Abstract
We consider a binary labelling problem: for some machine learning applications, two types of distinct objects are required to be labeled respectively, before a classifier can be trained. We show that the famous ESP game and variants would not work well on this binary labelling problem. We discuss how to design a new human computation game to solve this problem. It turns out that interesting but subtle security issues emerge in the new game. We introduce novel gaming mechanisms, such as ‘guess disagreement’, which improve the game’s security, usability and productivity simultaneously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: ACM CCS 2007, pp. 366–374 (2007)
Golle, P.: Machine learning attacks against the Asirra CAPTCHA. In: CCS 2008, pp. 535–542. ACM Press (2008)
MSR Asirra: A Human Interactive Proof, http://research.microsoft.com/asirra/ (as accessed on April 18, 2009)
von Ahn, L., Dabbish, L.: Labeling Images with a Computer Game. In: CHI, pp. 319–326. ACM Press (2004)
von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart Automatically. CACM 47(2) (2004)
von Ahn, L., Dabbish, L.: Designing games with a purpose. CACM 51(8), 58–67 (2008)
Yan, J.: Security Design in Online Games. In: Proc. of the 19th Annual Computer Security Applications Conference (ACSAC), pp. 286–295. IEEE Computer Society (2003)
Yan, J., Yu, S.-Y.: Streamlining Attacks on CAPTCHAs with a Computer Game. In: Proc. of the Twenty-first International Joint Conference on Artificial Intelligence (IJCAI 2009), Pasadena, California, USA, July 11-17, pp. 2095–2100 (2009)
Neven, H., Denchev, V.S., Drew-Brook, M., Zhang, J., Macready, W.G., Rose, G.: Binary Classification using Hardware Implementation of Quantum Annealing. In: Neural Information Processing Systems Conference (NIPS 2009) (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, SY., Yan, J. (2014). Security Design in Human Computation Games. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-662-45921-8_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45920-1
Online ISBN: 978-3-662-45921-8
eBook Packages: Computer ScienceComputer Science (R0)