COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART

Similar documents
SIMPLE TEXT BASED CAPTCHA FOR THE SECURITY IN WEB APPLICATIONS

1.Matlab Image Encryption Code

LAMPIRAN 1. Percobaan

% Edit the above text to modify the response to help Video_Player. % Last Modified by GUIDE v May :38:12

Signal and Systems. Matlab GUI based analysis. XpertSolver.com

GUI code for different sections is in following sections

1. Peralatan LAMPIRAN

MV 1:00 1:05 1:00 1:05

Telling Humans and Computers Apart (Automatically) How Lazy Cryptographers do AI

Homeworks on FFT Instr. and Meas. for Communication Systems- Gianfranco Miele. Name Surname

% Edit the above text to modify the response to help Principal

Graphical Password Scheme: CAPTCHA Sonali S. Pawar, Prof. Pravin P. Kalyankar

FORTIFICATION AGAINST PASSWORD GUESSING ATTACKS IN ONLINE SYSTEM

Ear Recognition. By: Zeyangyi Wang

LISTING PROGRAM. % UIWAIT makes pertama wait for user response (see UIRESUME) % uiwait(handles.figure1);

OMR Sheet Recognition

CAPTCHAAttacks and Weaknesses against OCR Technology

% --- Executes on button press in btn_gsn. function btn_gsn_callback(hobject, eventdata, handles) GaussianSpeckleNoise close AiSoftware;

LISTING PROGRAM. % Edit the above text to modify the response to help cover. % Last Modified by GUIDE v Jun :24:43

UNDERSTANDING CAPTCHA

LISTING PROGRAM. if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); else gui_mainfcn(gui_state, varargin{:}); end

LAMPIRAN LISTING PROGRAM

Experimental study of CAPTCHA: A Security Primitive

LAMPIRAN A LISTINGPROGRAM

User Authentication + Other Human Aspects

Web Forms Security, Attack and Defense: Theory and Practice of CAPTCHA Technique

Usable Security Introduction to User Authentication and Human Interaction Proof Research

Business Logic Attacks BATs and BLBs

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Trusted Profile Identification and Validation Model

Lampiran 1. Script M-File Global Ridge

Supplementary Information

LAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN

A Survey on Graphical Passwords in Providing Security

Security server using CAPTCHA. Introduction to CAPTCHA

Machine Learning and CAPTCHAs

Multi-Modal CAPTCHA: A User Verification Scheme

CAPTCHA Submitted in partial fulfillment of the requirement for the award of degree of Electronics

A NEW MACHINING COST CALCULATOR (MC 2 )

2016, IJARCSSE All Rights Reserved Page 209

Distributed-Application Security

The Electronic Voting System - EVS

Balancing Usability and Security in a Video CAPTCHA

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

International Journal of Intellectual Advancements and Research in Engineering Computations

PICATCHA MIMS 2011 FINAL PROJECT REPORT SUMMARY

Computer Security 4/15/18

Solving Sudoku with MATLAB

Password Guessing Resistant Protocol

Introduction to Data Mining

Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services

Collective Intelligence. CAPTCHAs. Eran Hershko

How to Tell a Human apart from a Computer. The Turing Test. (and Computer Literacy) Spring 2013 ITS B 1. Are Computers like Human Brains?

Security and Usability Challenges of Moving-Object CAPTCHAs

MEMBERSHIP & PARTICIPATION

Comprehensive Study on Performance Analysis of Various Captcha Systems

Lithium-Ion Battery Data. Management

Attacking CAPTCHAs for Fun and Profit

User Authentication + Human Aspects

Human Computation. Melissa Winstanley

JigCAPTCHA: An Advanced Image-Based CAPTCHA Integrated with Jigsaw Piece Puzzle using AJAX

GUI Signal Analysis and Filtering Design

Akkad Bakad Bambai Bo

CS 155 Final Exam. CS 155: Spring 2006 June 2006

Toward Part-based Document Image Decoding

A Model to Restrict Online Password Guessing Attacks

Making Money with Hubpages CA$HING IN WITH ARTICLE WRITING. Benjamin King

ECE Fall 05. Undergraduate Research: Digital Signal Processing & Quantization Effects

Chapter 1 Protecting Financial Institutions from Brute-Force Attacks

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

A Review on Various Interactive CAPTCHA Techniques Concerning Web Security

Finding a Minimum Covering Circle Based on Infinity Norms

11 Most Common. WordPress Mistakes. And how to fix them

MEMBERSHIP & PARTICIPATION

What is a security measure? Types of security measures. What is a security measure? Name types of security measures

CSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner

Who are you? Enter userid and password. Means of Authentication. Authentication 2/19/2010 COMP Authentication is the process of verifying that

Contents INTERFACING MATLAB WITH EMBEDDED SYSTEMS

Is Browsing Safe? Web Browser Security. Subverting the Browser. Browser Security Model. XSS / Script Injection. 1. XSS / Script Injection

Main Form visual Studio

A Generalized Method to Solve Text-Based CAPTCHAs

In this example on 20X200, the contrast ratio between the navigation text and its background is 1.57:1.

CSE Computer Security

Learning outcome LO1. 1. Understand the concepts of web application development. (Assignment 1)

Enhanced Security Solution to Prevent Online Password Guessing Attacks

ISeCure. The ISC Int'l Journal of Information Security. Image Flip CAPTCHA.

Automated Collection of High Quality 3D Avatar Images

Final Exam COS 116 Spring 2012: The Computational Universe

CSCE 120: Learning To Code

Social Networking Applied

A study of Video Response Spam Detection on YouTube

.., 7. References. [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra. [2] Erosion, dilation and related operators,by Mariusz Jankowski

Computer Security & Privacy

Elementary Computing CSC 100. M. Cheng, Computer Science

CSE Computer Security (Fall 2006)

A Review Paper on Network Security Attacks and Defences

ANALYSIS OF DDOS ATTACKS AND SOLUTIONS FOR CLOUD COMPUTING ENVIRONMENT

CS 161 Computer Security

ASPPlayground.net Version 3.x User FAQ s v1.0

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

Transcription:

COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART 1 Varjith Anchuri, 2 K.Hanuman Krishna, 3 M.Gopi Chand, 4 S.Rishi, UG Scholar Dept Of CSE, SRM University,Chennai. Abstract A CAPTCHA is a type of challenge-response test used in computing to determine whether the user is human. "CAPTCHA" is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart", trademarked by Carnegie Mellon University. A CAPTCHA involves one computer (a server) which asks a user to complete a test. While the computer is able to generate and grade the test, it is not able to solve the test on its own. Because computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A CAPTCHA is sometimes described as a reverse Turing test, because it is administered by a machine and targeted to a human, in contrast to the standard Turing test that is typically administered by a human and targeted to a machine. For example, human can generally read degraded images, but OCR machines cannot. CAPTCHAs are designed to prevent bots programs that pose as humans on the Internet from abusing internet services. Bots, driven not to dominate but to sell, sign up for thousands of free email accounts every minute, sending millions of spam messages from them. They infiltrate chat rooms, collecting personal information and posting links to promotional sites. They generate worms, break password systems, invade privacy, and drain resources. To defend e-commerce systems from bots, an increasing number of companies are arming themselves with CAPTCHAs. For example, users registering on Yahoo must first correctly recognize a distorted word displayed against a cluttered background and type it into a box to prove they are human. Such reading-based CAPTCHAs exploit the large gap between humans and machines in their ability to read images of text. Keywords: Yahoo, Infiltrade, Captcha, Worms. 1. INTRODUCTION A way to tell apart a human from a computer by a test is known as a Turing Test. When a computer program is able to generate such tests and evaluate the result, it is known as a CAPTCHA (Completely Automated Public test to Tell Computers and Humans Apart). In the past, Websites have often been attacked by malicious programs that register for service on massive scale. Programs can be written to automatically consume large amount of Web resources or bias results in on-line voting. This has driven researchers to the idea of CAPTCHA-based security, to ensure that such attacks are not possible without human intervention, which in turn makes them ineffective. CAPTCHA-based security protocols have also been proposed for related issues, e.g., countering Distributed Denial-of- 2351 2017 Varjith Anchuri. http://www.irjaet.com

Service (DDoS) attacks on Web servers. A CAPTCHA acts as a security mechanism by requiring a correct answer to a question which only a human can answer any better than a random guess. Humans have speed limitation and hence cannot replicate the impact of an automated program. Thus the basic requirement of a CAPTCHA is that computer programs must be slower than humans in responding correctly. To that purpose, the semantic gap between human understanding and the current level of machine intelligence can be exploited. Most current CAPTCHAs are text-based. 2. OBJECTIVE The project Entitled Reusable CAPTCHA Security Engine is mainly aimed at developing better CAPTCHAs. The best CAPTCHA would allow all human to pass through, while rejecting all machines. We would like to test these CAPTCHAs and invite both users and bots to attack them. 3. APPLICATIONS OF CAPTCHAS: CAPTCHAs have several applications for practical security: Preventing Comment Spam in Blogs. Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost! Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated scripts. Protecting Email Addresses From Scrapers. Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address. Online Polls. As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote. Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. This is better than the classic approach of locking an account after a sequence of unsuccessful logins. 2352 2017 Varjith Anchuri. http://www.irjaet.com

Search Engine Bots. It is sometimes desirable to keep web pages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed. 4. PROBLEM DEFINITION The main objective of the project is to generate the CAPTCHA images, provide a secure Form filling interface for the internet based Applications. Provide environment for the user to handle manually the form filling task. Provide the interface for the user to identify the image and fill the specified text box. It is sometimes rumored that spammers are using pornographic sites to solve CAPTCHAs: the CAPTCHA images are sent to a porn site, and the porn site users are asked to solve the CAPTCHA before being able to see a pornographic image. This is not a security concern for CAPTCHAs. While it might be the case that some spammers use porn sites to attack CAPTCHAs, the amount of damage this can inflict is tiny (so tiny that we haven't even noticed a dent!). Whereas it is trivial to write a bot that abuses an unprotected site millions of times a day, redirecting CAPTCHAs to be solved by humans viewing pornography would only allow spammers to abuse systems a few thousand times per day. The economics of this attack just don't add up: every time a porn site shows a CAPTCHA before a porn image, they risk losing a customer to another site that doesn't do this. 5. PROPOSED SYSTEM Fig.1. Steps in the execution of a JSP Application The proposed system consists of a CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. 2353 2017 Varjith Anchuri. http://www.irjaet.com

6. SAMPLE CODING MyMaingui function varargout = MyMainGUI(varargin) gui_singleton = 1; gui_state = struct( gui_name, mfilename,... gui_singleton, gui_singleton,... gui_openingfcn, @MyMainGUI_Openingcn,... gui_outputfcn, @MyMainGUI_OutputFcn,... gui_layoutfcn, [],... gui_callback, []); if nargin && ischar(varargin1) gui_state.gui_callback = str2func(varargin1); end if nargout varargout1:nargout = gui_mainfcn(gui_state, varargin:); else gui_mainfcn(gui_state, varargin:); end function MyMainGUI_OpeningFcn(hObject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); function varargout = MyMainGUI_OutputFcn(hObject, eventdata, handles) varargout1 = handles.output; function pushbutton1_callback(hobject, eventdata, handles) global file I ir ic d thvec; 2354 2017 Varjith Anchuri. http://www.irjaet.com

thvec=[0.5,0.5,0.5]; [filename,pathname]=uigetfile( *.png, Pick the wav file ); file=strcat([pathname filename]); I=imread(file); ir ic d =size(i); figure, image(i); title( Original Image ); function pushbutton2_callback(hobject, eventdata, handles) global I A B; A=rgb2gray(I); figure,imshow(a); B=medfilt2(A); figure,imshow(b); function pushbutton3_callback(hobject, eventdata, handles) global thvec ic ic I A img1d fid imghex binary S valrgb Iback IbackTrim; imgtrans = A ; img1d = A(:); imghex = dec2hex(img1d); fid = fopen( im16_1.txt, wt ); fprintf(fid, fclose(fid) binary=dec2bin(imghex) S,valRGB =Huffman_Encode(I,thvec); Iback=Huffman_Decode(S,valRGB); 2355 2017 Varjith Anchuri. http://www.irjaet.com

IbackTrim=Iback(1:ir,1:ic,:); function pushbutton4_callback(hobject, eventdata, handles) global decimal fid1 img1 IbackTrim binary ; decimal = bin2dec(binary); fid1 = fopen( out_1.txt, wt ); fprintf(fid1 ) img1 = fscanf(fid1, fclose(fid1) figure, image(ibacktrim); title( Output Image). CONCLUSION As a contribution toward improving the web security in the field of an automated challenge and response against attacks issued by automated programs, we proposed a simple text_based CAPTCHA. Two main goals have been considered to be achieved that is: simplicity of solving the technique for a human as well as the time that a human actually needs to find the solution.. To increase the difficulty for segmentation and recognition attacks on Captchas, we varied these significant features at each challenge in ranges potentially acceptable to human users. Our mechanism provides a solution to maximize the robustness and usability of text-based CAPTCHAs simultaneously. REFERENCES [1] Mumtaz M. Ali AL-Mukhtar and Rana Riad K. AL-Taie : A More robust text based captcha for the security in web applications. [2] H. Bay, T. Tuytelaars, and L. Van Gool. Surf: Speeded up robust features. Computer Vision ECCV 2006, pages 404 417, 2006. [3] E. Bursztein and S. Bethard.Decaptcha: breaking 75% of ebay audio CAPTCHAs. In Proceedings of the 3rd USENIX conference on Offensive technologies, page 8. USENIX Association, 2009. [4] E. Bursztein, S. Bethard, Fabry C., Dan Jurafsky, and John C.Mitchell. Design parameters and human-solvability oftext-based captchas. To appears. [5] ElieBursztein, Steven Bethard, John C. Mitchell, DanJurafsky, and Celine Fabry. How good are humans at solvingcaptchas? a large scale evaluation. In Security and Privacy,2010. 2356 2017 Varjith Anchuri. http://www.irjaet.com