Skip to main content

A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation

  • Conference paper
  • First Online:
Security, Privacy, and Applied Cryptography Engineering (SPACE 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11348))

Abstract

Over the past decade, several public web services made an attempt to prevent automated scripts and exploitation by bots by interrogating a user to solve a Turing-test challenge (commonly known as a CAPTCHA) before using the service. A CAPTCHA is a cryptographic protocol whose underlying hardness assumption is based on an artificial intelligence problem. CAPTCHAs challenges rely on the problem of distinguishing images of living or non-living objects (a task that is easy for humans). User studies proves, it can be solved by humans 99.7% of the time in under 30 s while this task is difficult for machines. The security of image based CAPTCHAs challenge is based on the presumed difficulty of classifying CAPTCHAs database images automatically.

In this paper, we proposed a classification model which is 95.2% accurate in telling apart the images used in the CAPTCHA database. Our method utilizes layered features optimal tuning with an improved VGG16 architecture of Convolutional Neural Networks. Experimental simulation is performed using Caffe deep learning framework. Later, we compared our experimental results with significant state-of-the-art approaches in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. BotBarrier.com. On the web. http://www.botbarrier.com/

  2. Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (HIPs). In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems. Email and Security, pp. 711–720 (2005)

    Google Scholar 

  3. Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 268–279. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30144-8_23

    Chapter  Google Scholar 

  4. http://caffe.berkeleyvision.org/

  5. Naor, M.: Verification of a human in the loop or Identification via the Turing Test. Unpublished Manuscript (1997). Electronically: www.wisdom.weizmann.ac.il/~naor/PAPERS/human.ps

  6. Lillibridge, M.D., Adabi, M., Bharat, K., Broder, A.: Method for selectively restricting access to computer systems. Technical report, US Patent 6,195,698, Applied April 1998 and Approved February 2001

    Google Scholar 

  7. Coates, A.L., Baird, H.S., Fateman, R.J.: Pessimal print: a reverse turing test. In: Proceedings of the International Conference on Document Analysis and Recognition (ICDAR 2001), Seattle WA, pp. 1154–1159 (2001)

    Google Scholar 

  8. Xu, J., Lipton, R., Essa, I.: Hello, are you human. Technical Report GIT-CC-00-28, Georgia Institute of Technology, November 2000

    Google Scholar 

  9. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: The CAPTCHA (2000). http://www.captcha.net

  10. von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (Automatically) or how lazy cryptographers do AI. Commun. ACM (2002, to appear)

    Google Scholar 

  11. Simard, P., Steinkraus, D., Platt, J.C.: Best practices for convolutional neural networks applied to visual document analysis. In: International Conference on Document Analysis and Recognition, pp. 958–962. IEEE Computer Society (2003)

    Google Scholar 

  12. Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Conference on Computer Vision and Pattern Recognition (CVPR 2003), pp. 134–144. IEEE Computer Society (2003)

    Google Scholar 

  13. Kwon, S., Cha, S.: A paradigm shift for the CAPTCHA race: adding uncertainty to the process. IEEE Softw. 33(6), 80–85 (2016)

    Article  Google Scholar 

  14. Elson, J., Douceur, J., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of ACM CCS 2007, pp. 366–374 (2007)

    Google Scholar 

  15. Azakami, T., Shibata, C., Uda, R.: Challenge to impede deep learning against CAPTCHA with ergonomic design. In: IEEE 41st Annual Computer Software and Applications Conference, Italy (2017)

    Google Scholar 

  16. Golle, P., Wagner, D.: Cryptanalysis of a cognitive authentication scheme. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 66–70. IEEE Computer Society (2007)

    Google Scholar 

  17. Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings of the 2003 Conference on Computer Vision and Pattern Recognition, pp. 134–144. IEEE Computer Society (2003)

    Google Scholar 

  18. SlashDot. Yahoo CAPTCHA Hacked. http://it.slashdot.org/it/08/01/30/0037254.shtml. Accessed 29 Jan 2008

  19. Websense Blog: Google’s CAPTCHA busted in recent spammer tactics, 22 February 2008. http://securitylabs.websense.com/content/Blogs/2919.aspx

  20. Yan, J., El Ahmad, A.: A low-cost attack on a Microsoft CAPTCHA. In: Proceedings of ACM CCS (2008, to appear)

    Google Scholar 

  21. Chow, R., Golle, P., Jakobsson, M., Wang, X., Wang, L.: Making CAPTCHAs clickable. In: Proceedings of HotMobile (2008)

    Google Scholar 

  22. Goodfellow, I.J., Bulatov, Y., Ibarz, J., Arnoud, S., Shet, V.: Multi-digit number recognition from street view imagery using deep convolutional neural networks. In: Proceedings of ICLR, April 2014

    Google Scholar 

  23. Vinyals, O., Toshev, A., Bengio, S., Erhan, D.: Show and tell: a neural image caption generator. arXiv:1411.4555 [cs.CV], 20 April 2015

  24. www.microsoft.com/en-us/download/details.aspx?id=54765

  25. Golle, P.: Machine learning attacks against the Asirra CAPTCHA. In: CCS 2008, Virginia, USA, 27–31 October 2008

    Google Scholar 

  26. Althamary, I.A., El-Alfy, E.M.: A more secure scheme for CAPTCHA-based authentication in cloud environment. In: 8th International Conference on Information Technology (ICIT), Jordan, May 2017

    Google Scholar 

  27. Tang, M., Gao, H., Zhang, Y.: Research on deep learning techniques in breaking text-based CAPTCHAs and designing image-based CAPTCHA. IEEE Trans. Inf. Forensics Secur. 13(10), 2522–2537 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

We would like to thank P.V. Ananda Mohan, Ashutosh Saxena for their valuable suggestions, insights and observations. We would also like to thank the anonymous reviewers whose comments helped improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ajeet Singh , Vikas Tiwari or Appala Naidu Tentu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, A., Tiwari, V., Tentu, A.N. (2018). A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2018. Lecture Notes in Computer Science(), vol 11348. Springer, Cham. https://doi.org/10.1007/978-3-030-05072-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05072-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05071-9

  • Online ISBN: 978-3-030-05072-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics