Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique

Published: 01 December 2015 Publication History

Abstract

CAPTCHA is a security technique to allow a computer application to distinguish between computer and human access. Most of now a day CAPTCHA words have their characters connected together which makes them very difficult to be segmented and recognized. In this paper we present an efficient technique that first benefits from the intersections between characters in a word and then segment it based on the recognition of each segmented character. Edge corners ECs are used in both segmentation and recognition phases. A novel fuzzy logic-based scheme is proposed to match characters using their ECs. Experimental results show the efficiency of the proposed scheme in terms of success rate using a large set of CAPTCHA's words. Copyright © 2015 John Wiley & Sons, Ltd.

References

[1]
<familyNamePrefix>von</familyNamePrefix>Ahn L, Blum M, Langford J. Telling humans and computer apart automatically, Comm. of the ACM, 46, Aug. 2003.
[2]
Yan J, El Ahmad AS. A low-cost attack on a Microsoft CAPTCHA, 15th ACM Conference on Computer and Communications Security CCS'08. Virginia, USA, Oct 27-31, 2008.
[3]
Chellapilla K, Larson K, Simard P, Czerwinski M. Designing human friendly human interaction proofs, ACM CHI'05, 2005.
[4]
Chellapilla K, Larson K, Simard P, Czerwinski M. Building segmentation based human-friendly human interaction proofs, 2nd Int'l Workshop on Human Interaction Proofs, Springer-Verlag, LNCS 3517, 2005.
[5]
Chellapilla K, Simard P. Using machine learning to break visual human interaction proofs, Neural Information Processing Systems NIPS, MIT Press, 2004.
[6]
Chellapilla K, Larson K, Simard P, Czerwinski M. Computers beat humans at single character recognition in reading-based Human Interaction Proofs, In 2nd Conference on Email and Anti-Spam CEAS'05, 2005.
[7]
Nachar R, Inaty E, Bonnin P, Alayli Y. A robust edge based corner detector, 17th IEEE Mediterranean Electrotechnical Conference, Beirut, Lebanon, pp: 242-246, April 13-16, 2014.
[8]
Nachar R, Inaty E, Bonnin P, Alayli Y. Image registration based on edge dominant corners, 9th International Conference on Computer Vision, Theory and Applications, Lisbon, Portugal, pp: 433-440, January 5-8, 2014.
[9]
Nachar R, Inaty E, Bonnin P, Alayli Y. Polygonal approximation of an object contour by detecting edge dominant corners using iterative corner suppression, 9th International Conference on Computer Vision, Theory and Applications, Lisbon, Portugal, pp: 247-256, January 5-8, 2014.
[10]
Ahn L, Blum M, Hopper NJ, Langford J. CAPTCHA: using hard AI problems for security, 22nd international conference on Theory and applications of cryptographic techniques, Springer-Verlag, Berlin, 2003
[11]
Pope C, Kaur K. Is it human or computer? Defending E-commerce with CAPTCHA, IEEE IT Professional, March 2005.
[12]
Yan J, El Ahmad AS. A low-cost attack on a Microsoft CAPTCHA, 15th ACM Conference on Computer and Communications Security CCS'08. Virginia, USA, Oct 27-31, 2008.
[13]
Yan J, El Ahmad AS. Breaking visual CAPTCHAs with naïve pattern recognition algorithms, in Proc. of the 23rd Annual Computer Security Applications Conference ACSAC'07. FL, IEEE computer society, USA, Dec 2007.
[14]
Mori G, Malik J. Recognizing objects in adversarial clutter: breaking a visual CAPTCHA, IEEE Conference on Computer Vision and Pattern Recognition CVPR'03, June 2003.
[15]
Chellapilla K, Simard P, Using machine learning to break visual human interaction proofs, Neural Information Processing Systems NIPS, MIT Press, 2004.
[16]
Moy G, Jones N, Harkless C, Potter R. Distortion estimation techniques in solving visual CAPTCHAs, IEEE CVPR, 2004.
[17]
Casey. Using AI to beat CAPTCHA and post comment spam, "http://www.mperfect.net/aiCaptcha/", 2005.
[18]
Gao H, Wang W, Fan Y. Divide and conquer: an efficient attack on Yahoo! CAPTCHA, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
[19]
Zjmmermann H. Fuzzy set theory and its applications 2nd edn. Allied Publishers Ltd and Kluwer Academic Publishers: New Delhi, 1996.
[20]
Maulik U, Bandyopadhyay S. Genetic algorithm based clustering technique. Pattern Recognition 2000; Volume 33: pp.1455-1465.
[21]
Bezdek C. "Pattern recognition with fuzzy objective function algorithms ", 1981.
[22]
Suresh K, Mohana R, RamaMohanReddy A. An improved FCM algorithm for clustering on Web usage mining. IJCSI International Journal of Computer Science Issues 2011; Volume 8 Issue 1: pp.42-46.
[23]
Kalti K, Mahjoub M. Image segmentation by Gaussian mixture models and modified FCM algorithm. The International Arab Journal of Information Technology 2014; Volume 11 Issue 1: pp.11-18.
[24]
Fonseca M, Jorge J. Using fuzzy logic to recognize geometric shapes interactively, the Ninth IEEE International Conference on Fuzzy Systems, vol. 1, pp. 291-296, 2000.
[25]
Rourke J. Computational geometry in C 2nd edn. Cambridge University Press: New York, 1998.
[26]
Sasi S, Bedi J. Handwritten character recognition using fuzzy logic, Proceedings of the 37th Midwest Symposium on Circuits and Systems, 1994.
[27]
Simare P, Steinkraus D, Platt J. Best practices for convolutional neural networks applied to visual document analysis, Proceedings of the Seventh International Conference on Document Analysis and Recognition ICDAR'03, 2003.
[28]
Koerich A, Sabourin R, Suen C. Recognition and verification of unconstrained handwritten words. IEEE Transaction on Pattern Analysis and Machine Intelligence 2015; Volume 27 Issue 10: pp.1509-1522.
[29]
Kaur G, Aggarwal M. Artificial intelligent system for character recognition using Levenberg-Marquardt algorithm. International Journal of Advanced Research in Computer Science and Software Engineering 2012; Volume 2.
[30]
Barve S. Optical character recognition using artificial neural networks. International Journal of Advanced Technology & Engineering Research IJATER 2012; Volume 2: pp.139-142.
[31]
"https://www.usenix.org/conference/woot14/workshop-program/presentation/bursztein"
[32]
Bursztein E, Martin M, Mitchell J. Text-based captcha strengths and weaknesses. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, New York, NY, USA, pages 125-138, 2011.
[33]
Kirsch R. Computer determination of the constituent structure of biological images. Computers and Biomedical Research 1971; Volume 4: pp.315-328.
[34]
Freeman H, Davis LS. In a corner finding algorithm for chain coded curves. IEEE Transaction in Computing 1977; Volume 26: pp.297-303.
[35]
"https://edit.yahoo.com/registration?.intl=us&new=1&.done=http%3A//mail.yahoo.com&.src=ym&.v=0&.u=ak37rod3tebb2&partner=&.partner=&pkg=&stepid=&.p=&promo=&.last=#"
[36]
Zhao J, Bose BK. Evaluation of membership functions for fuzzy logic controlled induction motor drive, 28th Annual Conference of the Industrial Electronics Society, IEEE, vol. 1, pp. 229-234, 2002.
[37]
Garibaldi J, John R. Choosing membership functions of linguistic terms, the 12th IEEE International Conference on Fuzzy Systems, vol. 1, pp. 578-583, 2003.
[38]
Deriche R. Fast algorithms for low-level vision. IEEE Trans. on PAMI 1990; Volume 12 Issue 1: pp.78-87.

Cited By

View all
  • (2021)Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer DilemmaACM Computing Surveys10.1145/347714254:9(1-33)Online publication date: 8-Oct-2021
  1. Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Security and Communication Networks
    Security and Communication Networks  Volume 8, Issue 18
    December 2015
    1151 pages
    ISSN:1939-0114
    EISSN:1939-0122
    Issue’s Table of Contents

    Publisher

    John Wiley & Sons, Inc.

    United States

    Publication History

    Published: 01 December 2015

    Author Tags

    1. CAPTCHA
    2. edge dominant corners
    3. fuzzy logic
    4. recognition
    5. security technique
    6. segmentation

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer DilemmaACM Computing Surveys10.1145/347714254:9(1-33)Online publication date: 8-Oct-2021

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media