SlideShare a Scribd company logo
CAPTCHA System
Presenting by: Kanchan Dixit
M.Tech. (CS)
Contents:
• Keywords
• Motivation
• Introduction
• Properties of CAPTCHA
• Different Types of CAPTCHA
• Design Principles
• Process Flow
• Working of CAPTCHA
• Generation Process of CAPTCHA
• Algorithmic Process
• Drawbacks
• Applications
• Working of OCR
• Issues in designing of CAPTCHA
• Conclusion
• REFERENCES
Keywords:
Turing test
Bot
HIP
OCR
Motivation:
 The original motivation of CAPTCHA came from an
online poll.
Basically, The CAPTCHA is used to prevent a bot from
accessing a website.
To prevent the automated access of a website.
To block spammers and bots that try to:
 Automatically sign up.
 Submitting forms.
 Creating accounts.
 use of websites, blogs or forums.
To provides security against the attacks performed by all the
malicious threats.
CAPTCHA
Introduction:
CAPTCHA is an acronym for Completely Automated Public
Turing test to tell Computer and Human Apart.[2]
A CAPTCHA is a challenge response test used in computing.
CAPTCHA is a program that can generate and grade test that
human can pass but bot can not.[4]
The first CAPTCHA was invented at Carnegie Mellon
University by John Langford, Nicholas J. Hooper and Luis
Von Ahn [1]
CAPTCHA technology based on graphical passwords.
CAPTCHA are also known as a type of Human Interaction
Proof (HIP).
CAPTCHA is an HIP system that is widely used to secure the
internet based applications.
CAPTCHA is one such shield which can be used as a
protection from these malicious programs.
Properties of CAPTCHA:
There are some basic properties of CAPTCHAs :
 Easy for human user pass.
 Hard enough for a bot to pass.
 Flexible enough so that a tester machine easily generate and
grade it.
 Fully automated system.
 Require little human maintenance or interaction in
administering the test.
Different types of CAPTCHA:
Some types of CAPTCHAs are given below:
 Text based CAPTCHAs
 Image based CAPTCHAs
 Audio based CAPTCHAs
 Video based CAPTCHAs
 Puzzle based CAPTCHAs
(1) Text based CAPTCHA:
Text based CAPTCHA are the most widely used in web
applications. [1,2]
Very effective and requires a large question bank.
The Number of classes of characters and digits are very small.
Figure 1: Text based CAPTCHA using by Facebook
Sr. No. Text Based CAPTCHA Website name
1. Wikipedia
2. Yahoo
3. Gmail
4. Facebook
5. Microsoft
6. Hotmail
 Image based CAPTCHAs are challenge tests in which the
users have to guess the similar images.[1]
 The user is required to identify image.
 Some types of Image based CAPTCHAs are :
(2) Image based CAPTCHA:
 ESP Pix CAPTCHA
 Dynamic Image
based CAPTCHA
 Multi model
CAPTCHA
 IdentiPic CAPTCHA
Figure 2: Image based CAPTCHA using by Google
Examples:
Figure 3: ESP Pix CAPTCHA [4] Figure 4: Dynamic Image based CAPTCHA [4]
Figure 5: Multi model CAPTCHA [4] Figure 6: IdentiPic CAPTCHA [4]
(3) Audio based CAPTCHA:
Developed for visually disabled users.
Audio-based CAPTCHAs are based on the sound-based
systems. [2]
It contains downloadable audio-clips.[3]
In this type of CAPTCHA,
First the user listens and after that submits the spoken
word.
Figure 8: Audio based CAPTCHA using by JimThatcher.com
Figure 7: Audio based CAPTCHA using by mollom
(4) Video based CAPTCHA:
• Video CAPTCHA is a newer and less commonly used
CAPTCHA system.
• In video-based CAPTCHAs, three words (tags) are
provided to the user which describes a video. [2]
• The user’s tag must match to a set of automatically
generated ground truth tags then only the test is said to be
passed. [4]
• CAPTCHAs contain big downloadable files.
Figure 9: Video based CAPTCHA using by olzaonsecurity.com
(5) Puzzle based CAPTCHA:
• Usually in Puzzle based CAPTCHA a given picture is divided
to chunks [2].
• A user is supposed to combine these chunks to form the
complete picture same as the original one.[3]
Figure 10: Puzzle based CAPTCHAs using by mozenda and TYNAX
Design Principles:
The principles behind CAPTCHA are as follows:
 Accessibility must be High.
 Image security by distortion of image.
 User friendly.
Must take less time.
Processing must be fast.
Process Flow:
The process behind CAPTCHA are as follows:
The user is presented with a garbled image on which some text
is displayed. This image is generated by the server using
random text.
The user must enter the same letters in the text into a text field
that is displayed on the form to protect.
When the form is submitted, the server checks if the text
entered by the user matches the initial generated text.
If it does, the transaction continues. Otherwise, an
error message is displayed and the user has to enter a
new code.
Working of CAPTCHA:
Figure 11: Working of the fusion of Image based CAPTCHA and Text based CAPTCHA
Generation Process of CAPTCHA :
Figure 12: Generation process of the fusion of Image based CAPTCHA and Text based CAPTCHA
Algorithmic Process:
b
Splitting and Rotating the CAPTCHA images
[6]
Step 1. Start the session.
Step 2. Generate n letters random string from the string
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn
opqrstuvwxyz0123456789".
Step 3. Create the copy for the random text and put it into the
session.
Step 4. Create transparent CAPTCHA image with w by h image
size and add CAPTCHA text over it.
Step 5. Set the initial X-position and Y-position of captcha image
to 0.
Step 6. Split the captcha into k by l Matrix shape by dividing
the captcha width into k parts and the height into l.
Step 7. Start a loop from 0 to k*l
If (i+1) Mod k+1 = 0 Then
{
Set initial X-Position to 0 and
initial Y-Position to Split Height
(Image Height / l)
}
End If
• Step 7.1. Create an array to put the split parts and put the
split images into array.
• Step 7.2. To pass to another split in one row, increase
the initial X-Position by Split Width (Image Width
/ k)in each loop step.
• Step 7.3. Randomize integer between -d and d to give
random rotation to the splits. Rotate the splits with
randomized variable that is random between -d and d.
• Step 7.4. End Loop.
Step 8. Combine the splits to create new CAPTCHA with
split and rotation.
Step 9. Add background to transparent new Captcha image
object with randomly drawn lines and special effects
Step 10. Export the final CAPTCHA image as a JPEG
file in the name of ‘captcha.jpg’.
Step 11. Destroy the final CAPTCHA image object to be
refreshed in each session.
Drawbacks:
1. Text based
CAPTCHA
1. In text images, user has some problem to identify the correct text or
characters.
i. Multiple fonts. ii. Font size.
iii. Blurred Letters iv. Wave Motion.
2. It can be easily identified by OCR techniques.
2. Image based
CAPTCHA
Some users face problem of image identification who have low vision or due
to blurring of images. [4]
3. Audio based
CAPTCHA
1. It is available only in English therefore end user must have a
comprehensive English vocabulary.
2. Character that have similar sound.
4. Video based
CAPTCHA
Due to large size of file, users face problem to download video and find
correct captcha.[2]
5. Puzzle based
CAPTCHA
It is not easy for users because this captcha take more time to solve the
puzzle and to identify actual arrangement of puzzles.[3]
Applications:
Protecting Web Registration: There are many sites on
the Internet which provide free registration to avail their services.
But they are susceptible to web bots.
Online polling sites: These sites takes user’s response or
feedback in the form of questionnaires. To ensure that only
human makes the response they make use of CAPTCHA.[2]
To avoid web crawling: If a site doesn’t want to get
indexed by a search engine then they can make use of
CAPTCHA.[3]
Contd…
Preventing Dictionary Attacks: Dictionary attack is a
technique of defeating the authentication mechanism by trying
to determine a decryption key.
• Online Games: Another application of CAPTCHA is online
games where it is preventing web Robots from playing games.
E-mail spam.
Verification of digitized books.
E-Ticketing.
Working of OCR:
Figure 12: Working of an OCR System against the Text based CAPTCHA
Issues in Designing of CAPTCHA:
 Security Issues
 Securing CAPTCHA against attacks
 Usability Issues
 Improving Usability Issues
Conclusion:
A brief survey has been done on the CAPTCHA and list out the
applications and drawbacks of different CAPTCHA based on
Text, Images, Audio, Video and Puzzles.
Security is one of the most important factors of web based
applications now a days. As we have discussed an introduction
and overview of the CAPTCHA based security system as a
potential method of securing web based application.
CAPTCHA’s are mainly produced from Asynchronous Java-
script And XML (AJAX) & using a bit of Hypertext Pre-
Processor (PHP) technology, various algorithms are present.
Future Work:
In near future, main focus will be on the developing of a
CAPTCHA that provide the ease of access to the user and
highest level of security by preventing the BOT attacks.
We encourage security researchers to create captchas based on
different AI problems, hopefully they will become more user-
friendly to people with disabilities (visual/mental).
The researches are ongoing for a CAPTCHA that can be able
to authenticate a user as well as preventing the site from the
malicious attacks.
QUERIES??
References:
[1] P. Gutmann, D. Naccache and C. C. Palme, “CAPTCHAs: Humans vs. Bots”,
IEEE Security & Privacy, 2013, pp. 68-70.
[2] Ved Prakash Singh et al, “Survey of Different Types of CAPTCHA”, (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 5
(2) , 2014, 2242-2245
[3] Baljit Singh Saini and Anju Bala “A Review of Bot Protection using CAPTCHA
for Web Security”, IOSR Journal of Computer Engineering, 2013, pp. 36-42.
[4] Rizwan Ur Rahman “ SURVEY ON CAPTCHA SYSTEMS”, JGRCS Journal
of Global Research in Computer Science, Volume 3, No. 6, June 2012, pp.45-53
[5] C. Pope and K. Kaur, “Is It Human or Computer? Defending E-Commerce
with Captchas”, IEEE IT Professional, Vol. 7, No. 2, 2005, 43-49.
[6] http://www.captcha.net
[6] Ibrahim Furkan Ince, Ilker Yengin, Yucel Batu Salman , “ DESIGNING
CAPTCHA ALGORITHM: SPLITTING AND ROTATING THE IMAGES
AGAINST OCRs”, IEEE, Innovations in Information Technology, Dubai,
2012,pp. 1-5.
[7] M. Tariq Banday, N. A. Shah, “ A Study of CAPTCHAs for Securing Web
Services ”, IJSDIA International Journal of Secure Digital Information Age, Vol.
1. No. 2, December 2009
THANK YOU

More Related Content

What's hot

Captcha report
Captcha reportCaptcha report
Captcha report
RAJ SINGH MANDY
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based Captcha
KAUSHAL KUMAR JHA
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
avinash2008
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
Abhishek Anand
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfGanesh Dhage
 
Captcha
CaptchaCaptcha
Captcha
Vruti Surani
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
Rishabh Agarwal
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
WebCrazyLabs
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
Gopinath Ramanna
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Computer vision and face recognition using python
Computer vision and face recognition using pythonComputer vision and face recognition using python
Computer vision and face recognition using python
Ratnakar Pandey
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
PRINCE PRANAV
 

What's hot (20)

CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha report
Captcha reportCaptcha report
Captcha report
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 
Python project on Image Based Captcha
Python project on Image Based CaptchaPython project on Image Based Captcha
Python project on Image Based Captcha
 
Captcha1
Captcha1Captcha1
Captcha1
 
Captchas
CaptchasCaptchas
Captchas
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
face recognition
face recognitionface recognition
face recognition
 
Computer vision and face recognition using python
Computer vision and face recognition using pythonComputer vision and face recognition using python
Computer vision and face recognition using python
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
 
Captcha
CaptchaCaptcha
Captcha
 

Similar to Captcha system

Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET Journal
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
IRJET Journal
 
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without DatabaseAn Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
Shubham Saurav
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
International Journal of Technical Research & Application
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
chirag patil
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
IJCSES Journal
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
IRJET Journal
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
IRJET Journal
 
CSE captcha ppt.pptx
CSE captcha ppt.pptxCSE captcha ppt.pptx
CSE captcha ppt.pptx
Rohit713364
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
Monika Keerthi
 
Human Computer Interface -l2.pdf
Human Computer Interface -l2.pdfHuman Computer Interface -l2.pdf
Human Computer Interface -l2.pdf
MohamedRamadan429025
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
Raj Fageria
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
sachin narang
 
Captcha
CaptchaCaptcha
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wpAsia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
Andrey Apuhtin
 

Similar to Captcha system (20)

Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
Captchas
CaptchasCaptchas
Captchas
 
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without DatabaseAn Implementation of A Geometric and Arithmetic CAPTCHA without Database
An Implementation of A Geometric and Arithmetic CAPTCHA without Database
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
 
Captcha
CaptchaCaptcha
Captcha
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA imagesDemonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
Demonstrated Deep Learning Techniques for the Resolution of CAPTCHA images
 
CSE captcha ppt.pptx
CSE captcha ppt.pptxCSE captcha ppt.pptx
CSE captcha ppt.pptx
 
289 292
289 292289 292
289 292
 
289 292
289 292289 292
289 292
 
Evolution of captcha technologies
Evolution of captcha technologiesEvolution of captcha technologies
Evolution of captcha technologies
 
Human Computer Interface -l2.pdf
Human Computer Interface -l2.pdfHuman Computer Interface -l2.pdf
Human Computer Interface -l2.pdf
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Captcha
CaptchaCaptcha
Captcha
 
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wpAsia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
Asia 16-sivakorn-im-not-a-human-breaking-the-google-re captcha-wp
 

Recently uploaded

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 

Recently uploaded (20)

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 

Captcha system

  • 1. CAPTCHA System Presenting by: Kanchan Dixit M.Tech. (CS)
  • 2. Contents: • Keywords • Motivation • Introduction • Properties of CAPTCHA • Different Types of CAPTCHA • Design Principles • Process Flow • Working of CAPTCHA • Generation Process of CAPTCHA • Algorithmic Process • Drawbacks • Applications • Working of OCR • Issues in designing of CAPTCHA • Conclusion • REFERENCES
  • 4. Motivation:  The original motivation of CAPTCHA came from an online poll. Basically, The CAPTCHA is used to prevent a bot from accessing a website. To prevent the automated access of a website. To block spammers and bots that try to:  Automatically sign up.  Submitting forms.  Creating accounts.  use of websites, blogs or forums. To provides security against the attacks performed by all the malicious threats.
  • 6. Introduction: CAPTCHA is an acronym for Completely Automated Public Turing test to tell Computer and Human Apart.[2] A CAPTCHA is a challenge response test used in computing. CAPTCHA is a program that can generate and grade test that human can pass but bot can not.[4] The first CAPTCHA was invented at Carnegie Mellon University by John Langford, Nicholas J. Hooper and Luis Von Ahn [1]
  • 7. CAPTCHA technology based on graphical passwords. CAPTCHA are also known as a type of Human Interaction Proof (HIP). CAPTCHA is an HIP system that is widely used to secure the internet based applications. CAPTCHA is one such shield which can be used as a protection from these malicious programs.
  • 8. Properties of CAPTCHA: There are some basic properties of CAPTCHAs :  Easy for human user pass.  Hard enough for a bot to pass.  Flexible enough so that a tester machine easily generate and grade it.  Fully automated system.  Require little human maintenance or interaction in administering the test.
  • 9. Different types of CAPTCHA: Some types of CAPTCHAs are given below:  Text based CAPTCHAs  Image based CAPTCHAs  Audio based CAPTCHAs  Video based CAPTCHAs  Puzzle based CAPTCHAs
  • 10. (1) Text based CAPTCHA: Text based CAPTCHA are the most widely used in web applications. [1,2] Very effective and requires a large question bank. The Number of classes of characters and digits are very small. Figure 1: Text based CAPTCHA using by Facebook
  • 11. Sr. No. Text Based CAPTCHA Website name 1. Wikipedia 2. Yahoo 3. Gmail 4. Facebook 5. Microsoft 6. Hotmail
  • 12.  Image based CAPTCHAs are challenge tests in which the users have to guess the similar images.[1]  The user is required to identify image.  Some types of Image based CAPTCHAs are : (2) Image based CAPTCHA:  ESP Pix CAPTCHA  Dynamic Image based CAPTCHA  Multi model CAPTCHA  IdentiPic CAPTCHA Figure 2: Image based CAPTCHA using by Google
  • 13. Examples: Figure 3: ESP Pix CAPTCHA [4] Figure 4: Dynamic Image based CAPTCHA [4] Figure 5: Multi model CAPTCHA [4] Figure 6: IdentiPic CAPTCHA [4]
  • 14. (3) Audio based CAPTCHA: Developed for visually disabled users. Audio-based CAPTCHAs are based on the sound-based systems. [2] It contains downloadable audio-clips.[3] In this type of CAPTCHA, First the user listens and after that submits the spoken word.
  • 15. Figure 8: Audio based CAPTCHA using by JimThatcher.com Figure 7: Audio based CAPTCHA using by mollom
  • 16. (4) Video based CAPTCHA: • Video CAPTCHA is a newer and less commonly used CAPTCHA system. • In video-based CAPTCHAs, three words (tags) are provided to the user which describes a video. [2] • The user’s tag must match to a set of automatically generated ground truth tags then only the test is said to be passed. [4] • CAPTCHAs contain big downloadable files.
  • 17. Figure 9: Video based CAPTCHA using by olzaonsecurity.com
  • 18. (5) Puzzle based CAPTCHA: • Usually in Puzzle based CAPTCHA a given picture is divided to chunks [2]. • A user is supposed to combine these chunks to form the complete picture same as the original one.[3]
  • 19. Figure 10: Puzzle based CAPTCHAs using by mozenda and TYNAX
  • 20. Design Principles: The principles behind CAPTCHA are as follows:  Accessibility must be High.  Image security by distortion of image.  User friendly. Must take less time. Processing must be fast.
  • 21. Process Flow: The process behind CAPTCHA are as follows: The user is presented with a garbled image on which some text is displayed. This image is generated by the server using random text. The user must enter the same letters in the text into a text field that is displayed on the form to protect. When the form is submitted, the server checks if the text entered by the user matches the initial generated text. If it does, the transaction continues. Otherwise, an error message is displayed and the user has to enter a new code.
  • 22. Working of CAPTCHA: Figure 11: Working of the fusion of Image based CAPTCHA and Text based CAPTCHA
  • 23. Generation Process of CAPTCHA : Figure 12: Generation process of the fusion of Image based CAPTCHA and Text based CAPTCHA
  • 24. Algorithmic Process: b Splitting and Rotating the CAPTCHA images [6] Step 1. Start the session. Step 2. Generate n letters random string from the string "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmn opqrstuvwxyz0123456789". Step 3. Create the copy for the random text and put it into the session. Step 4. Create transparent CAPTCHA image with w by h image size and add CAPTCHA text over it. Step 5. Set the initial X-position and Y-position of captcha image to 0.
  • 25. Step 6. Split the captcha into k by l Matrix shape by dividing the captcha width into k parts and the height into l. Step 7. Start a loop from 0 to k*l If (i+1) Mod k+1 = 0 Then { Set initial X-Position to 0 and initial Y-Position to Split Height (Image Height / l) } End If • Step 7.1. Create an array to put the split parts and put the split images into array. • Step 7.2. To pass to another split in one row, increase the initial X-Position by Split Width (Image Width / k)in each loop step.
  • 26. • Step 7.3. Randomize integer between -d and d to give random rotation to the splits. Rotate the splits with randomized variable that is random between -d and d. • Step 7.4. End Loop. Step 8. Combine the splits to create new CAPTCHA with split and rotation. Step 9. Add background to transparent new Captcha image object with randomly drawn lines and special effects Step 10. Export the final CAPTCHA image as a JPEG file in the name of ‘captcha.jpg’. Step 11. Destroy the final CAPTCHA image object to be refreshed in each session.
  • 27. Drawbacks: 1. Text based CAPTCHA 1. In text images, user has some problem to identify the correct text or characters. i. Multiple fonts. ii. Font size. iii. Blurred Letters iv. Wave Motion. 2. It can be easily identified by OCR techniques. 2. Image based CAPTCHA Some users face problem of image identification who have low vision or due to blurring of images. [4] 3. Audio based CAPTCHA 1. It is available only in English therefore end user must have a comprehensive English vocabulary. 2. Character that have similar sound. 4. Video based CAPTCHA Due to large size of file, users face problem to download video and find correct captcha.[2] 5. Puzzle based CAPTCHA It is not easy for users because this captcha take more time to solve the puzzle and to identify actual arrangement of puzzles.[3]
  • 28. Applications: Protecting Web Registration: There are many sites on the Internet which provide free registration to avail their services. But they are susceptible to web bots. Online polling sites: These sites takes user’s response or feedback in the form of questionnaires. To ensure that only human makes the response they make use of CAPTCHA.[2] To avoid web crawling: If a site doesn’t want to get indexed by a search engine then they can make use of CAPTCHA.[3]
  • 29. Contd… Preventing Dictionary Attacks: Dictionary attack is a technique of defeating the authentication mechanism by trying to determine a decryption key. • Online Games: Another application of CAPTCHA is online games where it is preventing web Robots from playing games. E-mail spam. Verification of digitized books. E-Ticketing.
  • 30. Working of OCR: Figure 12: Working of an OCR System against the Text based CAPTCHA
  • 31. Issues in Designing of CAPTCHA:  Security Issues  Securing CAPTCHA against attacks  Usability Issues  Improving Usability Issues
  • 32. Conclusion: A brief survey has been done on the CAPTCHA and list out the applications and drawbacks of different CAPTCHA based on Text, Images, Audio, Video and Puzzles. Security is one of the most important factors of web based applications now a days. As we have discussed an introduction and overview of the CAPTCHA based security system as a potential method of securing web based application. CAPTCHA’s are mainly produced from Asynchronous Java- script And XML (AJAX) & using a bit of Hypertext Pre- Processor (PHP) technology, various algorithms are present.
  • 33. Future Work: In near future, main focus will be on the developing of a CAPTCHA that provide the ease of access to the user and highest level of security by preventing the BOT attacks. We encourage security researchers to create captchas based on different AI problems, hopefully they will become more user- friendly to people with disabilities (visual/mental). The researches are ongoing for a CAPTCHA that can be able to authenticate a user as well as preventing the site from the malicious attacks.
  • 35. References: [1] P. Gutmann, D. Naccache and C. C. Palme, “CAPTCHAs: Humans vs. Bots”, IEEE Security & Privacy, 2013, pp. 68-70. [2] Ved Prakash Singh et al, “Survey of Different Types of CAPTCHA”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2242-2245 [3] Baljit Singh Saini and Anju Bala “A Review of Bot Protection using CAPTCHA for Web Security”, IOSR Journal of Computer Engineering, 2013, pp. 36-42. [4] Rizwan Ur Rahman “ SURVEY ON CAPTCHA SYSTEMS”, JGRCS Journal of Global Research in Computer Science, Volume 3, No. 6, June 2012, pp.45-53 [5] C. Pope and K. Kaur, “Is It Human or Computer? Defending E-Commerce with Captchas”, IEEE IT Professional, Vol. 7, No. 2, 2005, 43-49. [6] http://www.captcha.net
  • 36. [6] Ibrahim Furkan Ince, Ilker Yengin, Yucel Batu Salman , “ DESIGNING CAPTCHA ALGORITHM: SPLITTING AND ROTATING THE IMAGES AGAINST OCRs”, IEEE, Innovations in Information Technology, Dubai, 2012,pp. 1-5. [7] M. Tariq Banday, N. A. Shah, “ A Study of CAPTCHAs for Securing Web Services ”, IJSDIA International Journal of Secure Digital Information Age, Vol. 1. No. 2, December 2009