Home > Research > Publications & Outputs > Attacks and design of image recognition CAPTCHAs

Links

Text available via DOI:

View graph of relations

Attacks and design of image recognition CAPTCHAs

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Attacks and design of image recognition CAPTCHAs. / Zhu, Bin B.; Yan, Jeff; Li, Qiujie et al.
CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, 2010. p. 187-200.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Zhu, BB, Yan, J, Li, Q, Yang, C, Liu, J, Xu, N, Yi, M & Cai, K 2010, Attacks and design of image recognition CAPTCHAs. in CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. ACM, New York, pp. 187-200. https://doi.org/10.1145/1866307.1866329

APA

Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., & Cai, K. (2010). Attacks and design of image recognition CAPTCHAs. In CCS '10 Proceedings of the 17th ACM conference on Computer and communications security (pp. 187-200). ACM. https://doi.org/10.1145/1866307.1866329

Vancouver

Zhu BB, Yan J, Li Q, Yang C, Liu J, Xu N et al. Attacks and design of image recognition CAPTCHAs. In CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM. 2010. p. 187-200 doi: 10.1145/1866307.1866329

Author

Zhu, Bin B. ; Yan, Jeff ; Li, Qiujie et al. / Attacks and design of image recognition CAPTCHAs. CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York : ACM, 2010. pp. 187-200

Bibtex

@inbook{fc56a89393b24b548ad5ffc563b94452,
title = "Attacks and design of image recognition CAPTCHAs",
abstract = "We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all existing IRCs schemes and evaluate each scheme against the practical requirements in CAPTCHA applications, particularly in large-scale real-life applications such as Gmail and Hotmail. Then we present a security analysis of the representative schemes we have identified. For the schemes that remain unbroken, we present our novel attacks. For the schemes for which known attacks are available, we propose a theoretical explanation why those schemes have failed. Next, we provide a simple but novel framework for guiding the design of robust IRCs. Then we propose an innovative IRC called Cortcha that is scalable to meet the requirements of large-scale applications. It relies on recognizing objects by exploiting the surrounding context, a task that humans can perform well but computers cannot. An infinite number of types of objects can be used to generate challenges, which can effectively disable the learning process in machine learning attacks. Cortcha does not require the images in its image database to be labeled. Image collection and CAPTCHA generation can be fully automated. Our usability studies indicate that, compared with Google's text CAPTCHA, Cortcha allows a slightly higher human accuracy rate but on average takes more time to solve a challenge.",
author = "Zhu, {Bin B.} and Jeff Yan and Qiujie Li and Chao Yang and Jia Liu and Ning Xu and Meng Yi and Kaiwei Cai",
year = "2010",
doi = "10.1145/1866307.1866329",
language = "English",
isbn = "9781450302449",
pages = "187--200",
booktitle = "CCS '10 Proceedings of the 17th ACM conference on Computer and communications security",
publisher = "ACM",

}

RIS

TY - CHAP

T1 - Attacks and design of image recognition CAPTCHAs

AU - Zhu, Bin B.

AU - Yan, Jeff

AU - Li, Qiujie

AU - Yang, Chao

AU - Liu, Jia

AU - Xu, Ning

AU - Yi, Meng

AU - Cai, Kaiwei

PY - 2010

Y1 - 2010

N2 - We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all existing IRCs schemes and evaluate each scheme against the practical requirements in CAPTCHA applications, particularly in large-scale real-life applications such as Gmail and Hotmail. Then we present a security analysis of the representative schemes we have identified. For the schemes that remain unbroken, we present our novel attacks. For the schemes for which known attacks are available, we propose a theoretical explanation why those schemes have failed. Next, we provide a simple but novel framework for guiding the design of robust IRCs. Then we propose an innovative IRC called Cortcha that is scalable to meet the requirements of large-scale applications. It relies on recognizing objects by exploiting the surrounding context, a task that humans can perform well but computers cannot. An infinite number of types of objects can be used to generate challenges, which can effectively disable the learning process in machine learning attacks. Cortcha does not require the images in its image database to be labeled. Image collection and CAPTCHA generation can be fully automated. Our usability studies indicate that, compared with Google's text CAPTCHA, Cortcha allows a slightly higher human accuracy rate but on average takes more time to solve a challenge.

AB - We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all existing IRCs schemes and evaluate each scheme against the practical requirements in CAPTCHA applications, particularly in large-scale real-life applications such as Gmail and Hotmail. Then we present a security analysis of the representative schemes we have identified. For the schemes that remain unbroken, we present our novel attacks. For the schemes for which known attacks are available, we propose a theoretical explanation why those schemes have failed. Next, we provide a simple but novel framework for guiding the design of robust IRCs. Then we propose an innovative IRC called Cortcha that is scalable to meet the requirements of large-scale applications. It relies on recognizing objects by exploiting the surrounding context, a task that humans can perform well but computers cannot. An infinite number of types of objects can be used to generate challenges, which can effectively disable the learning process in machine learning attacks. Cortcha does not require the images in its image database to be labeled. Image collection and CAPTCHA generation can be fully automated. Our usability studies indicate that, compared with Google's text CAPTCHA, Cortcha allows a slightly higher human accuracy rate but on average takes more time to solve a challenge.

U2 - 10.1145/1866307.1866329

DO - 10.1145/1866307.1866329

M3 - Chapter

SN - 9781450302449

SP - 187

EP - 200

BT - CCS '10 Proceedings of the 17th ACM conference on Computer and communications security

PB - ACM

CY - New York

ER -