Abstract
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a scheme used to determine whether the user is a human or a malicious computer program. It has become the most widely used standard security technology to prevent automated computer program attacks. In this paper, we first give an overview of CAPTCHA. Next, we discuss the pros and cons of various CAPTCHA techniques. Then, we present the common attacks and vulnerability analysis in CAPTCHA design. Subsequently, we suggest counter-measures and remedies for those attacks. Finally we propose a personalized CAPTCHA to replace the traditional password-based authentication system as possible further research in applying CAPTCHA to user authentication application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart (Automatically) or How Lazy Cryptographers do AI. Comm. of the ACM 47(2), 56–60 (2004)
Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human Identification through Image Evaluation using Secret Predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67–84. Springer, Heidelberg (2006)
Cui, J.-S., Mei, J.-T., Wang, X., Zhang, D., Zhang, W.-Z.: A CAPTCHA Implementation Based on 3D Animation. In: International Conference on Multimedia Information Networking and Security, MINES, vol. 2, pp. 179–182 (2009)
Ince, I.F., Salman, Y.B.: Execution Time Prediction for 3D Interactive CAPTCHA by Keystroke Level Model. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 1057–1061 (2009)
Kluever, K.A., Zanibbi, R.: Balancing Usability and Security in a Video CAPTCHA. In: ACM International Conference Proceeding Series (2009)
Desai, A., Patadia, P.: Drag and Drop: A Better Approach to CAPTCHA. In: 2009 Annual IEEE India Conference, pp. 1–4. IEEE Press, New York (2009)
Vimina, E.R., Areekal, A.U.: Telling Computers and Humans Apart Automatically Using Activity Recognition. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 4906–4909. IEEE Press, New York (2009)
PWNtcha caca labs, http://caca.zoy.org/wiki/PWNtcha
Chellapilla, K., Larson, K.: Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs). In: Proceeding of the ACM Conference (2005)
Yan, J., EI Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 543–554 (2008)
Le, X.H., Lee, S.: Secured WSN-integrated Cloud Computing for u-Life Care. In: Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, pp. 702–703. IEEE Press, New York (2010)
Chew, M., Baird, H.S.: Baffletext: A human interactive proof. In: Proceedings of SPIE-IS&T Electronic Imaging, Document Recognition and Retrieval X, pp. 305–316 (2003)
Markkola, A., Lindqvist, J.: Accessible Voice CAPTCHAs for Internet Telephony. In: The Symposium on Accessible Privacy and Security (SOAPS 2008) (2008)
Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 268–279. Springer, Heidelberg (2004)
Elson, J., Douceur, J., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of 14th ACM Conference on Computer and Communications Security, pp. 366–374 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeng, A.B., Tseng, CC., Tseng, DF., Wang, JC. (2010). A Study of CAPTCHA and Its Application to User Authentication. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-16732-4_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16731-7
Online ISBN: 978-3-642-16732-4
eBook Packages: Computer ScienceComputer Science (R0)