skip to main content
10.1145/2602087.2602114acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

Image enhanced CAPTCHA for web security

Authors Info & Claims
Published:08 April 2014Publication History

ABSTRACT

Many websites use CAPTCHA to defend against malicious automated programs from performing abusive tasks such as illegitimate account registration. CAPTCHA is widely used on commercial websites as a HIP system due to its simplicity of use and effectiveness against attacks. Over the years advances in Optical Character Recognition (OCR) software and techniques developed to break CAPTCHA began to expose flaws and vulnerabilities of these CAPTCHA implementations. CAPTCHA can be improved by adding several levels of complexity but still retain the purpose of CAPTCHA by making it simple for human users but difficult for bots to break. In our system different challenge phrases were displayed instead of one like traditional methods. To pass our CAPTCHA challenge questions, users have to graphically interpret the displayed image to determine which challenge phrase to decipher. Several schemes have been designed and implemented. A particular design was chosen based on the result of surveys conducted on human subjects for the user-friendliness. The result of the surveys shows that our design is preferred by users and helps preventing automated attacks from bots using known methods.

References

  1. Ahn, L., Blum, M., Hopper, N. and Langford, J. CAPTCHA: Telling Humans and Computers Apart Automatically. DOI=http://www.captcha.net/, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gossweiler, R, Kamvar, M., and Baluja, S., What's Up CAPTCHA?: a CAPTCHA Based on Image Orientation, Proceedings of the 18th International Conference on World Wide Web, New York, NY, 2009, pp. 841--850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Grossman, L., Computer Literacy Tests: Are You Human? The Time Magazine, June 5, 2008.Google ScholarGoogle Scholar
  4. Nguyen, V., Chow, Y., and Susilo, W., Breaking a 3D-based CHAPCHA, Proceedings of the 14th International Conference on Information Security and Cryptology, Heidelberg, Germany, 2012, pp. 391--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rusu, A. and Govindaraju, V., Handwritten CAPTCHA: Using the difference in the abilities of humans and machines in reading handwritten words, Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, Washington, DC, 2004, pp. 226--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Rusu, A. and Govindaraju, V., Leveraging Cognitive Factors in Securing WWW with CAPTCHA, Proceedings of the 2010 USENIX conference on Web Application, Boston, NY, 2010, pp. 1--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Yan, J. and. Ahmad, A., Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms, Proceedings of 23rd Annual Computer Security Applications Conference, 2007, Miami Beach, FL., Dec 2007, pp. 279--291.Google ScholarGoogle Scholar
  8. Yan, J. and. Ahmad, A., A Low-cost Attack on a Microsoft CAPTCHA, Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, NY, 2008, pp. 543--554. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Image enhanced CAPTCHA for web security

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research Conference
            April 2014
            134 pages
            ISBN:9781450328128
            DOI:10.1145/2602087

            Copyright © 2014 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 April 2014

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CISR '14 Paper Acceptance Rate32of50submissions,64%Overall Acceptance Rate69of136submissions,51%
          • Article Metrics

            • Downloads (Last 12 months)1
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader