Skip to main content

A Study of CAPTCHA and Its Application to User Authentication

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6422))

Included in the following conference series:

Abstract

A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a scheme used to determine whether the user is a human or a malicious computer program. It has become the most widely used standard security technology to prevent automated computer program attacks. In this paper, we first give an overview of CAPTCHA. Next, we discuss the pros and cons of various CAPTCHA techniques. Then, we present the common attacks and vulnerability analysis in CAPTCHA design. Subsequently, we suggest counter-measures and remedies for those attacks. Finally we propose a personalized CAPTCHA to replace the traditional password-based authentication system as possible further research in applying CAPTCHA to user authentication application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart (Automatically) or How Lazy Cryptographers do AI. Comm. of the ACM 47(2), 56–60 (2004)

    Article  Google Scholar 

  2. Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human Identification through Image Evaluation using Secret Predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67–84. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Cui, J.-S., Mei, J.-T., Wang, X., Zhang, D., Zhang, W.-Z.: A CAPTCHA Implementation Based on 3D Animation. In: International Conference on Multimedia Information Networking and Security, MINES, vol. 2, pp. 179–182 (2009)

    Google Scholar 

  4. Ince, I.F., Salman, Y.B.: Execution Time Prediction for 3D Interactive CAPTCHA by Keystroke Level Model. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 1057–1061 (2009)

    Google Scholar 

  5. Kluever, K.A., Zanibbi, R.: Balancing Usability and Security in a Video CAPTCHA. In: ACM International Conference Proceeding Series (2009)

    Google Scholar 

  6. Desai, A., Patadia, P.: Drag and Drop: A Better Approach to CAPTCHA. In: 2009 Annual IEEE India Conference, pp. 1–4. IEEE Press, New York (2009)

    Google Scholar 

  7. Vimina, E.R., Areekal, A.U.: Telling Computers and Humans Apart Automatically Using Activity Recognition. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 4906–4909. IEEE Press, New York (2009)

    Google Scholar 

  8. PWNtcha caca labs, http://caca.zoy.org/wiki/PWNtcha

  9. Chellapilla, K., Larson, K.: Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs). In: Proceeding of the ACM Conference (2005)

    Google Scholar 

  10. Yan, J., EI Ahmad, A.S.: A Low-cost Attack on a Microsoft CAPTCHA. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 543–554 (2008)

    Google Scholar 

  11. Le, X.H., Lee, S.: Secured WSN-integrated Cloud Computing for u-Life Care. In: Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference, pp. 702–703. IEEE Press, New York (2010)

    Google Scholar 

  12. Chew, M., Baird, H.S.: Baffletext: A human interactive proof. In: Proceedings of SPIE-IS&T Electronic Imaging, Document Recognition and Retrieval X, pp. 305–316 (2003)

    Google Scholar 

  13. Markkola, A., Lindqvist, J.: Accessible Voice CAPTCHAs for Internet Telephony. In: The Symposium on Accessible Privacy and Security (SOAPS 2008) (2008)

    Google Scholar 

  14. Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 268–279. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Elson, J., Douceur, J., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of 14th ACM Conference on Computer and Communications Security, pp. 366–374 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeng, A.B., Tseng, CC., Tseng, DF., Wang, JC. (2010). A Study of CAPTCHA and Its Application to User Authentication. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16732-4_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16731-7

  • Online ISBN: 978-3-642-16732-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics