skip to main content
10.1145/3660853.3660927acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaicconfConference Proceedingsconference-collections
research-article

Image-Based CAPTCHA Recognition Using Deep Learning Models

Published: 23 June 2024 Publication History

Abstract

This study dives into the efficacy of deep learning models within the field of CAPTCHA recognition, with a primary focus on bolstering online security measures. Our inquiry suggests a unique perspective by using Convolutional Neural Networks (CNNs) to recognize and categorize CAPTCHA images appropriately. The procedural methodology comprises preprocessing these images and training CNN models to partition them into discrete groups. Through thorough experimentation and assessment, our proposed methodology exposes promising outcomes, as notably shown by our CNN Model 4 obtaining an amazing accuracy rate of 96%. These results demonstrate the usefulness of deep learning algorithms in the field of CAPTCHA detection. while stressing their crucial function in decreasing cybersecurity concerns. This study adds greatly to the development of CAPTCHA recognition systems. highlighting the criticality of deploying deep learning models to enhance internet security procedures.
CCS CONCEPTS • Machine learning • Artificial intelligence • Visualization
Additional Keywords and Phrases: Deep learning, CAPTCHA recognition, Convolutional Neural Networks (CNN), Image.

References

[1]
Gao, H., Wang, X., Cao, F., Zhang, Z., Lei, L., Qi, J., & Liu, X. (2016). Robustness of text‐based completely automated public turing test to tell computers and humans apart. IET Information Security, 10(1), 45-52.
[2]
Kouritzin, M. A., Newton, F., & Wu, B. (2012). On random field completely automated public turing test to tell computers and humans apart generation. IEEE transactions on image processing, 22(4), 1656-1666.
[3]
Singh, K., & Saha, S. (2014). Cracking Captcha Completely Automated Public Turing Test to Tell Computers and Humans Apart.
[4]
Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). recaptcha: Human-based character recognition via web security measures. Science, 321(5895), 1465-1468.
[5]
Pope, C., & Kaur, K. (2005). Is it human or computer? Defending E-commerce with Captchas. IT professional, 7(2), 43-49.
[6]
Guerar, M., Merlo, A., & Migliardi, M. (2018). Completely automated public physical test to tell computers and humans apart: A usability study on mobile devices. Future Generation Computer Systems, 82, 617-630.
[7]
Guerar, M., Migliardi, M., Merlo, A., Benmohammed, M., & Messabih, B. (2015, July). A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices. In 2015 International Conference on High Performance Computing & Simulation (HPCS) (pp. 203-210). IEEE.
[8]
Xu, X., Liu, L., & Li, B. (2020). A survey of CAPTCHA technologies to distinguish between human and computer. Neurocomputing, 408, 292-307.
[9]
Stark, F., Hazırbas, C., Triebel, R., & Cremers, D. (2015, October). Captcha recognition with active deep learning. In Workshop new challenges in neural computation (Vol. 2015, p. 94).
[10]
Zhu, B. B., Yan, J., Bao, G., Yang, M., & Xu, N. (2014). Captcha as graphical passwords—A new security primitive based on hard AI problems. IEEE transactions on information forensics and security, 9(6), 891-904.
[11]
Hernandez-Castro, C. J., & Ribagorda, A. (2010). Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. computers & security, 29(1), 141-157.
[12]
Lorenzi, D., Vaidya, J., Uzun, E., Sural, S., & Atluri, V. (2012, December). Attacking image based captchas using image recognition techniques. In International Conference on Information Systems Security (pp. 327-342). Berlin, Heidelberg: Springer Berlin Heidelberg.
[13]
Chow, Y. W., Susilo, W., & Thorncharoensri, P. (2019). CAPTCHA design and security issues. Advances in Cyber Security: Principles, Techniques, and Applications, 69-92.
[14]
Longe, O. B., Robert, A. B. C., & Onwudebelu, U. (2009, January). Checking Internet masquerading using multiple CAPTCHA challenge-response systems. In 2009 2nd International Conference on Adaptive Science & Technology (ICAST) (pp. 244-249). IEEE.
[15]
Guerar, M., Verderame, L., Migliardi, M., Palmieri, F., & Merlo, A. (2021). Gotta CAPTCHA'Em all: a survey of 20 Years of the human-or-computer Dilemma. ACM Computing Surveys (CSUR), 54(9), 1-33.
[16]
Noury, Z., & Rezaei, M. (2020). Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment. arXiv preprint arXiv:2006.08296.
[17]
Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., & Wang, P. (2018). Research on deep learning techniques in breaking text-based captchas and designing image-based captcha. IEEE Transactions on Information Forensics and Security, 13(10), 2522-2537.
[18]
Thobhani, A., Gao, M., Hawbani, A., Ali, S. T. M., & Abdussalam, A. (2020). CAPTCHA recognition using deep learning with attached binary images. Electronics, 9(9), 1522.
[19]
Stark, F., Hazırbas, C., Triebel, R., & Cremers, D. (2015, October). Captcha recognition with active deep learning. In Workshop new challenges in neural computation (Vol. 2015, p. 94).
[20]
Sivakorn, S., Polakis, I., & Keromytis, A. D. (2016, March). I am robot:(deep) learning to break semantic image captchas. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 388-403). IEEE.
[21]
Kumar, M., Jindal, M. K., & Kumar, M. (2022). A systematic survey on CAPTCHA recognition: types, creation and breaking techniques. Archives of Computational Methods in Engineering, 29(2), 1107-1136.
[22]
Zhang, X., Liu, X., Sarkodie-Gyan, T., & Li, Z. (2021). Development of a character CAPTCHA recognition system for the visually impaired community using deep learning. Machine vision and applications, 32(1), 29.
[23]
Nian, J., Wang, P., Gao, H., & Guo, X. (2022). A deep learning‐based attack on text CAPTCHAs by using object detection techniques. IET Information Security, 16(2), 97-110.
[24]
B. T. Yaseen, S. Kurnaz, and S. R. Ahmed, “Detecting and Classifying Drug Interaction using Data mining Techniques,” 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Oct. 2022.‏
[25]
S. R. Ahmed, A. K. Ahmed, and S. J. Jwmaa, “Analyzing The Employee Turnover by Using Decision Tree Algorithm,” 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2023.‏
[26]
S. R. Ahmed and E. Sonuç, “Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection,” Soft Computing, Oct. 2023.
[27]
N. Z. Mahmood, S. R. Ahmed, A. F. Al-Hayaly, S. Algburi and J. Rasheed, "The Evolution of Administrative Information Systems: Assessing the Revolutionary Impact of Artificial Intelligence," 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-7.
[28]
B. A. Abubaker, S. R. Ahmed, A. T. Guron, M. Fadhil, S. Algburi, and B. F. Abdulrahman, “Spiking Neural Network for Enhanced Mobile Robots’ Navigation Control,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[29]
K. Ahmed, S. Q. Younus, S. R. Ahmed, S. Algburi, and M. A. Fadhel, “A Machine Learning Approach to Employee Performance Prediction within Administrative Information Systems,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[30]
M. H. B. A. Alkareem, F. Q. Nasif, S. R. Ahmed, L. D. Miran, S. Algburi, and M. T. ALmashhadany, “Linguistics for Crimes in the World by AI-Based Cyber Security,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[31]
S. R. Ahmed AHMED, I. Ahmed Najm, A. Talib Abdulqader, and K. Basem Fadhil, “Energy improvement using Massive MIMO for soft cell in cellular communication,” IOP Conference Series: Materials Science and Engineering, vol. 928, no. 3, p. 032009, Nov. 2020.
[32]
https://datasetninja.com/google-recaptcha-image

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AICCONF '24: Proceedings of the Cognitive Models and Artificial Intelligence Conference
May 2024
367 pages
ISBN:9798400716928
DOI:10.1145/3660853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AICCONF '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 98
    Total Downloads
  • Downloads (Last 12 months)98
  • Downloads (Last 6 weeks)16
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media