Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
t—CAPTCHA, Completely Automated Public
Turning Test to tell Computers and Humans Apart, it is a one
type of test. CAPTCHA is standard internet security they
protect online emails and services from being abused by
malicious computer program or BOT. CAPTCHA is a one type
of test program that protects websites from BOTs on web by
generating tests that computer cannot pass but human can
easily pass. For web security we are using different type of
CAPTCHA. In this paper describe different type of
CAPTCHA technique based on drag and drop mouse action
because drag and drop mouse action is performed by human
not by BOT. This paper is deal with survey and comparison of
different technique of CAPTCHA.
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
SHUFFLED INPUT GRAPHICAL PASSWORD AUTHENTICATION SCHEMES BUILT ON CAPTCHA TEC...ijiert bestjournal
When we consider the online service or desktop appl ication there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password,shoulder-surfing attack as far as password is con cern,online password guessing attack,relay attack. Hence there must be system that provides good solution for suc h password cracking attacks. There are many solutions for it a nd various password schemes available that achieves this. The main drawback of these schemes is that users have t o deal with complicated and tedious steps as far as registration and login of user is concern as its logic contains some intense AI processes. These complicated AI pro cesses are exhaustive for common user of the system. In this p aper we proposed authentication scheme which consis t of graphical password based captcha challenge image. I t consists of both a captcha and a graphical passwo rd schemes. We extend the use of captcha as human present recog nition as well as graphical password hence it provi des all benefits of captcha and make system more powerful f rom security point of view.
t—CAPTCHA, Completely Automated Public
Turning Test to tell Computers and Humans Apart, it is a one
type of test. CAPTCHA is standard internet security they
protect online emails and services from being abused by
malicious computer program or BOT. CAPTCHA is a one type
of test program that protects websites from BOTs on web by
generating tests that computer cannot pass but human can
easily pass. For web security we are using different type of
CAPTCHA. In this paper describe different type of
CAPTCHA technique based on drag and drop mouse action
because drag and drop mouse action is performed by human
not by BOT. This paper is deal with survey and comparison of
different technique of CAPTCHA.
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
The most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots.
in this captcha report, you get everything those you need in a seminar. hope you like this report..
please check it out. and use it
for more report contect me. my email id is rkrakeshkumar99@gmail.com
Enhancing Web-Security with Stronger CaptchasEditor IJCATR
Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from
websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users
are asked to read and type a string of distorted characters in order to ensure that the user is human or not. Automation is real
problem for web application. Automated attacks can exploit many services:
1. Blogs 2. Forums 3. Phishing 4. Theft of data
Registration Websites use CAPTCHA (completely automated public turing test to tell computers and human apart) systems to
prevent the bot programs from wasting their resources. Today is the Era of where technologies are changes very rapidly. So
spammers are hackers are also trying something new to cracking captcha. That’s why it is necessary to developing an advanced
technology to generating a captcha. Just like simply generating a Captcha Images from text, or rotating an object within images.
Captcha a security measure against spam attackseSAT Journals
Abstract A CAPTCHA is challenge response test used to ensure that the response is generated by humans. CAPTCHA test are administrator by machines to differentiate between humans and machine. Because of this reason CAPTCHAs are also known as the Reverse Turing Test as contrast to Turing Test which is administrated by humans. CAPCHA is used as a simple puzzle, which restricts various automated programs (also known as internet-bots) to sign-up e-mail accounts, cracking passwords, spam sending etc. A common type of CAPTCHA requires user to recognize the letters from a distorted image, since normal human can easily recognize the CAPTCHA, while that particular text cannot be recognized by bot. In short CAPTCHA program challenges the automated program, which trying to access private data. So, CAPTCHA helps in preventing the access of personal mail accounts by some unauthorized automated spamming programs. Index Terms: CAPTCHA, Security, Spam Attacks, Reverse Turing Test.
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesKarthikeyan Umapathy
CAPTCHA is a widely adopted security measure on the Web and is designed to effectively distinguish humans and bots by exploiting human’s ability to recognize patterns that an automated bot is incapable of. To counter this, bots are being designed to recognize patterns in CAPTCHAs. As a result, CAPTCHAs are now being designed to maximize the difficulty for bots to pass human interaction proof tests, while making it quite an arduous task even for humans as well. The approachability of CAPTCHA is increasingly being questioned because of the inconvenience it causes to legitimate users. Irrespective of the popularity, CAPTCHA is indispensable if one wants to avoid potential security threats. We investigated the usability issues associated with CAPTCHA. We built a holistic model by identifying the important concepts associated with CAPTCHAs and its usability. This model can be used as a guide for the design and evaluation of CAPTCHAs.
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
— A CAPTCHA means "Completely Automated
Public Turing test to tell Computers and Humans Apart". It is a
type of challenge-response test used in computing to determine
whether or not the user is human. CaRP is both a Captcha and a
graphical password scheme. CaRP addresses a number of
security problems altogether, such as online guessing attacks,
relay attacks, and, if combined with dual-view technologies,
shoulder-surfing attacks. Particularly, a CaRP password can be
found only probabilistically by automatic online guessing attacks,
even if the password is in the search set. CaRP also offers an
approach to address the well-known image hotspot problem in
popular graphical password systems, such as PassPoints, which
often leads to weak password choices. Thus, a variant to the
login/password scheme, using graphical scheme was introduced.
But it also suffered due to shoulder-surfing and screen dump
attacks. Thus it introduces a framework to proposed (IPAS)
Implicit Password Authentication System, which is protected to
the common attacks suffered by other authentication schemes.
The most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots.
in this captcha report, you get everything those you need in a seminar. hope you like this report..
please check it out. and use it
for more report contect me. my email id is rkrakeshkumar99@gmail.com
Enhancing Web-Security with Stronger CaptchasEditor IJCATR
Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from
websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users
are asked to read and type a string of distorted characters in order to ensure that the user is human or not. Automation is real
problem for web application. Automated attacks can exploit many services:
1. Blogs 2. Forums 3. Phishing 4. Theft of data
Registration Websites use CAPTCHA (completely automated public turing test to tell computers and human apart) systems to
prevent the bot programs from wasting their resources. Today is the Era of where technologies are changes very rapidly. So
spammers are hackers are also trying something new to cracking captcha. That’s why it is necessary to developing an advanced
technology to generating a captcha. Just like simply generating a Captcha Images from text, or rotating an object within images.
Captcha a security measure against spam attackseSAT Journals
Abstract A CAPTCHA is challenge response test used to ensure that the response is generated by humans. CAPTCHA test are administrator by machines to differentiate between humans and machine. Because of this reason CAPTCHAs are also known as the Reverse Turing Test as contrast to Turing Test which is administrated by humans. CAPCHA is used as a simple puzzle, which restricts various automated programs (also known as internet-bots) to sign-up e-mail accounts, cracking passwords, spam sending etc. A common type of CAPTCHA requires user to recognize the letters from a distorted image, since normal human can easily recognize the CAPTCHA, while that particular text cannot be recognized by bot. In short CAPTCHA program challenges the automated program, which trying to access private data. So, CAPTCHA helps in preventing the access of personal mail accounts by some unauthorized automated spamming programs. Index Terms: CAPTCHA, Security, Spam Attacks, Reverse Turing Test.
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesKarthikeyan Umapathy
CAPTCHA is a widely adopted security measure on the Web and is designed to effectively distinguish humans and bots by exploiting human’s ability to recognize patterns that an automated bot is incapable of. To counter this, bots are being designed to recognize patterns in CAPTCHAs. As a result, CAPTCHAs are now being designed to maximize the difficulty for bots to pass human interaction proof tests, while making it quite an arduous task even for humans as well. The approachability of CAPTCHA is increasingly being questioned because of the inconvenience it causes to legitimate users. Irrespective of the popularity, CAPTCHA is indispensable if one wants to avoid potential security threats. We investigated the usability issues associated with CAPTCHA. We built a holistic model by identifying the important concepts associated with CAPTCHAs and its usability. This model can be used as a guide for the design and evaluation of CAPTCHAs.
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Research trends on CAPTCHA: A systematic literature IJECEIAES
The advent of technology has crept into virtually all sectors and this has culminated in automated processes making use of the Internet in executing various tasks and actions. Web services have now become the trend when it comes to providing solutions to mundane tasks. However, this development comes with the bottleneck of authenticity and intent of users. Providers of these Web services, whether as a platform, as a software or as an Infrastructure use various human interaction proof’s (HIPs) to validate authenticity and intent of its users. Completely automated public turing test to tell computer and human apart (CAPTCHA), a form of IDS in web services is advantageous. Research into CAPTCHA can be grouped into two -CAPTCHA development and CAPTCH recognition. Selective learning and convolutionary neural networks (CNN) as well as deep convolutionary neural network (DCNN) have become emerging trends in both the development and recognition of CAPTCHAs. This paper reviews critically over fifty article publications that shows the current trends in the area of the CAPTCHA scheme, its development and recognition mechanisms and the way forward in helping to ensure a robust and yet secure CAPTCHA development in guiding future research endeavor in the subject domain.
in this captcha ppt, you get everything those you need in a seminar. hope you like this ppt..
please check it out. and use it
for more report & ppt contect me. my email id is rkrakeshkumar99@gmail.com
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
Improve Captcha's Security Using Gaussian Blur Filtersipij
Providing security for webservers against unwanted and automated registrations has become a big
concern. To prevent these kinds of false registrations many websites use CAPTCHAs. Among all kinds of
CAPTCHAs OCR-Based or visual CAPTCHAs are very common. Actually visual CAPTCHA is an image
containing a sequence of characters. So far most of visual CAPTCHAs, in order to resist against OCR
programs, use some common implementations such as wrapping the characters, random placement and
rotations of characters, etc. In this paper we applied Gaussian Blur filter, which is an image
transformation, to visual CAPTCHAs to reduce their readability by OCR programs. We concluded that this
technique made CAPTCHAs almost unreadable for OCR programs but, their readability by human users
still remained high.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
1. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
DOI : 10.5121/ijait.2011.1404 47
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED
CAPTCHA
Sushma Yalamanchili 1
and Kameswara Rao2
1
Research Scholar, Department of Computer Science & Engineering
Acharya Nagarjuna University, Andhra Pradesh, India.
sushma_yalamanchili@yahoo.co.in
2
Department of Computer Science, P.G.Centre, P.B.Siddhartha College, Vijayawada.
Kamesh.manchiraju@gmail.com
ABSTRACT
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between
various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart
(CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based
and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of
Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based
applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari
script which can exploit the difference in the reading proficiency between humans and computer
programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script thereby
making it easy to secure Indian language based applications.
KEYWORDS
CAPTCHA, Devanagari, Human Interactive Proof, Optical Character Recognition, text-based.
1. INTRODUCTION
Human Interactive Proofs (HIPs) [1] focus on automation tests that virtually all humans can
pass but current computer programs fail [2]. Completely Automated Public Turing test to tell
Computers and Humans Apart (CAPTCHA) was an acronym that was coined in 2000. It is a
type of challenge-response test that only a human completes successfully. In the simplest form
of a CAPTCHA, an image consisting of digits and letters sufficiently distorted is presented and
the user is required to input the characters that are displayed. Other forms of CAPTCHAs are
based on text-graphics, audio, hand-writing and puzzles. CAPTCHAs have been widely used as
a security measure to restrict access from Robots or Bots. CAPTCHAs are based on Artificial
Intelligence (AI) problems that cannot be solved by current computer programs or Bots but are
easily solvable by humans. A client who provides a correct response to a challenge is presumed
to be a human; otherwise a Bot.
2. CURRENT RESEARCH
In this section, we review the current research on CAPTCHAs and Optical Character
Recognition (OCR) efforts for the Devanagari script. Websites use CAPTCHAs as a security
measurement to distinguish human users from Bots. While CAPTCHAs have been developed
based on pure text, images, audio and video, text CAPTCHAs are almost exclusively used in
real applications. In a text CAPTCHA, characters are deliberately distorted and connected to
prevent recognition by Bots. Security of an existing text CAPTCHA is enhanced by
2. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
48
systematically adding noise and distortion, and arranging characters more tightly [3, 4].
Usability is always an important issue in designing a CAPTCHA [5]. Examples of text-based
CAPTCHAs include the Gimpy method [6], the Baffletext method [7], Handwritten CAPTCHA
[8], the PayPal method [9], Using Dynamic Visual Patterns [10], the Hotmail Method [11] and
Pessimal Print method [12]. Successful text CAPTCHAs used by Microsoft, Yahoo and Google
use techniques that are resistant to segmentation [13, 14, and 15] attacks by using random acrs,
connected random lines and crowding characters.
Figure 1 shows an example of a HIP challenge presented when registering for a MSN Hotmail
account. After displaying the HIP, the user is asked to type the eight characters included within
it, namely, X29JTUN3.
Figure 1 Microsoft Hotmail Text CAPTCHA
A few of the many different HIP styles that can be produced by manipulating hardness
parameters are illustrated below (Figure 2).
Figure 2 Hardness Parameter variations in HIPs
Image-based CAPTCHAs [16] require users to identify labeled images or rotated images. They
evince a larger gap between human users and Bots because of the poor ability of Bots in
obtaining features of images. In Image Recognition CAPTCHAs, the user is provided with a
small set of images to name or distinguish or identify anomalies. In implicit CAPTCHAs [17],
the user does not have to read or type anything and just makes simple clicks on hot spots.
Drawing captcha [18] generates numerous dots on a screen with noisy background, some of
which are diverse from the others. The user has to connect them to each other. Apart from the
visual-CAPTCHAs, there exist a number of audio CAPTCHAs [19, 20, and 21] where the user
must recognize and type the word that is played as a sound. Sound-based CAPTCHAs exploit a
border range of human abilities which are mainly based on the auditory perception of human
ability to identify words or letters in a sound clip after being distorted and with additive
background noise. Their emergence has greatly aided vision impaired people. A typical sound-
based CAPTCHA is reCAPTCHA [22] proposed by Carnegie Mellon University and later
acquired by Google. Video-based CAPTCHAs also substitute a brief video display of characters
for the usual letters. In video-based CAPTCHAs [23], users will be prompted to view a
challenge video and then appropriately annotate (or tag) it. The challenges will be graded by
exact matching of user response with a database of ground truth tags for the video.
3. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
49
Multilingual CAPTCHAs [24, 25] have been proposed in literature. In [24] the user can select
his/her native language and subsequent screens are displayed in that language using translation.
The user is expected to select an image corresponding to the specified topic. For instance, a user
is required to select an image of a cat from among pictures of a car, a human, scenery or a
flower. The picture of the cat may also be rotated which requires a Bot to have knowledge of the
shape of the object that needs to be selected as well as the complexity involved on account of
the rotation. Design for a CAPTCHA based on dictionary words in Persian/Arabic is discussed
with refinements [25]. The premise of the Persian/Arabic Baffletext CAPTCHA is that adding a
background to a random assortment of Persian/Arabic characters interferes with OCR
recognition of the text string due to the presence of diacritical dots and signs that are used in
that script. The characteristics of Persian/Arabic script that are utilized in the CAPTCHA design
include word lengthening, lack of spacing between words, different forms of the same character
depending on placement in a word, overlap of characters, different letter sizes and separation of
vowels from letters.
Researchers enjoyed moderate success as part of computer vision research in breaking existing
text-based CAPTCHAs and image-based CAPTCHAs [26, 27]. Image recognition is considered
to be a much harder problem than text recognition. OCR deals with automatic recognition of
different characters in a document image leading to clear and unambiguous recognition, analysis
and understanding of the document content. OCR system segments text zone into text lines, text
lines into words, and words into characters. These characters are then recognized. The task of
recognition can be broadly separated into two categories: machine printed data and the
handwritten data. Researchers have investigated OCR for Devanagari script [28, 29]. These
systems use statistical, syntactic and/or heuristic-based methods. Pre-processing, Segmentation,
Feature Extraction, Recognition and Post processing are major stages in OCR [30, 31]. The
success or failure of an OCR system depends on segmentation and feature extraction stages.
Efforts have been made to improve the performance of OCR applied to Devanagari script [32,
33]. Still a lot of research is needed to tackle the challenges in identifying specific characters of
Devanagari script. The characteristics of Devanagari script include major issues in OCR
segmentation and feature extraction stages. The major factors that affect the OCR process in
Devanagari script include noise, intra-word and inter-word touching, shape of compound
character formation, change of font and style (Glyph Variation), multiple skewness, broken
characters, etc. Many works on OCR efforts for Devanagari script have been reported [34, 35,
36, and 37].
3. MOTIVATION
Popular web sites are subject to brute force attacks by programs or computers known as Robots
or Bots. They can be used to break user accounts or submit an unlimited number of service
requests such as email account creation, web connection requests and serving as shopping
agents. Such activities often lead to abuse of privilege causing the server to exhaust its resources
or worse cause it to shut down. Bots can be eliminated by introducing CAPTCHA at service
request time to prevent Denial of Service attacks. Introducing CAPTCHA in the authentication
scheme prevents automated brute force attack.
We propose a framework for text-based CAPTCHA that is based on Devanagari script that is
the written form for several Indian languages including Hindi, Sanskrit, Kashmiri, Bihari,
Bhojpuri, Marati and Nepali. As the population that uses these languages is extremely large, we
have selected the Devanagari script for use in this CAPTCHA. DevaCAPTCHA can be used to
enhance the security of Devanagari script-based Indian language content based web
applications. Some applications that are typical in this scenario are online and collaborative
authoring, online tutoring, email and social networking portals in Indian languages. These users
4. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
50
are typically involved in content generation and access of applications in Devanagari-script
based Indian languages. They already have the necessary keyboard emulation or are using
custom keyboards that facilitate keyboard input in that script so that aspect is taken care of.
4. DEVANAGARI SCRIPT
The Devanagari script is a Brahmi-derived writing system used originally to write Sanskrit. It is
used in India and Nepal to write many languages including Sanskrit, Hindi, Marathi, Nepali,
Konkoni etc. Devanagari is the script used by more than 400 million people on the globe.
Devanagari has 11 vowels and 33 simple consonants. Besides the consonants and the vowels,
other constituent symbols in Devanagari are set of vowel modifiers called matra (placed to the
left, right, above, or at the bottom of a character or conjunct), pure-consonant (also called half-
letters) which when combined with other consonants yield conjuncts. A horizontal line called
shirorekha runs through the entire span of work. Devanagari word is written into the three strips
namely: a core strip, a top strip, and a bottom strip as shown in Figure 3. The core strip and top
strip are differentiated by the header, while the lower modifier is attached to the core character.
Figure 3 Character strips in Devanagari script
OCR for Devanagari script becomes even more difficult when compound character and modifier
characteristics are combined in 'noisy' situations. The Devanagari script character set is depicted
in Figures 4 and 5.
Figure 4 Devanagari script character set
Figure 5 Devanagari script Numerals
5. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
51
5. PROPOSED FRAMEWORK
In this work, we propose a framework for DevaCAPTCHA (Figure 6) for administering a
Devanagari script-based text CAPTCHA to assist in securing Indian-language web-based
applications. The objective of a DevaCAPTCHA framework is to differentiate a human from a
Bot. This can be achieved by testing the ability of a user to recognize the Devanagari characters.
The key components of the proposed DevaCAPTCHA framework are
1. DevaDB: A sufficiently large database of devanagari script samples (either in text
or handwritten form)
2. Query Generator: A mechanism to query the database and obtain a random sample
subject to the design
3. Obfuscator: A module that takes the random sample from the database that distorts
and adds noise to it
4. DevaGUI: User challenge-response interface
5. Match Response: A determination of whether the user has submitted the accurate
response for the challenge posed.
Figure 6 DevaCAPTCHA framework
Query
Generator DevaDB
Obfuscator
Deva GUI
Match Response
Query
generated
based on user
design choice Character String
Generated from
Character String
Generated from
database
User input
(response)
Random value
associated with user
Distorted character
string to be displayed
to user in the
DevaGUI (challenge)
Scanned DevaNagari Script
Newspapers, Books and
manuscripts
Random
value
associated
with user
Human or
BOT detection
6. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
52
5.1 DevaDB
DevaDB is a collection of books, newspapers and manuscripts in Devanagari script. The
database is required to be online and can be shared by many web applications. The database can
exclusively contain pages in Devanagari script based languages or may be multi-lingual
allowing support for many other scripts/languages. The database population process is a one-
time major effort with periodic minor updates or addition. The contents are stored as pages
which are uniquely identified as bit objects. The pages are indexed and a list of words with
associated pages is generated. Indexing is also a one-time major effort with re-indexing
performed only on updation. This can be used for randomly selecting a pre-existing word from
the database. Similar procedures can be adopted to generate phrases from the pages. In case a
random word is required, a sub-module of the DevaDB module is responsible for generation of
a random word character string with the suitable string length determined by the query
generator. The Query Generator module prepares a query which is fed to the Database module
which outputs a random word, a word or a phrase as a Devanagari script-based character string.
Thus DevaDB can be used to serve digital content as well as provide the source for generating
the challenge.
Work is already in progress partially funded by the Government of India and other agencies for
creation of Digital Libraries in many research centers and in many Indian languages not limited
to Devanagari script-based languages. The aim of these projects is to digitize Indian language
books and manuscripts for better preservation and easy access. In these projects, the initial
phase involves scanning of old newspapers, manuscripts and books and storing the content as
images. In other projects, the Indian language content is converted into text files using OCR
technology. The latter approach is suitable for DevaDB. Additionally, a web crawler may be
developed and used in the Database module that will populate the database with copyright-
expired content available on the web. Unicode is used to support the different types of fonts that
are available for Devanagari script.
5.2 Query Generator
The Query Generator module simply generates a query to DevaDB that will determine whether
the text string is a valid word or not, whether the length of the string is fixed in length or
variable. Other variations can be if the text string is a phrase or a word. A random number that
is associated with the user determines the parameters associated with the text string that is to be
generated by the database. The minimum and maximum length of the word, whether we select
an existing word from the database or whether we generate a random assortment of characters
are design choices or can be user specified in this module without compromising the security of
the Turing test.
5.3 Obfuscator
The Obfuscator module is the crux of DevaCAPTCHA and uses specific characteristics of
Devanagari script to deceive the adversary. In Devanagari script, all the individual characters
are joined by a head line called "Shiro Rekha". The obfuscator may remove the headline and
adds noise to the image using patterns like mosaic, arcs/jaws, vertically overlapped on the
script. The Obfuscator further misleads machine by using different fonts of different sizes with
variable character spacing. Sample images that are intended to be used in DevaCAPTCHA are
shown below (Figure 7). Segmentation resistant methods will be employed in its design.
7. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
53
Figure 7 Visualized DevaCAPTCHA challenge strings
The Obfuscator module operates using a Transformation function that is applied to the character
string generated by DevaDB. The Transformation function consists of N (in the range of 50-
100) parameters each of which represents a particular type of alteration that can be applied to
the character string. The alterations may be at the individual character component level or at the
level of the entire character string. Periodically a subset of m (m < N) parameters are selected
randomly that will be used for this time period. Thus it is ensured that Bots are unaware of
which subset of N parameters are being currently used. The random input associated with each
user will determine the values of each of the m parameters.
For instance, parameter 1 may indicate font variation, parameter 2 may indicate font size
variation, parameter 3 may indicate variable character separation (overlapping characters,
shadow characters, joint characters at different points), parameter 4 may indicate skew,
parameter 5 may indicate noise (heavy typesetting, frayed paper/manuscript, faded print,
additive and subtractive noise), parameter 6 may indicate inclusion of a background that
interferes with the symbols, parameter 7 may indicate removal of shirorekha, parameter 8 may
indicate inclusion of a curve passing through the character string, parameter 9 may indicate
multiple consonant conjuncts, parameter 10 may indicate character level distortions (stretching,
compression), parameter 11 may indicate representation of the character string along a curve,
etc.
The extent of distortions applied is determined by the degree of robustness and usability that is
required. Robustness refers to the ability of a CAPTCHA to prevent Bots from successfully
deciphering the character string. Usability refers to easy solvability by humans. A highly robust
CAPTCHA successfully deflects Bot attacks but may also present greater difficulty for humans
to solve. Thus robustness and usability aspects have to be carefully balanced. The distortions
applied should be difficult for Bots to solve but very easily solved by humans.
5.4 DevaGUI
In DevaCAPTCHA, we display the substantially noisy and distorted image containing the
chosen text string or word in the DevaGUI (Figure 8) image display area. A text input box is
provided where the user can type in the characters in sequence as they appear in the distorted
image. A submit button is to be pressed to signal completion of input.
8. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
54
Figure 8 DevaGUI
A timer can be used to cause expiration of a CAPTCHA image so that users are given a
specified amount of time to solve the CAPTCHA while Bots have limited time to break the
CAPTCHA. Upon expiration of the current CAPTCHA image, the user can request a new
CAPTCHA string to be displayed by pressing the Refresh button. In case the user is unable to
solve the current CAPTCHA, the Refresh button may be used to request a new string. When the
user is able to successfully solve the string, he is permitted to move onto the next phase of
authentication or request a service from the web application.
5.5 Match Response
The user typed in text from DevaGUI should match the pre-obfuscated string generated by the
Database in response to the DevaDB query. If it does, the user is deemed to be a human and
may be permitted to authenticate or request for web services.
6. CONCLUSION
We have seen that by distinguishing between humans and computers, CAPTCHAs offer
protection against automated attacks on systems and applications. The criterion for success of a
text-based CAPTCHA are its robustness and usability. We have outlined techniques in the
Obfuscator module to generate the challenge that render DevaCAPTCHA robust as it is resistant
to Bot attacks that employ OCR technology.
DevaCAPTCHA is highly usable as it is easy for humans to successfully provide the response.
Since we are using words from books and newspapers or an assortment of characters that are
non-words, it is not difficult for humans to visually perceive these characters despite the
distortions and noise due to their superior visual capabilities and cognitive abilities to make
connections with words that they have encountered in some context. Distorted images
containing random strings are still easy for humans to read while computers spend endless time
processing information. The implementation of DevaCAPTCHA and the participation in OCR
testing efforts related to Indian language scripts is to be taken up as future research work.
Handwriting recognition and testing for Devanagari script is another future research activity.
Deva-
Are You Human?
What’s This?
Please enter the word below
Enter the text
SUB REFR
9. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
55
REFERENCES
[1] Shirali-Shahreza1, S. & Shirali-Shahrezal, M., (2010) “A Survey Of Human Interactive Proof
Systems”, International Journal of Innovative Computing, Information and Control, vol 6, num
3(A), March.
[2] Ahn, L. von, Blum, M., & Langford, J., (2003) “Telling humans and computers apart
automatically”, Communications of the ACM, vol 46, August, pp 57-60.
[3] Ahn, L. von, Blum, M., Hopper, N. J., & Langford, J., (2003), “CAPTCHA: Using hard AI
problems for security”, Proceedings of Eurocrypt 2003.
[4] Baird, H. S. & Popat, K., (2002) “Human interactive proofs and document image analysis”,
Proceedings of Document Analysis Systems 2002, pp 507–518.
[5] Yan, J. & El Ahmad, A. S., (2008) “Usability of CAPTCHAs or usability issue in CAPTCHA
design”, Proceedings of 4th Symposium on Usable Privacy and Security (2008), pp 44-52.
[6] Ahn, L. v., Blum M. & Langford, J., (2000) “The CAPTCHA Project (Completely Automatic
Public Turing Test to tell Computers and Humans Apart)”, Project at Department of Computer
Science, Carnegie-Mellon University, http://www.captcha.net.
[7] Chew, M. & Baird, H. S., (2003) “BaffleText: a Human Interactive Proof.”, Proceedings of 10th
SPIE/IS&T Document Recognition and Retrieval Conference (DRR2003), Santa Clara,
California, USA, pp 305-316.
[8] Rusu, A. & Govindaraju, V., (2004) “Handwritten CAPTCHA: using the difference in the
abilities of humans and machines in reading handwritten words”, Proceedings of the Ninth
International Workshop on Frontiers in Handwriting Recognition (IWFHR-9), Tokyo, Japan, pp
226-231.
[9] PayPal (2006), PayPal registration. Website https://www.paypal.com.
[10] Liao, W.H. & Chang C., (2004) “Embedding information within dynamic visual patterns”,
Proceedings of the IEEE International Conference on Multimedia and Expo, 2004. (ICME 04),
Taipei, Taiwan, vol. 2, pp 895-898.
[11] Microsoft Hotmail, Website http://www.hotmail.com.
[12] Coates, A.L., Baird, H.S. & Fateman, R. (2001) “Pessimal Print: a Reverse Turing Test"
Proceedings of IAPR 6th International Conference on Document Analysis and Recognition, pp
1154-1158, Seattle, Washington, USA, September 10-13.
[13] Baird, H.S. & Riopka, T., (2005) “ScatterType: a Reading CAPTCHA Resistant to Segmentation
Attack”, Proceedings of IS&T/SPIE Document Recognition & Retrieval XII Conference, San
Jose, California, USA, January 16-20.
[14] Ahmad, A.S.E., Yan, J. & Marshall, L., (2010) “The robustness of a new CAPTCHA”,
Proceedings of EUROSEC 2010, Paris, France, ACM 978-1-4503-0059-9/10/0004.
[15] Baird, H.S., Moll, M.A. & Wang, S.Y., (2005) “A highly legible CAPTCHA that resists
segmentation attacks”, Proceedings of Second International Workshop on Human Interactive
Proofs (HIP 2005), ed. By H.S.Baird and D.P.Lopresti, Springer Verlag, LNCS 3517,
Bethlehem, Pennsylvania, USA 2005.
[16] Merler, M. & Jacob, J., (2009) “Breaking an Image based CAPTCHA”, Technical Paper
submitted to the Department of Computer Science, Columbia University, USA, Spring term,
Available at www.cs.columbia.edu/~mmerler/project/FinalReport.pdf.
[17] Baird, H.S. & Bentley, J.L., (2005) "Implicit CAPTCHAs", Proceedings of the SPIE/IS&T
Conference on Document Recognition and Retrieval XII (DR&R2005), San Jose, pp. 191-196.
[18] Shirali-Shahreza, M. & Shirali-Shahreza, S., (2006) "Drawing CAPTCHA", Proceedings of the
28th International Conference Information Technology Interfaces (ITI 2006), Cavtat, Dubrovnik,
Croatia, June 19-22, 2006, pp 475-480.
10. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
56
[19] Kochanski, G. et al., (2002) "A Reverse Turing Test using speech", Proceedings of the Seventh
International Conference on Spoken Language Processing (ICSLP2002 -INTERSPEECH 2002),
Denver, Colorado, USA, September 16-20, 2002, pp 1357-1360
[20] Chan., T.Y. (2003) "Using a Text-to-Speech Synthesizer to Generate a Reverse Turing Test,"
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence,
2003, pp 226-232.
[21] Schlaikjer, A., (2007) “A Dual-Use Speech CAPTCHA: Aiding Visually Impaired Web Users
while Providing Transcriptions of Audio Streams”, Technical Report CMU-LTI-07-014,
Carnegie Mellon University, November.
[22] Ahn, L.v., Maurer, B., McMillen, C., Abrahama, D. & Blum, M., (2008) “reCAPTCHA:
Human-Based Character Recognition via Web Security Measures”, Science, vol 321, 12
September, Available at http://www.cs.cmu.edu/~biglou/reCAPTCHA_Science.pdf.
[23] Kluever, K.A., (2008) “Evaluating the Usability and Security of a Video CAPTCHA”, Master’s
thesis submitted to Rochester Institute of Technology, Rochester, New York, August.
[24] Shirali-Shahreza, M.H. & Shirali-Shahreza, M., (2007) “Multilingual CAPTCHA”, ICCC 2007
IEEE International Conference on Computational Cybernetics, 19–21 October, Gammarth,
Tunisiali.
[25] Shirali-Shahreza, M.H. & Shirali-Shahreza, M., (2006) “Persian/Arabic Baffletext CAPTCHA,”
Journal of Universal Computer Science , vol. 12, no. 12, pp 1783-1796, December.
[26] Chellapilla, K. & Simard, P.Y., (2004) “Using Machine Learning to Break Visual Human
Interaction Proofs (HIPs)”, Proceedings of NIPS.
[27] Mori, G. & Malik, J. (2003) “Recognizing Objects in Adversarial Clutter: Breaking a Visual
CAPTCHA,” Proceedings of IEEE CVPR, 2003.
[28] Sinha, R.M.K., (1987) “Rule based contextual post processing for Devanagari text recognition”,
Pattern Recognition, vol 20, num 5, pp 475-485.
[29] Sethi, I.K., (1977) “Machine recognition of constrained hand printed Devanagari”, Pattern
Recognition, vol. 9, pp 69-75.
[30] Bansal, V. & Sinha, R.M.K (2002) “Segmentation of Touching and Fused Devanagari
Characters”, Pattern Recognition, vol. 35, pp. 875-893, April.
[31] Bansal, V. & Sinha, R.M.K, (2001) “A Devanagari OCR and A Brief Overview of OCR for
Indian Script”, Proceedings of Symposium on Transaction support System (STRANS 2001),
February 15-17, Kanpur, India.
[32 Arora, S., Bhattacharjee, D., Nasipuri, M. & Malik, L., (2007) “A two stage classification
approach for hand-written devanagari characters”, International Conference on Computational
Intelligence and Multimedia Application (ICCIMA07), Sivkasi, Tamil Nadu, India.
[33] Agrawal, M. & Doermann, D., (2008) "Re-Targetable OCR with Intelligent Character
Segmentation", DAS '08: Proceedings of the Eighth IAPR International Workshop on Document
Analysis Systems, pp 183-190, September.
[34] Holambe, A.N. & Thool, R.C., (2010) “Printed and Handwritten Character & Number
Recognition of Devanagari Script using SVM and KNN”, International Journal of Recent Trends
in Engineering and Technology, vol. 3, No. 2, May.
[35] Kompalli, S., Setlur, S. & Govindaraju, V., (2006) “Design and comparison of segmentation
driven and recognition driven devanagari ocr”, Proceedings of DIAL, pp 96–102, 2006.
[36] Bansal, V. & Sinha, R.M.K, (2001) “A Complete OCR for Printed Hindi Text in Devnagari
Script”, Sixth International Conference on Document Analysis and Recognition, IEEE
Publication, Seatle USA, 2001, pp 800-804.
11. International Journal of Advanced Information Technology (IJAIT) Vol. 1, No. 4, August 2011
57
[37] Arora, S., Bhattacharjee, D., Nasipuri, M., Basu, D.K. & Kundu, M., (2008) “Combining
Multiple Feature Extraction Techniques for Handwritten Devnagari Character Recognition”,
IEEE Region 10 Colloquium and the Third ICIIS, IIT Kharagpur, India Dec 2008.
Authors
Sushma Yalamanchili completed her under-
graduate studies in Computer Science at BITS,
Pilani, India and graduate studies at Michigan
State University, USA. She has been teaching
graduate students since 1998. Her areas of
interest are Network & Information Security,
Human Interaction Proof, Pattern Recognition
and Image Processing.
M. Kameswara Rao has MCA from Acharya
Nagarjuna University and M.Phil from
Bharatidasan University. He is currently
pursuing M.Tech in Acharya Nagarjuna
University. He has taught graduate students in
Computer Science for ten years. His areas of
interest are Network Security, Pattern
Recognition and Image Processing.