SlideShare a Scribd company logo
UE6858
                        “CAPTCHAS”



                  “CAPTCHAS”
    Submitted in fulfillment of Seminar required for the

             Bachelor of Engineering (B.E)
                              In
                Information Technology
                              By

                      Sachin Narang
                     UE6858, 8th Semester
                     Panjab University

                   Under the Supervision
                            Of

                     Ms. Roopali Garg
                   Associate Professor, UIET




UE6858                                                 Page 1
UE6858
                     “CAPTCHAS”



                      Contents

S.No                Topic              Page No.
1                 Cover Page              1

2                  Contents               2

3              Acknowledgment             3

4                Declaration              4

5                 Certificate             5

4                Introduction             6

5             Why use CAPTCHAS            7

6                 Definitions             8

7             Types of CAPTCHAS           9

8        Major Areas Of Applications      11

9                ReCAPTCHA                14

10          Breaking of CAPTCHAS          16

11        New Proposed Approaches         17

12                Conclusion              19

13               Bibliography             20




              Acknowledgement


UE6858                                         Page 2
UE6858
                               “CAPTCHAS”




This is to thank all those who supported and helped me throughout the
commencement of this seminar report. I would like to thank specially my
teacher in-charge, Ms. Roopali Garg for her continuous guidance. I would
also like to thank my friends for their encouragement. Also, each time they
found a mistake and suggested a correction and led this seminar to
perfection.




Sachin Narang

B.E, I.T, UE6858

U.I.E.T




                              Declaration


UE6858                                                                Page 3
UE6858
                              “CAPTCHAS”




I hereby declare that the work which is being presented in this seminar
report on ‘CAPTCHAS’ submitted at U.I.E.T., Panjab University is an
authentic work presented by Mr. Sachin Narang (UE6858) of B.E. (I.T.) 8th
semester under the supervision of Ms. Roopali Garg.




Sachin Narang

B.E, I.T, UE6858

U.I.E.T




                               Certificate

UE6858                                                               Page 4
UE6858
                              “CAPTCHAS”




This is to certify that Mr. Sachin Narang, UE6858 , B.E. (I.T.) 8th Semester
have completed seminar report, in accordance with the requirement for
qualifying 8th semester, on CAPTCHAS under the guidance of Ms. Roopali
Garg.




Roopali Garg

Associate Professor

(Teacher In-Charge)




                                Introduction

UE6858                                                               Page 5
UE6858
                         “CAPTCHAS”



    Use of INTERNET has remarkably increased Globally in the
    past 10-12 years and so is the need of the Security over it.
    Marketing and Advertisement over INTERNET has seen
    companies like GOOGLE being made, which at the moment
    is traded at 181 billion USD ie. Almost twice of General
    Motors, McDonalds combined.
    Well this presentation is about Security achieved over
    Internet using CAPTCHAS. CAPTCHAS are basically
    software programs which act as a test to any user over
    internet that the person (user) is a human or another
    machine. This concept is used by all the big companies
    over internet Google, yahoo or facebook (name any).So
    what are these CAPTCHAS? And what are their possible
    applications? This is what we cover in our presentation.




UE6858                                                    Page 6
UE6858
                         “CAPTCHAS”



                   Why USE CAPTCHAS
Well to completely understand its usage one can consider this
story. Few years ago(November 99) www.Slashdot.org(a
popular site in US) conducted following poll on internet.




Now students at CMU and MIT instantly wrote a program
which increased their vote counts using software and
ultimately the poll had to be taken down because both
MIT and CMU had millions of votes while others
struggled to reach thousands.
There are situations like these where you need to
distinguish whether user is a machine or a computer.
This is where we use CAPTCHAS.


UE6858                                                   Page 7
UE6858
                         “CAPTCHAS”




                       DEFINITIONS


CAPTCHA stands for
  Completely Automated Public Turing test to tell Computers
and Humans Apart
A.K.A. Reverse Turing Test, Human Interaction Proof

Turing Test: to conduct this test two people and a machine is
needed here one person acts as an interrogator sitting in a
separate room asking questions and receiving responses and
goal of machine is to fool the interrogator.

The challenge here: develop a software program that can
create and grade challenges most humans can pass but
computers cannot.




UE6858                                                 Page 8
UE6858
                           “CAPTCHAS”




                   Types of CAPTCHAS
  There are basically 3 types of CAPTCHAS

  1.Text Based: These are the most commonly used
  CAPTCHAS. It can be further be divided into 3 parts:
  GIMPY : Initially used by yahoo ,in this CAPTCHA two steps
  are followed as:
  a) Pick a word or words from a small dictionary
  b) Distort them and add noise and background
  GIMPY-R: This was used by google and was basically a simple
  advance over gimpy. Here instead of a complete word
  individual letters are noised instead of complete words. steps
  followed are as
  a) Pick random letters
  b) Distort them, add noise and background
   SIMARD’S: here further advances made and arcs being made
into it ie. Curved geometrical shapes. Hence steps followed are
as
a)Pick random letters and numbers
b)Distort them and add arcs



UE6858                                                    Page 9
UE6858
                          “CAPTCHAS”




2. Graphic Based CAPTCHAS :These are based on graphics
ie. Images symbols and again is of two types:
      Bongo
Following steps are followed in BONGO CAPTCHAS as:
a)Display two series of blocks
b)User must find the characteristic that sets the two series
apart
c)User is asked to determine which series each of four single
blocks belongs to.
      PIX
This is the second kind of graphics CAPTCHA using distorted
images. Steps followed in its usage are as
a) Create a large database of labeled images
b) Pick a concrete object
c) Pick four images of the object from the images database
d) Distort the images
e) Ask the user to pick the object for a list of words

3.Audio Based CAPTCHAS:
These are based on humans ability to depict sounds that may
be distorted, following algorithm is followed in using it:
a) Pick a word or a sequence of numbers at random
b) Render them into an audio clip using a TTS software


UE6858                                                    Page 10
UE6858
                            “CAPTCHAS”



c) Distort the audio clip
    d) Ask the user to identify and type the word or numbers
            MAJOR AREAS OF APPLICATIONS:
CAPTCHAs have several applications for practical security,
including (but not limited to):
  •   Preventing Comment Spam in Blogs. Most bloggers
      are familiar with programs that submit bogus comments,
      usually for the purpose of raising search engine ranks of
      some website (e.g., "buy penny stocks here"). This is called
      comment spam. By using a CAPTCHA, only humans can
      enter comments on a blog. There is no need to make users
      sign up before they enter a comment, and no legitimate
      comments are ever lost!


  •   Protecting Website Registration. Several companies
      (Yahoo!, Microsoft, etc.) offer free email services. Up until a
      few years ago, most of these services suffered from a
      specific type of attack: "bots" that would sign up for
      thousands of email accounts every minute. The solution to
      this problem was to use CAPTCHAs to ensure that only
      humans obtain free accounts. In general, free services
      should be protected with a CAPTCHA in order to prevent
      abuse by automated scripts.


  •   Protecting Email Addresses From Scrapers.
      Spammers crawl the Web in search of email addresses
      posted in clear text. CAPTCHAs provide an effective
      mechanism to hide your email address from Web scrapers.
      The idea is to require users to solve a CAPTCHA before
      showing your email address. A free and secure


UE6858                                                         Page 11
UE6858
                            “CAPTCHAS”



      implementation that uses CAPTCHAs to obfuscate an email
      address can be found at reCAPTCHA MailHide.


  •   Online Polls. In November 1999, http://www.slashdot.org
      released an online poll asking which was the best graduate
      school in computer science (a dangerous question to ask
      over the web!). As is the case with most online polls, IP
      addresses of voters were recorded in order to prevent single
      users from voting more than once. However, students at
      Carnegie Mellon found a way to stuff the ballots using
      programs that voted for CMU thousands of times. CMU's
      score started growing rapidly. The next day, students at MIT
      wrote their own program and the poll became a contest
      between voting "bots." MIT finished with 21,156 votes,
      Carnegie Mellon with 21,032 and every other school with
      less than 1,000. Can the result of any online poll be trusted?
      Not unless the poll ensures that only humans can vote.


  •   Preventing Dictionary Attacks. CAPTCHAs can also be
      used to prevent dictionary attacks in password systems. The
      idea is simple: prevent a computer from being able to iterate
      through the entire space of passwords by requiring it to solve
      a CAPTCHA after a certain number of unsuccessful logins.
      This is better than the classic approach of locking an
      account after a sequence of unsuccessful logins, since doing
      so allows an attacker to lock accounts at will.


  •   Search Engine Bots. It is sometimes desirable to keep
      webpages unindexed to prevent others from finding them
      easily. There is an html tag to prevent search engine bots
      from reading web pages. The tag, however, doesn't
      guarantee that bots won't read a web page; it only serves to


UE6858                                                       Page 12
UE6858
                           “CAPTCHAS”



      say "no bots, please." Search engine bots, since they usually
      belong to large companies, respect web pages that don't
      want to allow them in. However, in order to truly guarantee
      that bots won't enter a web site, CAPTCHAs are needed.


  •   Worms and Spam. CAPTCHAs also offer a plausible
      solution against email worms and spam: "I will only accept
      an email if I know there is a human behind the other
      computer." A few companies are already marketing this idea




                          ReCAPTCHA

UE6858                                                      Page 13
UE6858
                           “CAPTCHAS”



ReCAPTCHA is a free CAPTCHA service that helps to digitize
books, newspapers and old time radio shows

About 200 million CAPTCHAs are solved by humans around the
world every day. In each case, roughly ten seconds of human
time are being spent. Individually, that's not a lot of time, but in
aggregate these little puzzles consume more than 150,000 hours
of work each day. What if we could make positive use of this
human effort? ReCAPTCHA does exactly that by channeling the
effort spent solving CAPTCHAs online into "reading" books.
To archive human knowledge and to make information more
accessible to the world, multiple projects are currently digitizing
physical books that were written before the computer age. The
book pages are being photographically scanned, and then
transformed into text using "Optical Character Recognition"
(OCR). The transformation into text is useful because scanning a
book produces images, which are difficult to store on small
devices, expensive to download, and cannot be searched. The
problem is that OCR is not perfect.
ReCAPTCHA improves the process of digitizing books by sending
words that cannot be read by computers to the Web in the form of
CAPTCHAs for humans to decipher. More specifically, each word
that cannot be read correctly by OCR is placed on an image and
used as a CAPTCHA. This is possible because most OCR
programs alert you when a word cannot be read correctly.
But if a computer can't read such a CAPTCHA, how does the
system know the correct answer to the puzzle? Here's how: Each
new word that cannot be read correctly by OCR is given to a user
in conjunction with another word for which the answer is already
known. The user is then asked to read both words. If they solve
the one for which the answer is known, the system assumes their
answer is correct for the new one. The system then gives the new
image to a number of other people to determine, with higher
confidence, whether the original answer was correct


UE6858                                                        Page 14
UE6858
             “CAPTCHAS”




         BREAKING OF CAPTCHAS



UE6858                          Page 15
UE6858
                             “CAPTCHAS”



There are two methods used till now to break these CAPTCHAS one
uses decoding software’s which removes noise and other uses humans

  1.   Some text based CAPTCHAs have been broken by software which
       has 3 properties as :

PreProcessing : Removal of background clutter and noise

Segmentation : Splitting the image into regions which each contain
a single character.

Classification: Identifying the character in each region




  2.   Other CAPTCHAs can be broken by streaming the tests for
       unsuspecting users to solve.




UE6858                                                           Page 16
UE6858
                             “CAPTCHAS”



                  New Proposed Approaches
  This new approach is Very similar to PIX CAPTCHAS as discussed
  earlier following are the steps followed in using it:

  • Pick a concrete object

  • Get 6 images at random from images.google.com that match the
    object

  • Distort the images

  • Build a list of 100 words: 90 from a full dictionary, 10 from the
    objects dictionary

  • Prompt the user to pick the object from the list of words

  • Make an HTTP call to images.google.com and search for the
    object

  • Screen scrape the result of 2-3 pages to get the list of images

  • Pick 6 images at random

  • Randomly distort both the images and their URLs before
    displaying them

  • Expire the CAPTCHA in 30-45 seconds




UE6858                                                           Page 17
UE6858
                            “CAPTCHAS”




  Benefits of this approach


  • The database already exists and is public

  • The database is constantly being updated and maintained

  • Adding “concrete objects” to the dictionary is virtually
    instantaneous

  • Distortion prevents caching hacks

  • Quick expiration limits streaming hacks



  Drawbacks of this approach:


  • Not accessible to people with disabilities (which is the case of
    most CAPTCHAs)

  • Relies on Google’s infrastructure

  • Unlike CAPTCHAs using random letters and numbers, the number
    of challenge words is limited.




UE6858                                                        Page 18
UE6858
                          “CAPTCHAS”




                    Conclusion
1.CAPTCHAS are any software that distinguishes human and
machine.
2.Research in CAPTCHAS implies advancement in AI making
computers understand how human thinks.
3.Internet companies are making billions of dollars every year,
their security and services quality matters and so does the
advancement in CAPTCHA technology.
4.Different methods of CAPTCHAS are being studied but new
ideas like ReCAPTCHA using human time on internet is
amazing.




UE6858                                                    Page 19
UE6858
                          “CAPTCHAS”




                        Bibliography


[i] www.phpcaptcha.org
[ii] www.captcha.net
[iii] www.wikipedia.com
[iv]Research   papers   by   Louis    Ahn   (Carmegie   mellon
university).




UE6858                                                  Page 20

More Related Content

What's hot

Weakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on TwitterWeakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on Twitter
Heiko Paulheim
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
Sumit Raj
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
AntaraBhattacharya12
 
Movie recommendation project
Movie recommendation projectMovie recommendation project
Movie recommendation project
Abhishek Jaisingh
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
ijtsrd
 
IRJET- Leaf Disease Detecting using CNN Technique
IRJET- Leaf Disease Detecting using CNN TechniqueIRJET- Leaf Disease Detecting using CNN Technique
IRJET- Leaf Disease Detecting using CNN Technique
IRJET Journal
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
jagan477830
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
Ashish Arora
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
JAYAPRAKASH JPINFOTECH
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learning
dataalcott
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
Partnered Health
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
dataalcott
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project report
Bharat Khanna
 
Twitter sentimentanalysis report
Twitter sentimentanalysis reportTwitter sentimentanalysis report
Twitter sentimentanalysis report
Savio Aberneithie
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report
jaysavani5
 
Machine Learning, Deep Learning and Data Analysis Introduction
Machine Learning, Deep Learning and Data Analysis IntroductionMachine Learning, Deep Learning and Data Analysis Introduction
Machine Learning, Deep Learning and Data Analysis Introduction
Te-Yen Liu
 

What's hot (20)

Weakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on TwitterWeakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on Twitter
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
 
FAKE Review Detection
FAKE Review DetectionFAKE Review Detection
FAKE Review Detection
 
Movie recommendation project
Movie recommendation projectMovie recommendation project
Movie recommendation project
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
 
IRJET- Leaf Disease Detecting using CNN Technique
IRJET- Leaf Disease Detecting using CNN TechniqueIRJET- Leaf Disease Detecting using CNN Technique
IRJET- Leaf Disease Detecting using CNN Technique
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Diabetes prediction using machine learning
Diabetes prediction using machine learningDiabetes prediction using machine learning
Diabetes prediction using machine learning
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project report
 
Twitter sentimentanalysis report
Twitter sentimentanalysis reportTwitter sentimentanalysis report
Twitter sentimentanalysis report
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report
 
Machine Learning, Deep Learning and Data Analysis Introduction
Machine Learning, Deep Learning and Data Analysis IntroductionMachine Learning, Deep Learning and Data Analysis Introduction
Machine Learning, Deep Learning and Data Analysis Introduction
 

Viewers also liked

PHOENIX AUDIO TECHNOLOGIES - A large Audio Signal Algorithm Portfolio
PHOENIX AUDIO TECHNOLOGIES  - A large Audio Signal Algorithm PortfolioPHOENIX AUDIO TECHNOLOGIES  - A large Audio Signal Algorithm Portfolio
PHOENIX AUDIO TECHNOLOGIES - A large Audio Signal Algorithm Portfolio
HTCS LLC
 
Project ,seminar , term paper front page
Project ,seminar , term paper  front pageProject ,seminar , term paper  front page
Project ,seminar , term paper front pageASHISH RAJ
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Nanoelectronics ppt,final
Nanoelectronics ppt,finalNanoelectronics ppt,final
Nanoelectronics ppt,finaltabirsir
 
Declaration by the candidate
Declaration by the candidateDeclaration by the candidate
Declaration by the candidate
Raj Sekhar
 
Power system protection seminar report
Power system protection seminar reportPower system protection seminar report
Power system protection seminar report
Rahul Aman
 

Viewers also liked (6)

PHOENIX AUDIO TECHNOLOGIES - A large Audio Signal Algorithm Portfolio
PHOENIX AUDIO TECHNOLOGIES  - A large Audio Signal Algorithm PortfolioPHOENIX AUDIO TECHNOLOGIES  - A large Audio Signal Algorithm Portfolio
PHOENIX AUDIO TECHNOLOGIES - A large Audio Signal Algorithm Portfolio
 
Project ,seminar , term paper front page
Project ,seminar , term paper  front pageProject ,seminar , term paper  front page
Project ,seminar , term paper front page
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Nanoelectronics ppt,final
Nanoelectronics ppt,finalNanoelectronics ppt,final
Nanoelectronics ppt,final
 
Declaration by the candidate
Declaration by the candidateDeclaration by the candidate
Declaration by the candidate
 
Power system protection seminar report
Power system protection seminar reportPower system protection seminar report
Power system protection seminar report
 

Similar to Seminar Report Mine

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
Advanced Captcha Report
Advanced Captcha ReportAdvanced Captcha Report
Advanced Captcha Report
Arpit Gupta
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
Rishabh Agarwal
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
IRJET Journal
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfGanesh Dhage
 
Captcha
CaptchaCaptcha
Captcha
Vruti Surani
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Karthikeyan Umapathy
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attacks
eSAT Journals
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
Editor IJCATR
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
International Journal of Technical Research & Application
 
Captcha report
Captcha reportCaptcha report
Captcha report
RAJ SINGH MANDY
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
Imperva
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
IJCSES Journal
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
Captcha
CaptchaCaptcha
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET Journal
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
IRJET Journal
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
Preetam Rout
 

Similar to Seminar Report Mine (20)

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Advanced Captcha Report
Advanced Captcha ReportAdvanced Captcha Report
Advanced Captcha Report
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesSecurity and User Experience: A Holistic Model for CAPTCHA Usability Issues
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
 
Captcha a security measure against spam attacks
Captcha  a security measure against spam attacksCaptcha  a security measure against spam attacks
Captcha a security measure against spam attacks
 
Enhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger CaptchasEnhancing Web-Security with Stronger Captchas
Enhancing Web-Security with Stronger Captchas
 
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTIONA SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
 
Captcha report
Captcha reportCaptcha report
Captcha report
 
Captchas
CaptchasCaptchas
Captchas
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
A Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHAA Survey of Current Research on CAPTCHA
A Survey of Current Research on CAPTCHA
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
Captcha
CaptchaCaptcha
Captcha
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Seminar Report Mine

  • 1. UE6858 “CAPTCHAS” “CAPTCHAS” Submitted in fulfillment of Seminar required for the Bachelor of Engineering (B.E) In Information Technology By Sachin Narang UE6858, 8th Semester Panjab University Under the Supervision Of Ms. Roopali Garg Associate Professor, UIET UE6858 Page 1
  • 2. UE6858 “CAPTCHAS” Contents S.No Topic Page No. 1 Cover Page 1 2 Contents 2 3 Acknowledgment 3 4 Declaration 4 5 Certificate 5 4 Introduction 6 5 Why use CAPTCHAS 7 6 Definitions 8 7 Types of CAPTCHAS 9 8 Major Areas Of Applications 11 9 ReCAPTCHA 14 10 Breaking of CAPTCHAS 16 11 New Proposed Approaches 17 12 Conclusion 19 13 Bibliography 20 Acknowledgement UE6858 Page 2
  • 3. UE6858 “CAPTCHAS” This is to thank all those who supported and helped me throughout the commencement of this seminar report. I would like to thank specially my teacher in-charge, Ms. Roopali Garg for her continuous guidance. I would also like to thank my friends for their encouragement. Also, each time they found a mistake and suggested a correction and led this seminar to perfection. Sachin Narang B.E, I.T, UE6858 U.I.E.T Declaration UE6858 Page 3
  • 4. UE6858 “CAPTCHAS” I hereby declare that the work which is being presented in this seminar report on ‘CAPTCHAS’ submitted at U.I.E.T., Panjab University is an authentic work presented by Mr. Sachin Narang (UE6858) of B.E. (I.T.) 8th semester under the supervision of Ms. Roopali Garg. Sachin Narang B.E, I.T, UE6858 U.I.E.T Certificate UE6858 Page 4
  • 5. UE6858 “CAPTCHAS” This is to certify that Mr. Sachin Narang, UE6858 , B.E. (I.T.) 8th Semester have completed seminar report, in accordance with the requirement for qualifying 8th semester, on CAPTCHAS under the guidance of Ms. Roopali Garg. Roopali Garg Associate Professor (Teacher In-Charge) Introduction UE6858 Page 5
  • 6. UE6858 “CAPTCHAS” Use of INTERNET has remarkably increased Globally in the past 10-12 years and so is the need of the Security over it. Marketing and Advertisement over INTERNET has seen companies like GOOGLE being made, which at the moment is traded at 181 billion USD ie. Almost twice of General Motors, McDonalds combined. Well this presentation is about Security achieved over Internet using CAPTCHAS. CAPTCHAS are basically software programs which act as a test to any user over internet that the person (user) is a human or another machine. This concept is used by all the big companies over internet Google, yahoo or facebook (name any).So what are these CAPTCHAS? And what are their possible applications? This is what we cover in our presentation. UE6858 Page 6
  • 7. UE6858 “CAPTCHAS” Why USE CAPTCHAS Well to completely understand its usage one can consider this story. Few years ago(November 99) www.Slashdot.org(a popular site in US) conducted following poll on internet. Now students at CMU and MIT instantly wrote a program which increased their vote counts using software and ultimately the poll had to be taken down because both MIT and CMU had millions of votes while others struggled to reach thousands. There are situations like these where you need to distinguish whether user is a machine or a computer. This is where we use CAPTCHAS. UE6858 Page 7
  • 8. UE6858 “CAPTCHAS” DEFINITIONS CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart A.K.A. Reverse Turing Test, Human Interaction Proof Turing Test: to conduct this test two people and a machine is needed here one person acts as an interrogator sitting in a separate room asking questions and receiving responses and goal of machine is to fool the interrogator. The challenge here: develop a software program that can create and grade challenges most humans can pass but computers cannot. UE6858 Page 8
  • 9. UE6858 “CAPTCHAS” Types of CAPTCHAS There are basically 3 types of CAPTCHAS 1.Text Based: These are the most commonly used CAPTCHAS. It can be further be divided into 3 parts: GIMPY : Initially used by yahoo ,in this CAPTCHA two steps are followed as: a) Pick a word or words from a small dictionary b) Distort them and add noise and background GIMPY-R: This was used by google and was basically a simple advance over gimpy. Here instead of a complete word individual letters are noised instead of complete words. steps followed are as a) Pick random letters b) Distort them, add noise and background SIMARD’S: here further advances made and arcs being made into it ie. Curved geometrical shapes. Hence steps followed are as a)Pick random letters and numbers b)Distort them and add arcs UE6858 Page 9
  • 10. UE6858 “CAPTCHAS” 2. Graphic Based CAPTCHAS :These are based on graphics ie. Images symbols and again is of two types: Bongo Following steps are followed in BONGO CAPTCHAS as: a)Display two series of blocks b)User must find the characteristic that sets the two series apart c)User is asked to determine which series each of four single blocks belongs to. PIX This is the second kind of graphics CAPTCHA using distorted images. Steps followed in its usage are as a) Create a large database of labeled images b) Pick a concrete object c) Pick four images of the object from the images database d) Distort the images e) Ask the user to pick the object for a list of words 3.Audio Based CAPTCHAS: These are based on humans ability to depict sounds that may be distorted, following algorithm is followed in using it: a) Pick a word or a sequence of numbers at random b) Render them into an audio clip using a TTS software UE6858 Page 10
  • 11. UE6858 “CAPTCHAS” c) Distort the audio clip d) Ask the user to identify and type the word or numbers MAJOR AREAS OF APPLICATIONS: CAPTCHAs have several applications for practical security, including (but not limited to): • Preventing Comment Spam in Blogs. Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost! • Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated scripts. • Protecting Email Addresses From Scrapers. Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address. A free and secure UE6858 Page 11
  • 12. UE6858 “CAPTCHAS” implementation that uses CAPTCHAs to obfuscate an email address can be found at reCAPTCHA MailHide. • Online Polls. In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote. • Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. This is better than the classic approach of locking an account after a sequence of unsuccessful logins, since doing so allows an attacker to lock accounts at will. • Search Engine Bots. It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to UE6858 Page 12
  • 13. UE6858 “CAPTCHAS” say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed. • Worms and Spam. CAPTCHAs also offer a plausible solution against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea ReCAPTCHA UE6858 Page 13
  • 14. UE6858 “CAPTCHAS” ReCAPTCHA is a free CAPTCHA service that helps to digitize books, newspapers and old time radio shows About 200 million CAPTCHAs are solved by humans around the world every day. In each case, roughly ten seconds of human time are being spent. Individually, that's not a lot of time, but in aggregate these little puzzles consume more than 150,000 hours of work each day. What if we could make positive use of this human effort? ReCAPTCHA does exactly that by channeling the effort spent solving CAPTCHAs online into "reading" books. To archive human knowledge and to make information more accessible to the world, multiple projects are currently digitizing physical books that were written before the computer age. The book pages are being photographically scanned, and then transformed into text using "Optical Character Recognition" (OCR). The transformation into text is useful because scanning a book produces images, which are difficult to store on small devices, expensive to download, and cannot be searched. The problem is that OCR is not perfect. ReCAPTCHA improves the process of digitizing books by sending words that cannot be read by computers to the Web in the form of CAPTCHAs for humans to decipher. More specifically, each word that cannot be read correctly by OCR is placed on an image and used as a CAPTCHA. This is possible because most OCR programs alert you when a word cannot be read correctly. But if a computer can't read such a CAPTCHA, how does the system know the correct answer to the puzzle? Here's how: Each new word that cannot be read correctly by OCR is given to a user in conjunction with another word for which the answer is already known. The user is then asked to read both words. If they solve the one for which the answer is known, the system assumes their answer is correct for the new one. The system then gives the new image to a number of other people to determine, with higher confidence, whether the original answer was correct UE6858 Page 14
  • 15. UE6858 “CAPTCHAS” BREAKING OF CAPTCHAS UE6858 Page 15
  • 16. UE6858 “CAPTCHAS” There are two methods used till now to break these CAPTCHAS one uses decoding software’s which removes noise and other uses humans 1. Some text based CAPTCHAs have been broken by software which has 3 properties as : PreProcessing : Removal of background clutter and noise Segmentation : Splitting the image into regions which each contain a single character. Classification: Identifying the character in each region 2. Other CAPTCHAs can be broken by streaming the tests for unsuspecting users to solve. UE6858 Page 16
  • 17. UE6858 “CAPTCHAS” New Proposed Approaches This new approach is Very similar to PIX CAPTCHAS as discussed earlier following are the steps followed in using it: • Pick a concrete object • Get 6 images at random from images.google.com that match the object • Distort the images • Build a list of 100 words: 90 from a full dictionary, 10 from the objects dictionary • Prompt the user to pick the object from the list of words • Make an HTTP call to images.google.com and search for the object • Screen scrape the result of 2-3 pages to get the list of images • Pick 6 images at random • Randomly distort both the images and their URLs before displaying them • Expire the CAPTCHA in 30-45 seconds UE6858 Page 17
  • 18. UE6858 “CAPTCHAS” Benefits of this approach • The database already exists and is public • The database is constantly being updated and maintained • Adding “concrete objects” to the dictionary is virtually instantaneous • Distortion prevents caching hacks • Quick expiration limits streaming hacks Drawbacks of this approach: • Not accessible to people with disabilities (which is the case of most CAPTCHAs) • Relies on Google’s infrastructure • Unlike CAPTCHAs using random letters and numbers, the number of challenge words is limited. UE6858 Page 18
  • 19. UE6858 “CAPTCHAS” Conclusion 1.CAPTCHAS are any software that distinguishes human and machine. 2.Research in CAPTCHAS implies advancement in AI making computers understand how human thinks. 3.Internet companies are making billions of dollars every year, their security and services quality matters and so does the advancement in CAPTCHA technology. 4.Different methods of CAPTCHAS are being studied but new ideas like ReCAPTCHA using human time on internet is amazing. UE6858 Page 19
  • 20. UE6858 “CAPTCHAS” Bibliography [i] www.phpcaptcha.org [ii] www.captcha.net [iii] www.wikipedia.com [iv]Research papers by Louis Ahn (Carmegie mellon university). UE6858 Page 20