SlideShare a Scribd company logo
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
CAPTCHA
CONTENT
 Introduction
 Definition
 Bascilly what a ‘Captcha do ?
 How does Captcha work?
 Types of Captchas
 Breaking Captchas
 Characteristics
 Applications
 Conclusion
INTRODUCTION
 Computers and Humans are apart , a technique used
by a computer to tell if it is interacting with human or
some other computer.
 It is needed because activities such as online
commerce transactions, search engine submissions,
Web polls, Web registrations, free e-mail service
registration and other automated services are
subject to software programs, or bots, that mimic
the behavior of humans in order to skew the results
of the automated task or perform malicious
activities, such as gathering e-mail addresses for
spamming.
DEFINITION
 A CAPTCHA (an acronym for "completely automated public
turing test to tell computers and humans apart") is a type of
challenge-response test used in computing to determine
whether or not the user is human.
A CAPTCHA is a program that can generate and grade tests
that:
 Most humans can pass, but
 Current computer programs can't pass
BASCILLY WHAT A ‘CAPTCHA DO ?
 In order to validate the digital transaction, using the
CAPTCHA system the user is presented with a distorted
word typically placed on top of a distorted background.
The user must type the word into a field in order to
complete the process.
 Computers have a difficult time decoding the distorted
words while humans can easily decipher the text.
 Some CAPTCHAs now use pictures instead of words
where the user is presented with a series of pictures and
asked what the common element among all of the
pictures is.
 By entering that common element, the user validates
the transaction and the computer knows it is dealing
with a human and not a bot.
HOW DOES A CAPTCHA WORKS?
 A CAPTCHA image shows a random string which the user has to
type to submit a form.
 This is a simple problem for humans, but a very hard problem
for computers which have to use character recognition,
especially, because the displayed string is alienated in a way,
which makes it very hard for a computer to decode.
TYPES OF CAPTCHA
 Text based
• Gimpy, ez-gimpy
• Gimpy-r, Google CAPTCHA
• Simard’s HIP (MSN)
 Graphic based
• Bongo
• Pix
 Audio based
Text based CAPTCHAs
 Gimpy, ez-gimpy
• Pick a word or words from a small dictionary
• Distort them and add noise and background
 Gimpy-r, Google’s CAPTCHA
• Pick random letters
• Distort them, add noise and background
 Simard’s HIP
• Pick random letters and numbers
• Distort them and add arcs
Graphic based CAPTCHAs
 Bongo
• Display two series of blocks
• User must find the
characteristic that sets the
two series apart
• User is asked to determine
which series each of four
single blocks belongs to
• Difference? thick vs. thin
lines
Graphic based CAPTCHAs
 PIX
• Create a large database of
labeled images
• Pick a concrete object
• Pick four images of the object
from the images database
• Distort the images
• Ask the user to pick the object
for a list of words
Audio based CAPTCHAs
 Pick a word or a sequence of numbers at random
 Render them into an audio clip using a TTS
software
 Distort the audio clip
 Ask the user to identify and type the word or
numbers
BREAKING CAPTCHAS
Most text based CAPTCHAs have been broken
by software
• OCR
• Segmentation
Other CAPTCHAs were broken by streaming the
tests for unsuspecting users to solve.
CHARACTERISTICS
 They are completely automated. This avoids the
necessity for human maintenance or intervention in
the test, with obvious benefits in cost and reliability.
 The algorithm used is made public, though it may be
encumbered by a patent. This is stipulated so as to
require that breaking a captcha requires the solution
of a hard problem in the field of artificial intelligence
(AI) rather than just the discovery of the (secret)
algorithm, which could be obtained through other
techniques.
APPLICATIONS
Online polls
Search engine bots
Worms and spams
Search Engine Bots
Prevent dictionary attacks
CONCLUSION
 CAPTCHAS are any software that distinguishes human and
machine.
 Research in CAPTCHAS implies advancement in AI making
computers understand how human thinks.
 Internet companies are making billions of dollars every year,
their security and services quality matters and so does the
advancement in CAPTCHA technology.
REFERENCE
www.google.com
www.wikipedia.com
www.studymafia.org
THANK YOU!
QUERIES
?

More Related Content

Similar to CSE captcha ppt.pptx

Captcha
CaptchaCaptcha
Human Computer Interface -l2.pdf
Human Computer Interface -l2.pdfHuman Computer Interface -l2.pdf
Human Computer Interface -l2.pdf
MohamedRamadan429025
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
Preetam Rout
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
Introduction about Captcha and its types
Introduction about Captcha and its typesIntroduction about Captcha and its types
Introduction about Captcha and its types
bansarirajani
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
vinit1991
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
Raj Fageria
 
Captcha report
Captcha reportCaptcha report
Captcha report
RAJ SINGH MANDY
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
Rishabh Agarwal
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
 
14A81A05A8
14A81A05A814A81A05A8
14A81A05A8
Chaitanya Ram
 
web application security using CAPTCHA
web application  security using CAPTCHAweb application  security using CAPTCHA
web application security using CAPTCHA
komal jadhav
 
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
ijait
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
Monika Keerthi
 

Similar to CSE captcha ppt.pptx (20)

Captcha
CaptchaCaptcha
Captcha
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Captcha
CaptchaCaptcha
Captcha
 
Human Computer Interface -l2.pdf
Human Computer Interface -l2.pdfHuman Computer Interface -l2.pdf
Human Computer Interface -l2.pdf
 
Captcha
CaptchaCaptcha
Captcha
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
Introduction about Captcha and its types
Introduction about Captcha and its typesIntroduction about Captcha and its types
Introduction about Captcha and its types
 
Captcha by vinit sharma
Captcha by vinit sharmaCaptcha by vinit sharma
Captcha by vinit sharma
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
 
Captcha report
Captcha reportCaptcha report
Captcha report
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
 
14A81A05A8
14A81A05A814A81A05A8
14A81A05A8
 
Captcha a web security
Captcha a web securityCaptcha a web security
Captcha a web security
 
web application security using CAPTCHA
web application  security using CAPTCHAweb application  security using CAPTCHA
web application security using CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

CSE captcha ppt.pptx

  • 1. www.studymafia.org Submitted To: Submitted By: www.studymafia.org www.studymafia.org Seminar On CAPTCHA
  • 2. CONTENT  Introduction  Definition  Bascilly what a ‘Captcha do ?  How does Captcha work?  Types of Captchas  Breaking Captchas  Characteristics  Applications  Conclusion
  • 3. INTRODUCTION  Computers and Humans are apart , a technique used by a computer to tell if it is interacting with human or some other computer.  It is needed because activities such as online commerce transactions, search engine submissions, Web polls, Web registrations, free e-mail service registration and other automated services are subject to software programs, or bots, that mimic the behavior of humans in order to skew the results of the automated task or perform malicious activities, such as gathering e-mail addresses for spamming.
  • 4. DEFINITION  A CAPTCHA (an acronym for "completely automated public turing test to tell computers and humans apart") is a type of challenge-response test used in computing to determine whether or not the user is human. A CAPTCHA is a program that can generate and grade tests that:  Most humans can pass, but  Current computer programs can't pass
  • 5. BASCILLY WHAT A ‘CAPTCHA DO ?  In order to validate the digital transaction, using the CAPTCHA system the user is presented with a distorted word typically placed on top of a distorted background. The user must type the word into a field in order to complete the process.  Computers have a difficult time decoding the distorted words while humans can easily decipher the text.  Some CAPTCHAs now use pictures instead of words where the user is presented with a series of pictures and asked what the common element among all of the pictures is.  By entering that common element, the user validates the transaction and the computer knows it is dealing with a human and not a bot.
  • 6. HOW DOES A CAPTCHA WORKS?  A CAPTCHA image shows a random string which the user has to type to submit a form.  This is a simple problem for humans, but a very hard problem for computers which have to use character recognition, especially, because the displayed string is alienated in a way, which makes it very hard for a computer to decode.
  • 7. TYPES OF CAPTCHA  Text based • Gimpy, ez-gimpy • Gimpy-r, Google CAPTCHA • Simard’s HIP (MSN)  Graphic based • Bongo • Pix  Audio based
  • 8. Text based CAPTCHAs  Gimpy, ez-gimpy • Pick a word or words from a small dictionary • Distort them and add noise and background  Gimpy-r, Google’s CAPTCHA • Pick random letters • Distort them, add noise and background  Simard’s HIP • Pick random letters and numbers • Distort them and add arcs
  • 9. Graphic based CAPTCHAs  Bongo • Display two series of blocks • User must find the characteristic that sets the two series apart • User is asked to determine which series each of four single blocks belongs to • Difference? thick vs. thin lines
  • 10. Graphic based CAPTCHAs  PIX • Create a large database of labeled images • Pick a concrete object • Pick four images of the object from the images database • Distort the images • Ask the user to pick the object for a list of words
  • 11. Audio based CAPTCHAs  Pick a word or a sequence of numbers at random  Render them into an audio clip using a TTS software  Distort the audio clip  Ask the user to identify and type the word or numbers
  • 12. BREAKING CAPTCHAS Most text based CAPTCHAs have been broken by software • OCR • Segmentation Other CAPTCHAs were broken by streaming the tests for unsuspecting users to solve.
  • 13. CHARACTERISTICS  They are completely automated. This avoids the necessity for human maintenance or intervention in the test, with obvious benefits in cost and reliability.  The algorithm used is made public, though it may be encumbered by a patent. This is stipulated so as to require that breaking a captcha requires the solution of a hard problem in the field of artificial intelligence (AI) rather than just the discovery of the (secret) algorithm, which could be obtained through other techniques.
  • 14. APPLICATIONS Online polls Search engine bots Worms and spams Search Engine Bots Prevent dictionary attacks
  • 15. CONCLUSION  CAPTCHAS are any software that distinguishes human and machine.  Research in CAPTCHAS implies advancement in AI making computers understand how human thinks.  Internet companies are making billions of dollars every year, their security and services quality matters and so does the advancement in CAPTCHA technology.