Skip to main content

A Novel Architecture for the Generation of Picture Based CAPTCHA

  • Conference paper
Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

Abstract

Denial of service attacks at application layer is major threat today. Web Programmers have come out with CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism to mitigate the impact of DoS attacks. Most of the CAPTCHA today are OCR based which is having two fold limitations. Firstly several automated tools that are capable of reading the CAPTCHA have emerged. Secondly the CAPTCHA is not comfortable for the human to read and feed the correct information online to send their web request. In order to overcome these difficulties a new type of CAPTCHA is introduced namely picture based CAPTCHA. It helps the user to overcome the drawbacks of the previous approach since it’s easy to use and understand and is also more secure than text based CAPTCHA. In this paper we propose a redesigned layout (model) for picture based CAPTCHA, which will provide an upper hand than the existing techniques. Our security analysis shows that the proposed model yields better results than other picture based CAPTCHA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jin-rong, H., Ling, W.: Technique of randomized question reading CAPTCHA based on character feature. Computer Engineering and Design (2008)

    Google Scholar 

  2. Hai-kun, J., Wen-jie, D., Li-min, S.: Research on security model with Chinese CAPTCHA. Computer Engineering and Design (2006)

    Google Scholar 

  3. Department of Computer Science, Carnegie Mellon University: reCAPTCHA: stop spam, read books (2007), http://www.reCAPTCHA.net/

  4. Datta, R., Li, J., Wang, J.W.: Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs. IEEE Transactions on Information Forensics and Security 4(3), 504–518 (2009)

    Article  Google Scholar 

  5. Li, J., Wang, J.Z.: Real-time Computerized Annotation of Pictures. IEEE Trans. Pattern Analysis and Machine Intelligence 30(6), 985–1002 (2008)

    Article  Google Scholar 

  6. Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: Proc. IEEE CVPR (2004)

    Google Scholar 

  7. Fleuret, F., Geman, D.: Stationary Features and Cat Detection. J. Machine Learning Research 9, 2549–2578 (2008)

    MathSciNet  MATH  Google Scholar 

  8. Von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI. Communications of the ACM 47(2), 57–60 (2004)

    Article  Google Scholar 

  9. Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Mishra, V., Rubenstein, D.: Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers. In: Proc. ACM CCS (2003)

    Google Scholar 

  10. Datta, R., Li, J., Wang, J.Z.: Imagination: a robust image based captcha generation system. In: Proceedings of the 13th Annual ACM International Conference on Multimedia (MULTIMEDIA 2005), pp. 331–334. ACM Press, New York (2005)

    Chapter  Google Scholar 

  11. Hall, R.V.: CAPTCHA as a web security control (2005), Published at www.RichHall.com

  12. The CAPTCHA project: completely automatic public Turing test to tell computers and humans apart. Department of Computer Science, Carnegie Mellon University (2000), http://www.captcha.net

  13. MicrosoftAsirra (2007), http://research.microsoft.com/asirra/

  14. KittenAuth (2007), http://www.thepcspy.com/kittenauth

  15. Baird, H.S., Riopka, T.: ScatterType:a Reading CAPTCHA Resistent to Segmentation Attack. In: Proc. of the IS&T/SPIE Document Recognition & Retrieval XII Conf., CA, pp. 197–207 (2005)

    Google Scholar 

  16. Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol. 3517, pp. 1–26. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Mori, S.G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: Proc. IEEE CVPR (2003)

    Google Scholar 

  18. Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press, New York (2002)

    Google Scholar 

  19. Turing, A.M.: Computing machinery and intelligence. Mind, LIX (59)(236), 433–460 (1950)

    Google Scholar 

  20. Son, R., Tiwari, B.D.: Improved CAPTCHA Method. International Journal of Computer Applications 1(25) (2010)

    Google Scholar 

  21. Gossweiler, R., Kamvar, M., Baluja, S.: A CAPTCHA based on Image Orientation. In: Proc. ACM (2009)

    Google Scholar 

  22. Babu, R., Kumar, K.P., Rao, S.: Implementation of Secure Multilayered CAPTCHA. IJAEST (6) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Raj, S.B.E., Jayanthi, V.S., Muthulakshmi, V. (2012). A Novel Architecture for the Generation of Picture Based CAPTCHA. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics