ABSTRACT
Current 2D CAPTCHA mechanisms can be easily defeated by character recognition and segmentation attacks by automated machines. Recently, 3D CAPTCHA schemes have been proposed to overcome the weaknesses of 2D CAPTCHA for a few websites. However, researchers also demonstrate the offline pre-processing techniques to break 3D CAPTCHA. In this work, we propose a novel 3D object based CAPTCHA scheme that projects the CAPTCHA image over a 3D object. We develop the prototype and present the proof-of-concept of 3D object based CAPTCHA scheme to protect websites against automated attacks.
- Mori, Greg, and Jitendra Malik. "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA." Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. Vol. 1. IEEE, 2003. Google ScholarDigital Library
- Imsamai, Montree, and Suphakant Phimoltares. "3D CAPTCHA: A next generation of the CAPTCHA." Information Science and Applications (ICISA), 2010 International Conference on. IEEE, 2010.Google Scholar
- Ross, Steven A., J. Alex Halderman, and Adam Finkelstein. "Sketcha: a CAPTCHA based on Line Drawings of 3D Models." Proceedings of the 19th international conference on World wide web. ACM, 2010. Google ScholarDigital Library
- Nguyen, Vu Duc, Yang-Wai Chow, and Willy Susilo. "Breaking a 3D-based CAPTCHA scheme." Information Security and Cryptology-ICISC 2011. Springer Berlin Heidelberg, 2012. 391--405. Google ScholarDigital Library
- ABBYY OCR Software, http://www.abbyy.comGoogle Scholar
- Yan, J. and El Ahmad A.S, Usability of CAPTCHAs or usability issues in CAPTCHA design.: Proc. Of 4th symposium on Usable Privacy and Security, ACM, 2008 Google ScholarDigital Library
Index Terms
- 3DOC: 3D object CAPTCHA
Recommendations
Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma
A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [102]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of ...
Mitigating DoS Using Sensing Keys
ICCS '12: Proceedings of the 2012 International Conference on Computing SciencesDenial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack against primary victim systems. In ...
Visual security is feeble for anti-phishing
ASID'09: Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communicationAddressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable ...
Comments