Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

Research on CAPTCHA has led CAPTCHA design into adopting almost exclusively graphical implementations that deal mostly with character recognition. This has reached an exhaustion point, where new approaches are vital to the survival of the technique. This paper discusses the early stages of a research that intends to solve the open problem of a CAPTCHA in the text domain offering, this way, innovative research possibilities to the CAPTCHA paradigm. It is essentially an investigation on a CAPTCHA that draws its security from the cognitive and computational aspects behind phonetic punning riddles found on Knock-Knock Jokes. By the specification of a computational model, the implementation of a prototype and its experimentation with human individuals, it is shown that the proposal is indeed feasible and that studies in non conventional areas for Information Security are the key for developing the proposed goal.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Chan, T.-Y.: Using a text-to-speech synthesizer to generate a reverse turing test. In: Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, p. 226. IEEE Computer Society Press, Los Alamitos (2003)

    Chapter  Google Scholar 

  3. Coates, A.L., Fateman, R.J.: Pessimal print: A reverse turing test. In: Sixth International Conference on Document Analysis and Recognition (ICDAR 2001) (2001)

    Google Scholar 

  4. Godfrey, P.B.: Text-based CAPTCHA algorithms. In: First Workshop on Human Interactive Proofs (unpublished Manuscript, 2002), available electronically: http://www.aladdin.cs.cmu.edu/hips/events/abs/godfreyb_abstract.pdf

  5. Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Conference on Computer Vision and Pattern Recognition (CVPR 2003), vol. I (2003)

    Google Scholar 

  6. Przydatek, B.: On the (im)possibility of a text-only CAPCHA. In: First Workshop on Human Interactive Proofs (unpublished Abstract, 2002), available electronically: http://www.aladdin.cs.cmu.edu/hips/events/abs/bartosz_abstract.pdf

  7. Ritchie, G.: Prospects for Computational Humour. In: Proceedings of 7th IEEE International Workshop on Robot and Human Communication, Takamatsu, Japan, pp. 283–291 (1998)

    Google Scholar 

  8. Turing, A.M.: Computing machinery and intelligence. Mind 49, 433–460 (1950); von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Hips http://www.aladdin.cs.cmu.edu/hips/

    Article  MathSciNet  Google Scholar 

  9. Taylor, J.: Computational Recognition of Humor in a Focused Domain. Master Thesis, University of Cincinnati (2004)

    Google Scholar 

  10. Frisch, S.: Similarity And Frequenc In Phonology. Doctoral dissertation, Northwestern University (1996)

    Google Scholar 

  11. Naor, M.: Veri_cation of a human in the loop or Identi_cation via the Turing Test (unpublished Manuscript, 1997), available electronically: http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human.ps

  12. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–83 (1883); 161–191 (February 1883)

    Google Scholar 

  13. Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: Advances in Neural Information Processing Systems. Neural Information Processing Systems, vol. 17, MIT Press, Cambridge (2004)

    Google Scholar 

  14. Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  15. Bergmair, R., Katzenbeisser, S.: Towards Human Interactive Proofs in the Text-Domain Using the Problem of Sense-Ambiguity for Security. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. The OCR Reaearch Team, Weak CAPTCHAs (2006), available online in: http://ocr-research.org.ua/list.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ximenes, P., dos Santos, A., Fernandez, M., Celestino, J. (2006). A CAPTCHA in the Text Domain. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_84

Download citation

  • DOI: https://doi.org/10.1007/11915034_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics