Abstract
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual abilities between humans and machines. In this paper, we propose a new paradigm for building CAPTCHA’s which offers simultaneous benefits to both online security and pattern recognition research. We illustrate our discussion with a number of examples and suggest various directions for future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baird, H.S., Bentley, J.L.: Implicit CAPTCHAs. In: Proceedings of Document Recognition and Retrieval XII (IS&T/SPIE Electronic Imaging), San Jose, CA, January 2005, vol. 5676, pp. 191–196 (2005)
The CAPTCHA Project (2004), http://www.captcha.net/
Coates, A.L., Baird, H.S., Fateman, R.: Pessimal Print: a Reverse Turing Test. In: Proceedings of the Sixth International Conference on Document Analysis and Recognition, Seattle, WA, September 2001, pp. 1154–1158 (2001)
George Washington Papers at the Library of Congress (March 2005), http://memory.loc.gov/ammem/gwhtml/gwhome.html
Knight, W.: Google set to sort out free email. NewScientist.com (April 2004), http://www.newscientist.com/article.ns?id=dn4842
Lillibridge, M.D., Abadi, M., Bharat, K., Broder, A.Z.: Method for selectively restricting access to computer systems (February 2001) U.S. Patent No. 6,195,698
Lopresti, D.: Exploiting WWW resources in experimental document analysis research. In: Lopresti, D.P., Hu, J., Kashi, R.S. (eds.) DAS 2002. LNCS, vol. 2423, pp. 532–543. Springer, Heidelberg (2002)
Mori, G., Malik, J.: Breaking a visual CAPTCHA (December 2003), http://www.cs.berkeley.edu/~mori/gimpy/gimpy.html
Phillips, I., Chen, S., Haralick, R.: CD-ROM document database standard. In: Proceedings of Second International Conference on Document Analysis and Recognition, Tsukuba Science City, Japan, October 1993, pp. 478–483 (1993)
RSA Security: solutions for enterprise data privacy and identity and access management (January 2005), http://www.rsasecurity.com/
Rusu, A., Govindaraju, V.: On the challenges that handwritten text images pose to computers and new practical applications. In: Proceedings of Document Recognition and Retrieval XII (IS&T/SPIE Electronic Imaging), San Jose, CA, January 2005, vol. 5676, pp. 84–91 (2005)
Stork, D.G.: Character and document research in the Open Mind Initiative. In: Proceedings of the Fifth International Conference on Document Analysis and Recognition, Bangalore, India, September 1999, pp. 1–12 (1999)
Stork, D.G.: The Open Mind Initiative (January 2005), http://www.openmind.org/
VeriSign, Inc. – Internet and telecommunications services from VeriSign, Inc. (January 2005), http://www.verisign.com/
Webcam Index – live free webcams (January 2005), http://www.webcamindex.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lopresti, D. (2005). Leveraging the CAPTCHA Problem. In: Baird, H.S., Lopresti, D.P. (eds) Human Interactive Proofs. HIP 2005. Lecture Notes in Computer Science, vol 3517. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427896_7
Download citation
DOI: https://doi.org/10.1007/11427896_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26001-1
Online ISBN: 978-3-540-32117-0
eBook Packages: Computer ScienceComputer Science (R0)