Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology, Design
  • gracias como hago para obtener el captcha
    Are you sure you want to  Yes  No
    Your message goes here
  • please send this ppt to my email id
    Are you sure you want to  Yes  No
    Your message goes here


  1. 1. CAPTCHA
  2. 2. CAPTCHA <ul><li>CAPTCHA is an acronym for “ Completely automated public Turing Test To Tell the Computers and Human apart” </li></ul><ul><li>A CAPTCHA is a challenge response test used in computing to determine the user is human . </li></ul><ul><li>Trademarked in 2000 by Luis von Ahn,Manuel Blum,Nicholas Hopper and John Langford of Carnegie Mellon University ,who developed the first CAPTCHA. </li></ul>
  3. 3. CAPTCHA <ul><li>A common type of CAPTCHA requires the user to type the letters of a distorted image sometimes with the addition of an obscured sequence of letters or digits appears on screen. </li></ul><ul><li>This string which the user has to type to submit a form .This is a simple problem for humans,but a very hard problem for computers which have to use character recognition,because the displayed string is alienated in a way,which makes it very hard for a computer to decode </li></ul><ul><li>Early CAPTCHAs such as these distorted images generated by EZ-Gimpy program were used on Yahoo. </li></ul>
  4. 4. CAPTCHA <ul><li>A program that can generate and grade tests that: </li></ul><ul><li>1. Most humans can pass </li></ul><ul><li>2. Current computer programs cannot pass </li></ul>
  5. 5. Contd… <ul><li>The concept of a CAPTCHA is motivated by real-world problems faced by internet companies such as Yahoo! and AltaVista. </li></ul><ul><li>These companies offer free email accounts, intended for use by humans. </li></ul><ul><li>However, they found that many online vendors were using &quot;bots&quot;, computer programs that would sign up for thousands of email accounts, from which they could send out masses of junk email. </li></ul>
  6. 6. Origin <ul><li>The first discussion of automated tests which distinguish humans from computers for the purpose of controlling access to web services appears in a 1996 manuscript of Moni Naor from the Weizmann Institute of Science , entitled &quot;Verification of a human in the loop, or Identification via the Turing Test&quot;. </li></ul><ul><li>Primitive CAPTCHAs seem to have been later developed in 1997 at AltaVista by Andrei Broder and his colleagues to prevent bots from adding URLs to their search engine </li></ul>
  7. 7. Contd… <ul><li>In order to make the images resistant to OCR (Optical Character Recognition), the team simulated situations that scanner manuals claimed resulted in bad OCR. </li></ul><ul><li>In 2000, von Ahn and Blum developed and publicized the notion of a CAPTCHA, which included any program that can distinguish humans from computers. </li></ul>
  8. 8. Characteristics <ul><li>A CAPTCHA system is an automated means of generating new challenges which current computers are unable to accurately solve, but most humans can solve . </li></ul><ul><li>CAPTCHAs are by definition fully automated, requiring little human maintenance or intervention in administering the test. </li></ul><ul><li>This has obvious benefits in cost and reliability. By definition, the algorithm used to create the CAPTCHA must be made public, though it may be covered by a patent. </li></ul>
  9. 9. Accessibility <ul><li>Because CAPTCHAs rely on perception, users unable to perceive a CAPTCHA due to a disability (such as blindness) will be unable to perform the task protected by a CAPTCHA. In certain Cases, failing to provide a universally accessible means of bypassing the CAPTCHA could make site owners a target of litigation </li></ul><ul><li>In order to combat this problem, many implementations of CAPTCHAs permit users to opt for an audio CAPTCHA in addition to a text based one. </li></ul>
  10. 10. Contd… <ul><li>While the combination of an audio and visual CAPTCHA can not satisfy all users (for example, those with deafblindness ), the choice of adding a CAPTCHA to an application is a balance between ease of use for legitimate users and creating enough of a challenge for abusers that abusing the application is not worthwhile </li></ul>
  11. 11. Contd… <ul><li>The inconvenience caused by a CAPTCHA is sometimes higher for users with disabilities. For some applications, the potential for abuse is so high that the application author feels that a CAPTCHA is necessary. For other applications, the need for accessibility outweighs the abuse that a CAPTCHA would prevent. </li></ul>
  12. 12. EZ-Gimpy <ul><li>EZ-Gimpy and Gimpy, the CAPTCHAs that we have broken, are examples of word-based CAPTCHAs. </li></ul><ul><li>In EZ-Gimpy, the CATPCHA used by Yahoo! the user is presented with an image of a single word. </li></ul><ul><li>This image has been distorted, and a cluttered, textured background has been added. </li></ul><ul><li>The distortion and clutter is sufficient to confuse current OCR (optical character recognition) software. </li></ul>
  13. 13. Contd… <ul><li>However, using our computer vision techniques we are able to correctly identify the word 92% of the time. </li></ul><ul><li>Gimpy is a more difficult variant of a word-based CAPTCHA. Ten words are presented in distortion and clutter similar to EZ-Gimpy. </li></ul><ul><li>The words are also overlapped, providing a CAPTCHA test that can be challenging for humans in some cases. </li></ul>
  14. 14. Generating CAPTCHAs :Bongo Answer: left
  15. 15. Contd… <ul><li>to the Right series or to the Left displays two series of blocks, the Left and the Right </li></ul><ul><li>blocks in the Left series differ from those in the Right, and the user must find the characteristic that sets them apart. </li></ul><ul><li>then, the user is presented with a single block and is asked to determine whether this block belongs </li></ul>
  16. 16. Sound Based CAPTCHAs:Eco <ul><li>Sound-based CAPTCHA </li></ul><ul><li>picks a word or a sequence of numbers at random, renders the word or the numbers into a sound clip and distorts the sound clip. </li></ul><ul><li>then presents the distorted sound clip to its user and asks them to enter the contents of the sound clip </li></ul>
  17. 17. Text Based CAPTCHAs
  18. 18. Character Recognition <ul><li>A number of research projects have attempted (often with success) to beat visual CAPTCHAs by creating programs that contain the following functionality </li></ul><ul><li>1.Extraction of the image from the web page. </li></ul><ul><li>2.Removal of background clutter, for example with color filters and detection of thin lines. </li></ul><ul><li>3.Segmentation, i.e. splitting the image into segments containing a single letter. </li></ul><ul><li>4.Identifying the letter for each segment </li></ul>
  19. 19. Contd… <ul><li>Steps 1, 2, and 4 are easy tasks for computers </li></ul><ul><li>The only part where humans still out perform computers is segmentation. </li></ul><ul><li>If the background clutter consists of shapes similar to letter shapes, and the letters are connected by this clutter, the segmentation becomes nearly impossible with current software. Hence, an effective CAPTCHA should focus on the segmentation </li></ul>
  20. 20. Graphic Based CAPTCHAs
  21. 21. Image-recognition CAPTCHAs <ul><li>Some researchers promote image recognition CAPTCHAs as a possible alternative for text based CAPTCHAs. To date, no major website has made use of an image based CAPTCHA. As such, the technology would be best described as in the stage of theoretical research. Image recognition CAPTCHAs face many potential problems which have not been fully studied: </li></ul><ul><li>It is difficult for a small site to acquire a large dictionary of images which an attacker does not have access to. Without a means of automatically acquiring new labelled images, an image based challenge does not meet the definition of a CAPTCHA. </li></ul>
  22. 22. Principles <ul><li>The principles behind CAPTCHA are as follows: </li></ul><ul><li>The user is presented with a garbled image on which some text is displayed. This image is generated by the server using random text. </li></ul><ul><li>The user must enter the same letters in the text into a text field that is displayed on the form to protect. </li></ul><ul><li>When the form is submitted, the server checks if the text entered by the user matches the initial generated text. If it does, the transaction continues. Otherwise, an error message is displayed and the user has to enter a new code. </li></ul><ul><li>  </li></ul>
  23. 23. CAPTCHA would look like… <ul><li>The captcha would look like this: </li></ul><ul><li>On the main registration form a regular captcha is presented just like before. Users that can see the image may use this test. A link informs users that there is an alternative test. </li></ul><ul><li>Clicking the link leads to the audio based test form . This form provides access to an audio file and three input fields. The audio file contains three numbers that the user has to enter into the fields </li></ul>
  24. 24. Applications <ul><li>Online polls </li></ul><ul><li>Protecting Website Registration </li></ul><ul><li>Preventing Comment Spam in Blogs. </li></ul><ul><li>Search Engine Bots </li></ul><ul><li>Worms and Spam </li></ul><ul><li>Prevent Dictionary attacks </li></ul>
  25. 25. Applications <ul><li>Online polls </li></ul><ul><li>In November 1999,htttp:// </li></ul><ul><li>Released an online poll asking which was the best graduate school in computer science!. As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots by using programs that voted for CMU thousands of times. </li></ul>
  26. 26. Contd… <ul><li>CMU's score started growing rapidly. The next day, students at MIT wrote their own voting program and the poll became a contest between voting “bots&quot;. MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. </li></ul>
  27. 27. Applications <ul><li>Protecting Website Registration </li></ul><ul><li>Several companies offer free email services. Up Until a few years ago most of these services suffered from a a specific type of attack:”bots” that would sign up for thousands of email accounts every minuite.The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. </li></ul>
  28. 28. Applications <ul><li>Preventing Comment spam in Blogs </li></ul><ul><li>Most Bloggers are familiar with programs that submit bogus comments usually for the purpose of raising search engine ranks of some website.This is called comment spam.By using a CAPTCHA only humans can enter comments on a blog.There is no need to make users sign up before they enter a comment,and no legitimate comments are over lost! </li></ul>
  29. 29. Applications <ul><li>Search Engine Bots </li></ul><ul><li>It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily.There is an html tag to prevent search engine bots from reading webpages. </li></ul>
  30. 30. Applications <ul><li>Worms and Spam </li></ul><ul><li>CAPTCHA tests also offer a plausible solution against email worms and spam: </li></ul><ul><li>only accept an email message if you know </li></ul><ul><li>there is a human behind the other computer. </li></ul>
  31. 31. Applications <ul><li>Preventing Dictionary attacks </li></ul><ul><li>CAPTCHA can also be used to prevent dictionary attacks in password systems.The idea is simple:prevent computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. </li></ul>
  32. 32. Conclusion <ul><li>Interested in breaking a CAPTCHA? </li></ul><ul><li>People have tried already! </li></ul>
  33. 33. <ul><li>THANK YOU </li></ul>