skip to main content
10.1145/2539150.2539221acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

A User-friendly Image-Text Fusion CAPTCHA for Secure Web Services

Authors Info & Claims
Published:02 December 2013Publication History

ABSTRACT

Although image-based CAPTCHAs have been introduced to overcome the security level limitation of the previous text-based CAPTCHAs, image-based CAPTCHAs still have problems such as user-unfriendliness in answer inference and wasted transmission cost. To cope with these issues, we propose a novel image-text fusion CAPTCHA model which uses a single image augmented with text hints that helps the users to guess the answers of the CAPTCHA problems more conveniently. According to the experiment results, the proposed CAPTCHA scheme has a higher correct answer rate than that of the previous scheme since the proposed scheme is able to help the users to infer the correct answer of the given CAPTCHA image more easily using the available text hints.

References

  1. Ahn, L., Blum, M. and Hopper, N. 2000. CAPTCHA: Telling Humans and Computers Apart Automatically. Retrieved 2011 from http://www.captcha.net/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yan, J. and El-Ahmad, A. S. 2008. A Low-cost Attack on a Microsoft CAPTCHA. Research Paper. School of Computing Science, Newcastle University, UK.Google ScholarGoogle Scholar
  3. Chellapilla, K. and Simard, P. Y. 2004. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). Advances in Neural Information Processing Systems, Vol. 17. MIT Press, 265--272.Google ScholarGoogle Scholar
  4. Chew, M. and Tygar, J. D. 2004. Image Recognition CAPTCHAs. In Proceedings of the 7th International Information Security Conference. 268--279.Google ScholarGoogle Scholar
  5. Elson, J., Douceur, J. R. and Howell, J. 2007. Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization. In Proceedings of the 14th ACM Conference on Computer and Communications Security. 535--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Warner, O. THEPCSpy: KittenAuth. Retrieved 2011 from http://www.thepcspy.com/.Google ScholarGoogle Scholar
  7. Datta, R., Li, J. and Wang, J. Z. 2005. IMAGINATION: A Robust Image-based CAPTCHA Generation System. In Proceedings of the 13th ACM International Conference on Multimedia. 331--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Zhu, B. B., Yan, J., Li, Q. et al. 2011. Attacks and Design of Image Recognition CAPTCHAs. In Proceedings of the 17th ACM Conference on Computer and Communications Security. 187--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rui, Y. and Liu, Z. 2004. ARTiFACIAL: Automated reverse Tuning test using FACIAL features. In Proceedings of the 11th ACM International Conference on Multimedia. 295--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Google Mail Service. https://mail.google.com/.Google ScholarGoogle Scholar
  11. Golle, P. 2008. Machine Learning Attacks against the Asirra CAPTCHA. In Proceedings of the 15th ACM Conference on Computer and Communications Security. 535--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Barnard, K., Duygulu, P., Forsyth, D., de Freitas, N., Blei, D. and Jordan, M. 2002. Matching words and pictures. Machine Learning Research Journal, Vol. 3, 1107--1135. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A User-friendly Image-Text Fusion CAPTCHA for Secure Web Services

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IIWAS '13: Proceedings of International Conference on Information Integration and Web-based Applications & Services
        December 2013
        753 pages
        ISBN:9781450321136
        DOI:10.1145/2539150

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 December 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader