skip to main content
10.1145/1755688.1755736acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Scene tagging: image-based CAPTCHA using image composition and object relationships

Published:13 April 2010Publication History

ABSTRACT

In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an image that is automatically generated via composition of a background image with multiple irregularly shaped object images, resulting in a large space of possible images and questions without requiring a large object database. This composition process is accompanied by a carefully designed sequence of systematic image distortions that makes it difficult for automated attacks to locate/identify objects present. Automated attacks must recognize all or most objects contained in the image in order to answer a question correctly, thus the proposed approach reduces attack success rates. An experimental study using several widely-used object recognition algorithms (PWD-based template matching, SIFT, SURF) shows that the system is resistant to these attacks with a 2% attack success rate, while a user study shows that the task required can be performed by average users with a 97% success rate.

References

  1. L. von Ahn, M. Blum, and J. Langford. Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI. Comm. of the ACM, 47 (2), 57--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. S. Baird and J. L. Bentley. Implicit Captchas. In Proceedings of the IST SPIE Document Recognition and Retrieval XII Conference, (San Jose, CA, 2005), vol. 5676.Google ScholarGoogle Scholar
  3. Bay, H., Ess, A., Tuytelaars, T., and Van Gool, L. 2008. Speeded-Up Robust Features (SURF). Comput. Vis. Image Underst. 110, 3 (Jun. 2008), 346--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Budanitsky, A., Hirst, G. Semantic distance in WordNet: An experimental, application--oriented evaluation of five measures. In Proceedings of the North American Chapter of the Association for Computational Linguistics Workshop (Pittsburgh, PA, USA, 2001), 29--34.Google ScholarGoogle Scholar
  5. Chellapilla, K., and Simard, P. Y. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). Advances in Neural Information Processing Systems 17, 265--272.Google ScholarGoogle Scholar
  6. M. Chew and J. D. Tygar. Image Recognition CAPTCHAs. In Proceedings of the 7th Annual Information Security Conference (Palo Alto, CA, USA, 2004), 268--279.Google ScholarGoogle ScholarCross RefCross Ref
  7. Datta, R., Li, J., and Wang, J. Z. IMAGINATION: a robust image-based CAPTCHA generation system. In Proceedings of the 13th Annual ACM international Conference on Multimedia (Hilton, Singapore, 2005), 331--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Datta, R., Li, J., and Wang, J. Z. Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs. IEEE Transactions on Information Forensics and Security, 4 (3), 504--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Elson, J., Douceur, J. R., Howell, J., and Saul, J. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2007), 366--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Golle, P. 2008. Machine learning attacks against the Asirra CAPTCHA. In Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008), 535--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gossweiler, R., Kamvar, M., and Baluja, S. 2009. What's up CAPTCHA?: a CAPTCHA based on image orientation. In Proceedings of the 18th international Conference on World Wide Web (Madrid, Spain, 2009), 841--850 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lowe, D. G. 2004. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vision 60, 2 (Nov. 2004), 91--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mikolajczyk, K. and Schmid, C. 2005. A Performance Evaluation of Local Descriptors. IEEE Trans. Pattern Anal. Mach. Intell. 27, 10 (Oct. 2005), 1615--1630. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. A. Miller. 1990. Wordnet: a lexical database for English. International Journal of Lexicography, 3 (4), 235--244.Google ScholarGoogle ScholarCross RefCross Ref
  15. Moy, G., Jones, N., Harkless, C., and Potter, R. Distortion Estimation Techniques in Solving Visual CAPTCHAs. In IEEE CVPR, (Washington, D.C., USA, 2004), Vol. 2, 23--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wolberg, G. Digital Image Warping. IEEE Computer Society Press, Los Alamitos, CA, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yan, J. and El Ahmad, A. S. 2008. A low-cost attack on a Microsoft captcha. In Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008), 543--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yan, J. and El Ahmad, A. S. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, 2008), Vol. 337, 44--52 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Scene tagging: image-based CAPTCHA using image composition and object relationships

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
        April 2010
        363 pages
        ISBN:9781605589367
        DOI:10.1145/1755688

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ASIACCS '10 Paper Acceptance Rate25of166submissions,15%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader