based Reasoning. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. Parametric / Non-parametric.
CS 188: Artificial Intelligence Fall 2008 Lecture 25: Kernels and Clustering 12/2/2008 Dan Klein UC Berkeley Case-Based Reasoning Similarity for classification Case-based reasoning Predict an instance
More informationCS 188: Artificial Intelligence Fall 2008
CS 188: Artificial Intelligence Fall 2008 Lecture 25: Kernels and Clustering 12/2/2008 Dan Klein UC Berkeley 1 1 Case-Based Reasoning Similarity for classification Case-based reasoning Predict an instance
More informationJavaScript Activites
Note: Email your work to mrsaem@yahoo.com make sure you have zipped/compressed the files into one folder. Rename the Folder according to your name. [A-Level IT] ----------------------------------------------------------
More informationARTIFACIAL: AUTOMATED REVERSE TURING TEST USING FACIAL FEATURES
ARTIFACIAL: AUTOMATED REVERSE TURING TEST USING FACIAL FEATURES 1.1.1 Yong Rui and Zicheng Liu 4/15/2003 Technical Report MSR-TR-2003-48 Microsoft Research Microsoft Corporation One Microsoft Way Redmond,
More informationMARKETING VOL. 3
TITLE: Proven Tips For Being Successful With Network Marketing Author: Iris Carter-Collins Table Of Contents Proven Tips For Being Successful With Network Marketing 1 Are You Here To Learn About E-mail
More informationFACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES
FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES Swathi Polamraju and Sricharan Ramagiri Department of Electrical and Computer Engineering Clemson University ABSTRACT: Being motivated by the
More informationdjango-antispam Documentation
django-antispam Documentation Release 0.2.0 Vladislav Bakin Mar 22, 2018 Contents 1 Documentation 3 2 Indices and tables 7 i ii django-antispam Documentation, Release 0.2.0 Various anti-spam protection
More informationUsing Character Recognition and Segmentation to Tell Computer from Humans
Using Character Recognition and Segmentation to Tell Computer from Humans Patrice Y. Simard, Richard Szeliski, Josh Benaloh, Julien Couvreur, and Iulian Calinov One Microsoft Way, Redmond, WA 98052 {patrice,szeliski,benaloh,
More informationNovel Security Method Using Captcha as Graphical Password
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 2, February 2015, PP 18-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Novel Security Method Using Captcha as
More informationEfficient Shape Matching Using Shape Contexts
Efficient Shape Matching Using Shape Contexts Greg Mori, Serge Belongie, Member, IEEE, and Jitendra Malik, Senior Member, IEEE Abstract We demonstrate that shape contexts can be used to quickly prune a
More information