DOI QR코드

DOI QR Code

Evaluation of CAPTCHA Efficiency

  • Received : 2015.06.24
  • Accepted : 2015.09.13
  • Published : 2015.09.30

Abstract

We propose statistical methods for evaluating the efficiency of CAPTCHA. Most people unfairly assumed that machines are not capable at reading precisely. This fact leads to the invention of CAPTCHA, a distorted word or short phase, which is designed to thwart computers and separate human from machines. However, advances in image recognition technologies mean that machines are constantly getting better at recognizing CAPTCHA. This forces CAPTCHA designers to design even more difficult CAPTCHAs to prevent their systems from being gamed by malicious bots. However, this arm race has an unintended side effect on the common users. Many CAPTCHAs are now so hard that many people are unable to read them. This obviously conflicts with the original purpose that CAPTCHA was invented in the first place. Our analysis shows that some CAPTCHAs are more users friendly. In particular, Yahoo-style CAPTCHA is the most friendliness. This suggests that a good CAPTCHA could be a simple text with some distortion that prevents machines from correctly segmenting characters.

Keywords

References

  1. Ahn, L. von, Blum, M., and Langford, J., "Telling humans and computers apart automatically", Commun. ACM, Vol. 47, No. 2, 2004, pp. 56-60. https://doi.org/10.1145/966389.966390
  2. Bursztein, E., Bethard, S., Fabry, C., Mitchell, J. C., and Jurafsky, D., "How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation", in Proceedings of the 2010 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2010, pp. 399-413.
  3. Bursztein, E., Martin, M., and Mitchell, J. C., "Text-based CAPTCHA Strengths and Weaknesses", Comput. Commun. Secur., 2011.
  4. Chandavale, A. and Sapkal, A., "Algorithm for Secured Online Authentication Using CAPTCHA", in 2010 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 292-297.
  5. Chandavale, A. and Sapkal, A., "An Improved Adaptive Noise Reduction for Secured CAPTCHA", in 2011 4th International Conference on Emerging Trends in Engineering and Technology (ICETET), 2011, pp. 12-17.
  6. Chellapilla, K. and Simard, P. Y., "Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)", in Neural Information Processing Systems, 2004.
  7. Chellapilla, K., Larson, K., Simard, P., and Czerwinski, M., "Computers beat humans at single character recognition in reading based human interaction proofs (HIPs", in In 2nd Conference on Email and Anti-Spam, 2005.
  8. Chellapilla, K., Larson, K., Simard, P., and Czerwinski, M., "Designing human friendly human interaction proofs (HIPs)", 2005, p. 711.
  9. El Ahmad, A. S., Yan, J., and Ng, W.-Y., "CAPTCHA Design: Color, Usability, and Security", IEEE Internet Comput., Vol. 16, No. 2, 2012, pp. 44-51. https://doi.org/10.1109/MIC.2011.102
  10. Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and Shet, V., "Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks", ArXiv-13126082 Cs, 2013.
  11. Hsieh, C.-C. and Wu, Z.-Y., "Anti-SIFT Images Based CAPTCHA Using Versatile Characters", in 2013 International Conference on Information Science and Applications (ICISA), 2013, pp. 1-4.
  12. Li, S., Shah, S. A. H., Khan, M. A. U., Khayam, S. A., Sadeghi, A.-R., and Schmitz, R., "Breaking e-Banking CAPTCHAs", in Proceedings of the 26th Annual Computer Security Applications Conference, New York, NY, USA, 2010, pp. 171-180.
  13. Lv, G., "Recognition of Multi-Fontstyle Characters Based on Convolutional Neural Network", in 2011 Fourth International Symposium on Computational Intelligence and Design (ISCID), Vol. 2, 2011, pp. 223-225.
  14. Nanglae, N. and Bhattarakosol, P., "A Study of Human Bio-detection Function under Text-Based CAPTCHA System", in 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS), 2012, pp. 139-144.
  15. Shirali-Shahreza, S. and Shirali-Shahreza, M. H., "Bibliography of works done on CAPTCHA", in 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, Vol. 1, 2008, pp. 205-210.
  16. Shu-Guang, H., Liang, Z., Peng-Po, W., and Hong-Wei, H., "A CAPTCHA Recognition Algorithm Based on Holistic Verification", in 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, 2011, pp. 525-528.
  17. Tamang, T. and Bhattarakosol, P., "Uncover impact factors of text-based CAPTCHA identification", in 2012 7th International Conference on Computing and Convertgence Technology (ICCCT), 2012, pp. 556- 560.
  18. Truong, H. D., Turner, C. F., and Zou, C. C., "iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks", in 2011 IEEE International Conference on Communications (ICC), 2011, pp. 1-6.
  19. Yamane, T., Statistics; an introductory analysis. New York: Harper and Row, 1967.
  20. Yan, J. and El Ahmad, A. S., "A Low-cost Attack on a Microsoft Captcha", in Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, NY, USA, 2008, pp. 543-554.
  21. Yan, J. and El Ahmad, A. S., "CAPTCHA Security: A Case Study", IEEE Secur. Priv., Vol. 7, No. 4, 2009, pp. 22-28.