SlideShare a Scribd company logo
Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 
IMPROVE CAPTCHA’S SECURITY USING 
GAUSSIAN BLUR FILTER 
Ariyan Zarei 
Computer Science Student, Shahid Beheshti University, Tehran, Iran 
Member of Young Researchers Club, Karaj branch, 
Islamic Azad University, Karaj, Iran 
ABSTRACT 
Providing security for webservers against unwanted and automated registrations has become a big 
concern. To prevent these kinds of false registrations many websites use CAPTCHAs. Among all kinds of 
CAPTCHAs OCR-Based or visual CAPTCHAs are very common. Actually visual CAPTCHA is an image 
containing a sequence of characters. So far most of visual CAPTCHAs, in order to resist against OCR 
programs, use some common implementations such as wrapping the characters, random placement and 
rotations of characters, etc. In this paper we applied Gaussian Blur filter, which is an image 
transformation, to visual CAPTCHAs to reduce their readability by OCR programs. We concluded that this 
technique made CAPTCHAs almost unreadable for OCR programs but, their readability by human users 
still remained high. 
KEYWORDS 
CAPTCHA, Gaussian Blur, Image Transformations, Optical Character Recognition (OCR), Internet 
Security 
1. INTRODUCTION 
Nowadays many people use internet to provide them with their needs such as shopping, banking 
transactions, registrations, communications, etc. Protecting servers and websites on internet from 
dangerous threats and attacks has become a serious problem. One of the important and dangerous 
threats is automated false registrations on webservers that can waste the recourses and finally 
cause serious damages to the servers. 
Many of the registration servers use CAPTCHAs to prevent these attacks. CAPTCHA stands for 
“Completely Automated Public Turing Test to Tell Computers and Humans Apart” [1]. Actually 
CAPTCHA is a test that can distinguish human users from robots and programs. Common kinds 
of CAPTCHAs are audio CAPTCHAs and visual CAPTCHAs. 
Most of the websites and registration systems use the visual CAPTCHAs which is usually an 
image containing sequence of characters with some noises. Websites show this images to users 
and ask them to enter characters correctly. Because of the weak points of OCR applications this 
kind of CAPTCHAs has become very common. However, the OCR applications have improved 
over time and many of them are able to remove the noises and recognize the words. 
In this research we have applied Gaussian Blur filter on visual CAPTCHAs and we have 
investigated that how much they are secured against OCR programs and readable by humans. 
DOI : 10.5121/sipij.2014.5504 35
Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 
36 
2. PREVIOUS KNOWLEDGE 
Generally there are various kinds of CAPTCHAs, OCR-Based CAPTCHAs like Gimpy method, 
Pattern recognition CAPTCHAs like BONGO, and Sound-Based CAPTCHAs. 
The BONGO CAPTCHA asks the user to solve a visual pattern recognition problem. It shows 2 
series of shapes and patterns with different colors and sizes, then shows another pattern and asks 
the user to determine that the shown pattern belongs to which of the two series of patterns. [1] 
The Sound-Based CAPTCHAs was first designed by Nancy Chan in the University of Hong 
Kong. It is a system that plays a sound clip containing words and numbers and asks the user to 
enter what he/she heard. [1] 
In this research we worked on the OCR-Based or Visual CAPTCHAs. The idea of visual 
CAPTCHAs was first created to prevent automated and futile registrations on AltaVista website 
in 1997. It was done by Andrei Broder and then by DEC Systems Research Center. After that in 
2000 Yahoo company decided to have powerful and “easy to use Turing test” to prevent 
unwanted registrations on its services such as chat room and Email. This system designed by 
Prof. Manuel Blum at school of computer science at Carnegie Mellon University. [2] 
This kind of Turing test first called CAPTHCA by Luis von Ahn, Manuel Blum, Nicholas 
Hopper, and John Langford from Carnegie Mellon University. [3] 
So far visual CAPTCHAs have some common implementations like wrapping the characters via 
Linear Transformations, Random placement of characters, Noises applied to background, adding 
horizontal lines over the characters, etc. [4] 
The webservers use different CAPTCHAs with different implementations and methods. For 
example the Gimpy method which is an OCR-Based CPTCHA works by creating an image with 
colored and noised background containing 7 words with wrapped characters, Then asking the user 
to enter 3 words out of the 7 words in the picture. [1] 
We have other methods but most of them use the common implementations and techniques that 
we mentioned above. 
3. METHODOLOGY 
What we have done in this research was applying Gaussian Blur filter to some CAPTCHAs and 
test their readability by human users and OCR systems. 
3.1. Gaussian Blur 
Gaussian Blur is a kind of image filter that uses the Gaussian function to make an image blurred. 
The two dimensional Gaussian function is: 
,  =
X is the distance from horizontal axis, y is the distance from vertical axis and  is the standard 
deviation of the Gaussian distribution which is also related to Radius of Blurriness in image 
processing apps.
Signal  Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 
In order to apply this filter to an image, we have to generate a surface with Gaussian function. 
The contours of the surface are 
Values from this distribution buil 
reach final result. [5] 
concentric circles with Gaussian distribution from center point. 
build a convolution matrix which should be applied 
3.2. Convolution Matrix and the Way of Applying It 
Actually Convolution Matrix is a small matrix with usually 
called Kernel or Mask. It is used to apply 
Convolution Matrix of Edge Detection filter. 
to image to 
dimension. It also 
. some filters to images. For example figure 1 shows the 
Figure 1. 
to an Image 
   or    dimension 
Convolution Matrix of Edge Detection 
To apply a filter to an image, , each Kernel value must be multiplied by corresponding input image 
pixel value. The output pixel is the 
determines the process. 
Figure 
average (or sometimes the sum) of these values. Figure 
gure 2. Applying Convolution Matrix to image 
3.3. Applying Gaussian Blur to CAPTCHAs 
CAPTCHA 
We have generated 50 simple OCR 
characters. These CAPTCHAs contained two meaningless 4 
We created these images by an application 
we generate two random word as mentioned above and then we 
OCR-Based CAPTCHAs with simple white background and simple 
4-7 letters word separated by 
that we’ve written in C# language. In this app 
draw it to an image. 
Then we applied Gaussian filter on these images with Radius of 1 and 
another application in C# as you can see 
image’s pixels and applied the convolution matrix 
these CAPTCHAs in figure 3. 
Radius of 2 
it in figure 4. In this application we surveyed 
to each pixel. You can see some 
Figure 3. Visual CAPTCHAs with Gaussian Blur filter applied on. 
Left: Gaussian Blur with radius of 1 
Right: Gaussian Blur with radius of 2 
37 
s ) 2 
space. 
application 
by using 
on the 
examples of
Signal  Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 
Figure 4. the application that was 
created to apply Gaussian filter to the images 
To apply the Gaussian filter to an 
image in PHP (as a common webserver language) there are two 
ways, we can use “imagefilter” function [6] or we can implement the algorithm that has been 
explained above manually. To do so, we 
can use the “imagecolorat” function [7] 
to read each 
pixel’s color and “imagesetpixel” function [8] 
to set the color of that pixel which obtained 
applying the convolution matrix 
mathematical operations. 
from 
x to it. The rest of the implementation is just loops and simple 
At first we have tested the readability of t 
showing them the CAPTCHAs and ask 
rate the readability of these CAPTCHAs by giving a number between 1 and 10. We reached to 
satisfying results in this test. They were able to accurately distinguish 92% of the 
CAPTCHAs with radius of 1 and 90% of 
reached the average of 9.2 out of 10. 
these two series of CAPTCHAs on human users by 
asking them to enter what they saw. Also we asked them to 
them with radius of 2 and for readability 
blurred 
rating we 
After that, we tested the security of CAPTCHAs 
were ReadIRIS 14 and Free OCR. 
background especially for the CAPTCHAs with radius of 2. In other cases mostly they were 
unable to recognize the exact words. 
against 2 OCR programs. These OCR programs 
In some cases they were unable to recognize text from 
You can see the complete results in Table 1 below. 
Table 1. Results 
Humans Results 
Average characters similarity (radius of 1) 
Average characters similarity (radius of 2) 
Average exact match (radius of 1) 
Average exact match 
Average readability rating provided by human testers 
99.11% 
99.01% 
92.00% 
(radius of 2) 90.00% 
9.2 
38 
s

More Related Content

What's hot

Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
paperpublications3
 
MAJOR PROJECT
MAJOR PROJECT MAJOR PROJECT
MAJOR PROJECT
sandeep amaravadi
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Editor IJMTER
 
Ubiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsUbiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systems
Shahryar Ali
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1
San Kim
 
Emb
EmbEmb
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
CSCJournals
 
Cross-domain complementary learning with synthetic data for multi-person part...
Cross-domain complementary learning with synthetic data for multi-person part...Cross-domain complementary learning with synthetic data for multi-person part...
Cross-domain complementary learning with synthetic data for multi-person part...
哲东 郑
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
Anil Pokhrel
 
DCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image WatermarkingDCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image Watermarking
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Road signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencvRoad signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencv
MohdSalim34
 
Real time pedestrian detection, tracking, and distance estimation
Real time pedestrian detection, tracking, and distance estimationReal time pedestrian detection, tracking, and distance estimation
Real time pedestrian detection, tracking, and distance estimation
omid Asudeh
 
N046047780
N046047780N046047780
N046047780
IJERA Editor
 
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
Single Image Super-Resolution Using Analytical Solution for L2-L2 AlgorithmSingle Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
ijtsrd
 
Opticalcharacter recognition
Opticalcharacter recognition Opticalcharacter recognition
Opticalcharacter recognition
Shobhit Saxena
 
Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition
Feature Fusion and Classifier Ensemble Technique for Robust Face RecognitionFeature Fusion and Classifier Ensemble Technique for Robust Face Recognition
Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition
CSCJournals
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
iosrjce
 

What's hot (20)

Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
 
MAJOR PROJECT
MAJOR PROJECT MAJOR PROJECT
MAJOR PROJECT
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
Ubiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsUbiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systems
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1
 
Emb
EmbEmb
Emb
 
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
 
Cross-domain complementary learning with synthetic data for multi-person part...
Cross-domain complementary learning with synthetic data for multi-person part...Cross-domain complementary learning with synthetic data for multi-person part...
Cross-domain complementary learning with synthetic data for multi-person part...
 
E017443136
E017443136E017443136
E017443136
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
 
DCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image WatermarkingDCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image Watermarking
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Road signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencvRoad signs detection using voila jone's algorithm with the help of opencv
Road signs detection using voila jone's algorithm with the help of opencv
 
Real time pedestrian detection, tracking, and distance estimation
Real time pedestrian detection, tracking, and distance estimationReal time pedestrian detection, tracking, and distance estimation
Real time pedestrian detection, tracking, and distance estimation
 
N046047780
N046047780N046047780
N046047780
 
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
Single Image Super-Resolution Using Analytical Solution for L2-L2 AlgorithmSingle Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
 
Opticalcharacter recognition
Opticalcharacter recognition Opticalcharacter recognition
Opticalcharacter recognition
 
Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition
Feature Fusion and Classifier Ensemble Technique for Robust Face RecognitionFeature Fusion and Classifier Ensemble Technique for Robust Face Recognition
Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
 

Viewers also liked

Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
sipij
 
5514sipij02
5514sipij025514sipij02
5514sipij02
sipij
 
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONSONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
sipij
 
A HYBRID FILTERING TECHNIQUE FOR ELIMINATING UNIFORM NOISE AND IMPULSE NOIS...
A HYBRID FILTERING TECHNIQUE FOR  ELIMINATING UNIFORM NOISE AND IMPULSE  NOIS...A HYBRID FILTERING TECHNIQUE FOR  ELIMINATING UNIFORM NOISE AND IMPULSE  NOIS...
A HYBRID FILTERING TECHNIQUE FOR ELIMINATING UNIFORM NOISE AND IMPULSE NOIS...
sipij
 
Image compression using embedded zero tree wavelet
Image compression using embedded zero tree waveletImage compression using embedded zero tree wavelet
Image compression using embedded zero tree wavelet
sipij
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
sipij
 
Advances in automatic tuberculosis detection in chest x ray images
Advances in automatic tuberculosis detection in chest x ray imagesAdvances in automatic tuberculosis detection in chest x ray images
Advances in automatic tuberculosis detection in chest x ray images
sipij
 
Analog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimationAnalog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimation
sipij
 
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
sipij
 
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
sipij
 
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
sipij
 
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
sipij
 
IMAGE COMPRESSION BY EMBEDDING FIVE MODULUS METHOD INTO JPEG
IMAGE COMPRESSION BY EMBEDDING FIVE  MODULUS METHOD INTO JPEGIMAGE COMPRESSION BY EMBEDDING FIVE  MODULUS METHOD INTO JPEG
IMAGE COMPRESSION BY EMBEDDING FIVE MODULUS METHOD INTO JPEG
sipij
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
sipij
 
EEG S IGNAL Q UANTIFICATION B ASED ON M ODUL L EVELS
EEG S IGNAL  Q UANTIFICATION  B ASED ON M ODUL  L EVELS EEG S IGNAL  Q UANTIFICATION  B ASED ON M ODUL  L EVELS
EEG S IGNAL Q UANTIFICATION B ASED ON M ODUL L EVELS
sipij
 
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
sipij
 
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
sipij
 
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
sipij
 
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMSNOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
sipij
 

Viewers also liked (19)

Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
 
5514sipij02
5514sipij025514sipij02
5514sipij02
 
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONSONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
ONTOLOGICAL MODEL FOR CHARACTER RECOGNITION BASED ON SPATIAL RELATIONS
 
A HYBRID FILTERING TECHNIQUE FOR ELIMINATING UNIFORM NOISE AND IMPULSE NOIS...
A HYBRID FILTERING TECHNIQUE FOR  ELIMINATING UNIFORM NOISE AND IMPULSE  NOIS...A HYBRID FILTERING TECHNIQUE FOR  ELIMINATING UNIFORM NOISE AND IMPULSE  NOIS...
A HYBRID FILTERING TECHNIQUE FOR ELIMINATING UNIFORM NOISE AND IMPULSE NOIS...
 
Image compression using embedded zero tree wavelet
Image compression using embedded zero tree waveletImage compression using embedded zero tree wavelet
Image compression using embedded zero tree wavelet
 
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...
 
Advances in automatic tuberculosis detection in chest x ray images
Advances in automatic tuberculosis detection in chest x ray imagesAdvances in automatic tuberculosis detection in chest x ray images
Advances in automatic tuberculosis detection in chest x ray images
 
Analog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimationAnalog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimation
 
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
COMPOSITE TEXTURE SHAPE CLASSIFICATION BASED ON MORPHOLOGICAL SKELETON AND RE...
 
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
 
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
SkinCure: An Innovative Smart Phone Based Application to Assist in Melanoma E...
 
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
TIME OF ARRIVAL BASED LOCALIZATION IN WIRELESS SENSOR NETWORKS: A LINEAR APPR...
 
IMAGE COMPRESSION BY EMBEDDING FIVE MODULUS METHOD INTO JPEG
IMAGE COMPRESSION BY EMBEDDING FIVE  MODULUS METHOD INTO JPEGIMAGE COMPRESSION BY EMBEDDING FIVE  MODULUS METHOD INTO JPEG
IMAGE COMPRESSION BY EMBEDDING FIVE MODULUS METHOD INTO JPEG
 
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATIONWAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
WAVELET PACKET BASED IRIS TEXTURE ANALYSIS FOR PERSON AUTHENTICATION
 
EEG S IGNAL Q UANTIFICATION B ASED ON M ODUL L EVELS
EEG S IGNAL  Q UANTIFICATION  B ASED ON M ODUL  L EVELS EEG S IGNAL  Q UANTIFICATION  B ASED ON M ODUL  L EVELS
EEG S IGNAL Q UANTIFICATION B ASED ON M ODUL L EVELS
 
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
 
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
Sipij040305SPEECH EVALUATION WITH SPECIAL FOCUS ON CHILDREN SUFFERING FROM AP...
 
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
 
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMSNOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
 

Similar to Improve Captcha's Security Using Gaussian Blur Filter

Captcha
CaptchaCaptcha
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHAAN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
ijaia
 
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
ijait
 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
IRJET Journal
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
ijaia
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
chirag patil
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
pproject345
 
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMSINVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
ijaia
 
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
Investigating the Effect of BD-CRAFT to Text Detection AlgorithmsInvestigating the Effect of BD-CRAFT to Text Detection Algorithms
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
gerogepatton
 
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
ijiert bestjournal
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
Vidyut Singhania
 
IRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
IRJET- An Optimized Approach for Deaf and Dumb People using Air WritingIRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
IRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
IRJET Journal
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
feature software solutions pvt ltd
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
idescitation
 
DOC-20221122-WA0008.pptx
DOC-20221122-WA0008.pptxDOC-20221122-WA0008.pptx
DOC-20221122-WA0008.pptx
SubhamMukherjee42
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Karthikeyan Umapathy
 
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKSDEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
cscpconf
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
paperpublications3
 
An Optimized System to Solve Text-Based Captcha
An Optimized System to Solve Text-Based CaptchaAn Optimized System to Solve Text-Based Captcha
An Optimized System to Solve Text-Based Captcha
gerogepatton
 
Captchas
CaptchasCaptchas
Captchas
NIKHIL NAIR
 

Similar to Improve Captcha's Security Using Gaussian Blur Filter (20)

Captcha
CaptchaCaptcha
Captcha
 
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHAAN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHA
 
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA
 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
 
Captcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paperCaptcha cracking using image processing ieee paper
Captcha cracking using image processing ieee paper
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
 
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMSINVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
 
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
Investigating the Effect of BD-CRAFT to Text Detection AlgorithmsInvestigating the Effect of BD-CRAFT to Text Detection Algorithms
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
 
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
IRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
IRJET- An Optimized Approach for Deaf and Dumb People using Air WritingIRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
IRJET- An Optimized Approach for Deaf and Dumb People using Air Writing
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
DOC-20221122-WA0008.pptx
DOC-20221122-WA0008.pptxDOC-20221122-WA0008.pptx
DOC-20221122-WA0008.pptx
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
 
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKSDEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKS
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
An Optimized System to Solve Text-Based Captcha
An Optimized System to Solve Text-Based CaptchaAn Optimized System to Solve Text-Based Captcha
An Optimized System to Solve Text-Based Captcha
 
Captchas
CaptchasCaptchas
Captchas
 

Recently uploaded

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 

Recently uploaded (20)

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 

Improve Captcha's Security Using Gaussian Blur Filter

  • 1. Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 IMPROVE CAPTCHA’S SECURITY USING GAUSSIAN BLUR FILTER Ariyan Zarei Computer Science Student, Shahid Beheshti University, Tehran, Iran Member of Young Researchers Club, Karaj branch, Islamic Azad University, Karaj, Iran ABSTRACT Providing security for webservers against unwanted and automated registrations has become a big concern. To prevent these kinds of false registrations many websites use CAPTCHAs. Among all kinds of CAPTCHAs OCR-Based or visual CAPTCHAs are very common. Actually visual CAPTCHA is an image containing a sequence of characters. So far most of visual CAPTCHAs, in order to resist against OCR programs, use some common implementations such as wrapping the characters, random placement and rotations of characters, etc. In this paper we applied Gaussian Blur filter, which is an image transformation, to visual CAPTCHAs to reduce their readability by OCR programs. We concluded that this technique made CAPTCHAs almost unreadable for OCR programs but, their readability by human users still remained high. KEYWORDS CAPTCHA, Gaussian Blur, Image Transformations, Optical Character Recognition (OCR), Internet Security 1. INTRODUCTION Nowadays many people use internet to provide them with their needs such as shopping, banking transactions, registrations, communications, etc. Protecting servers and websites on internet from dangerous threats and attacks has become a serious problem. One of the important and dangerous threats is automated false registrations on webservers that can waste the recourses and finally cause serious damages to the servers. Many of the registration servers use CAPTCHAs to prevent these attacks. CAPTCHA stands for “Completely Automated Public Turing Test to Tell Computers and Humans Apart” [1]. Actually CAPTCHA is a test that can distinguish human users from robots and programs. Common kinds of CAPTCHAs are audio CAPTCHAs and visual CAPTCHAs. Most of the websites and registration systems use the visual CAPTCHAs which is usually an image containing sequence of characters with some noises. Websites show this images to users and ask them to enter characters correctly. Because of the weak points of OCR applications this kind of CAPTCHAs has become very common. However, the OCR applications have improved over time and many of them are able to remove the noises and recognize the words. In this research we have applied Gaussian Blur filter on visual CAPTCHAs and we have investigated that how much they are secured against OCR programs and readable by humans. DOI : 10.5121/sipij.2014.5504 35
  • 2. Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 36 2. PREVIOUS KNOWLEDGE Generally there are various kinds of CAPTCHAs, OCR-Based CAPTCHAs like Gimpy method, Pattern recognition CAPTCHAs like BONGO, and Sound-Based CAPTCHAs. The BONGO CAPTCHA asks the user to solve a visual pattern recognition problem. It shows 2 series of shapes and patterns with different colors and sizes, then shows another pattern and asks the user to determine that the shown pattern belongs to which of the two series of patterns. [1] The Sound-Based CAPTCHAs was first designed by Nancy Chan in the University of Hong Kong. It is a system that plays a sound clip containing words and numbers and asks the user to enter what he/she heard. [1] In this research we worked on the OCR-Based or Visual CAPTCHAs. The idea of visual CAPTCHAs was first created to prevent automated and futile registrations on AltaVista website in 1997. It was done by Andrei Broder and then by DEC Systems Research Center. After that in 2000 Yahoo company decided to have powerful and “easy to use Turing test” to prevent unwanted registrations on its services such as chat room and Email. This system designed by Prof. Manuel Blum at school of computer science at Carnegie Mellon University. [2] This kind of Turing test first called CAPTHCA by Luis von Ahn, Manuel Blum, Nicholas Hopper, and John Langford from Carnegie Mellon University. [3] So far visual CAPTCHAs have some common implementations like wrapping the characters via Linear Transformations, Random placement of characters, Noises applied to background, adding horizontal lines over the characters, etc. [4] The webservers use different CAPTCHAs with different implementations and methods. For example the Gimpy method which is an OCR-Based CPTCHA works by creating an image with colored and noised background containing 7 words with wrapped characters, Then asking the user to enter 3 words out of the 7 words in the picture. [1] We have other methods but most of them use the common implementations and techniques that we mentioned above. 3. METHODOLOGY What we have done in this research was applying Gaussian Blur filter to some CAPTCHAs and test their readability by human users and OCR systems. 3.1. Gaussian Blur Gaussian Blur is a kind of image filter that uses the Gaussian function to make an image blurred. The two dimensional Gaussian function is: , =
  • 3.
  • 4. X is the distance from horizontal axis, y is the distance from vertical axis and is the standard deviation of the Gaussian distribution which is also related to Radius of Blurriness in image processing apps.
  • 5. Signal Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 In order to apply this filter to an image, we have to generate a surface with Gaussian function. The contours of the surface are Values from this distribution buil reach final result. [5] concentric circles with Gaussian distribution from center point. build a convolution matrix which should be applied 3.2. Convolution Matrix and the Way of Applying It Actually Convolution Matrix is a small matrix with usually called Kernel or Mask. It is used to apply Convolution Matrix of Edge Detection filter. to image to dimension. It also . some filters to images. For example figure 1 shows the Figure 1. to an Image or dimension Convolution Matrix of Edge Detection To apply a filter to an image, , each Kernel value must be multiplied by corresponding input image pixel value. The output pixel is the determines the process. Figure average (or sometimes the sum) of these values. Figure gure 2. Applying Convolution Matrix to image 3.3. Applying Gaussian Blur to CAPTCHAs CAPTCHA We have generated 50 simple OCR characters. These CAPTCHAs contained two meaningless 4 We created these images by an application we generate two random word as mentioned above and then we OCR-Based CAPTCHAs with simple white background and simple 4-7 letters word separated by that we’ve written in C# language. In this app draw it to an image. Then we applied Gaussian filter on these images with Radius of 1 and another application in C# as you can see image’s pixels and applied the convolution matrix these CAPTCHAs in figure 3. Radius of 2 it in figure 4. In this application we surveyed to each pixel. You can see some Figure 3. Visual CAPTCHAs with Gaussian Blur filter applied on. Left: Gaussian Blur with radius of 1 Right: Gaussian Blur with radius of 2 37 s ) 2 space. application by using on the examples of
  • 6. Signal Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 Figure 4. the application that was created to apply Gaussian filter to the images To apply the Gaussian filter to an image in PHP (as a common webserver language) there are two ways, we can use “imagefilter” function [6] or we can implement the algorithm that has been explained above manually. To do so, we can use the “imagecolorat” function [7] to read each pixel’s color and “imagesetpixel” function [8] to set the color of that pixel which obtained applying the convolution matrix mathematical operations. from x to it. The rest of the implementation is just loops and simple At first we have tested the readability of t showing them the CAPTCHAs and ask rate the readability of these CAPTCHAs by giving a number between 1 and 10. We reached to satisfying results in this test. They were able to accurately distinguish 92% of the CAPTCHAs with radius of 1 and 90% of reached the average of 9.2 out of 10. these two series of CAPTCHAs on human users by asking them to enter what they saw. Also we asked them to them with radius of 2 and for readability blurred rating we After that, we tested the security of CAPTCHAs were ReadIRIS 14 and Free OCR. background especially for the CAPTCHAs with radius of 2. In other cases mostly they were unable to recognize the exact words. against 2 OCR programs. These OCR programs In some cases they were unable to recognize text from You can see the complete results in Table 1 below. Table 1. Results Humans Results Average characters similarity (radius of 1) Average characters similarity (radius of 2) Average exact match (radius of 1) Average exact match Average readability rating provided by human testers 99.11% 99.01% 92.00% (radius of 2) 90.00% 9.2 38 s
  • 7. Signal Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 39 OCR results ReadIRIS Application Average characters similarity (radius of 1) 31.86% Average characters similarity (radius of 2) 3.45% Percentage of readable CAPTCHAs (radius of 1) 56.00% Percentage of readable CAPTCHAs (radius of 2) 30.00% Average exact match (radius of 1) 16.00% Average exact match (radius of 2) 0.00% Free OCR Application Average characters similarity (radius of 1) 4.68% Average characters similarity (radius of 2) 0.52% Percentage of readable CAPTCHAs (radius of 1) 100.00% Percentage of readable CAPTCHAs (radius of 2) 32.00% Average exact match (radius of 1) 0.00% Average exact match (radius of 2) 0.00% Total Results Total average characters similarity on OCR programs 10.13% Total average exact match on OCR programs 4.00% Total average characters similarity on humans 99.06% Total average exact match on humans 91.00% Radius of 2 results average exact match on OCR programs 0.00% average exact match on humans 90.00% 4. CONCLUSION Because of some weaknesses of OCR programs, many webservers use OCR-Based CAPTCHAs to prevent futile registrations. In this paper we investigated the effect of using Gaussian filter on CAPTCHAs security. Actually we applied Gaussian blur filter on CAPTCHAs to improve their safety against OCR programs. Based on the result we acquired (Table 1) the CAPTCHAs with Gaussian Blur filter applied on, are very powerful against OCR programs and also their readability by human users are extremely high. We generated two series of Blur CAPTCHAs, one with radius of one and the other with radius of two. Considering the results, blur CAPTHCAs with radius of two are more efficient than the other one. OCR programs couldn’t recognize any of the CAPTCHAs with radius of two however human could recognize 90% of them. So they can be used in webservers to prevent abuse and unwanted registrations on them. ACKNOWLEDGMENT We offer our thanks to the president and faculty members of Computer Science Department of Shahid Beheshti University. Especially thanks to Young Researchers Elite Club that provided the research possibility for me.
  • 8. Signal Image Processing : An International Journal (SIPIJ) Vol.5, No.5, October 2014 40 REFERENCES [1] L. Von et al., “Telling Humans and Computers Apart Automatically,” COMMUNICATIONS OF THE ACM, Vol. 47, No. 2, Feb. 2004. [2] H.S. Baird and K. Popat, Human Interactive Proofs and Document Image Analysis, in 5th IAPR International Workshop on Document Analysis Systems, Princeton, NJ, 2002, pp. 507-518. [3] M. H. Shirali-Shahreza and M. Shirali-Shahreza “Persian/Arabic Baffletext CAPTCHA,” J.UCS, vol. 12, no. 12, pp. 1783-1796, 2006. [4] A. Hindle, M.W. Godfrey, R.C. Holt “Reverse Engineering CAPTCHAs,” in 15th Working Conference on Reverse Engineering, Antwerp, 2008. [5] Wikipedia The free encyclopedia, http://en.wikipedia.org/wiki/Gaussian_blur [6] PHP website, http://php.net/manual/en/function.imagefilter.php [7] PHP website, http://php.net/manual/en/function.imagecolorat.php [8] PHP website, http://php.net/manual/en/function.imagesetpixel.php