Open Access   Article Go Back

Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters

Dayanand 1 , Wilson Jeberson2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 993-998, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.993998

Online published on Dec 31, 2018

Copyright © Dayanand, Wilson Jeberson . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dayanand, Wilson Jeberson, “Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.993-998, 2018.

MLA Style Citation: Dayanand, Wilson Jeberson "Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters." International Journal of Computer Sciences and Engineering 6.12 (2018): 993-998.

APA Style Citation: Dayanand, Wilson Jeberson, (2018). Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters. International Journal of Computer Sciences and Engineering, 6(12), 993-998.

BibTex Style Citation:
@article{Jeberson_2018,
author = {Dayanand, Wilson Jeberson},
title = {Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {993-998},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5660},
doi = {https://doi.org/10.26438/ijcse/v6i12.993998}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.993998}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5660
TI - Analysis of CAPTCHA Breakage- Employing Object Detection Deep Learning Methods to Identify CAPTCHA Characters
T2 - International Journal of Computer Sciences and Engineering
AU - Dayanand, Wilson Jeberson
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 993-998
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
26 24 downloads 5 downloads
  
  
           

Abstract

This research paper delves into the analysis of CAPTCHA breakage through the utilization of object detection deep learning techniques aimed at identifying CAPTCHA characters. CAPTCHAs, designed to differentiate between humans and bots, are widely used as a security measure on various online platforms. However, the effectiveness of traditional CAPTCHAs has been challenged by advancements in machine learning and artificial intelligence. This study explores the application of object detection methods within deep learning frameworks to bypass CAPTCHA security measures. Specifically, convolutional neural networks (CNNs) and other deep learning architectures are employed to detect and classify CAPTCHA characters, thus undermining their intended purpose. The research investigates the efficacy of these techniques in circumventing CAPTCHA challenges and analyzes the implications for online security. Through experimentation and evaluation, insights are gained into the vulnerabilities of current CAPTCHA systems and the potential threats posed by sophisticated machine learning algorithms. Additionally, considerations are made regarding the development of more robust CAPTCHA mechanisms to mitigate the risk of exploitation.

Key-Words / Index Term

Deep learning Techniques, CNN, CAPTCHA, Machine Learning, Artificial Intelligence

References

[1] On Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, 321(5895), pp.1465-1468, 2008. DOI: 10.1126/science.1160379.
[2] Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., ... & Rabinovich, A. Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.1-9, 2015.
[3] He, K., Zhang, X., Ren, S., & Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.770-778, 2016.
[4] Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning (Vol. 1). MIT press Cambridge, 2016.
[5] Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.779-788, 2016.
[6] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[7] von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, 321(5895), pp.1465-1468, 2008. DOI: 10.1126/science.1160379.
[8] Hasegawa, T., Mori, G., & Sato, Y. Real-time HMM-based CAPTCHA breaking with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.5201-5209, 2016.
[9] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce, pp.266-275, 2005.
[10] Yamaguchi, Y., Uchida, S., & Iwamura, M. A proof of work with low difficulty by solving simultaneous linear equations for CAPTCHA. In Proceedings of the International Conference on Image Processing, pp.3674-3678, 2014.
[11] Zhang, Z., & Zhang, J. Breaking color-based image CAPTCHA with convolutional neural networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.1415-1423, 2012.
[12] Elson, J., Douceur, J. R., Howell, J., & Saul, J. Asirra: A CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the ACM Conference on Computer and Communications Security, pp.366-374, 2007.
[13] Gao, H., & Ye, W. Robust CAPTCHA based on adversarial examples. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.159-164, 2015.
[14] Mityagin, A., & Pasko, I. Towards understanding of social network CAPTCHA security. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications, pp.817-824, 2017.
[15] Jansen, Y., Knijnenburg, B., & Pieterse, V. (2011). Towards human-friendly CAPTCHA design. In Proceedings of the 3rd Symposium on Usable Privacy and Security (pp. 12:1-12:12).
[16] Mohaisen, A., Alrawi, O., & Chen, Y. (2015). Honeybot Captcha: Human Interactive Proofs Based on Entropy Measurement. IEEE Transactions on Information Forensics and Security, 10(12), 2646-2657. DOI: 10.1109/TIFS.2015.2457083.
[17] Gafurov, D., & Bours, P. (2011). Time-Based CAPTCHA: A Comparative Analysis of Existing Techniques. In Proceedings of the 3rd International Conference on Intelligent Networking and Collaborative Systems (pp. 379-385). DOI: 10.1109/INCOS.2011.94.
[18] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. (2014). The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 541-552).
[19] Hasegawa, T., Mori, G., & Sato, Y. (2016). Real-time HMM-based CAPTCHA breaking with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 5201-5209).
[20] Yan, J., & El Ahmad, A. S. (2012). A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 103-114).
[21] Mori, G., Malik, J., & Ren, X. (2003). Recovering human body configurations: Combining segmentation and recognition. In Proceedings of the IEEE International Conference on Computer Vision (pp. 326-333).
[22] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. (2005). Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce (pp. 266-275).
[23] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[24] Yan, J., & El Ahmad, A. S. A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security, pp.103-114, 2012.
[25] Chellapilla, K., Larson, K., Simard, P., & Czerwinski, M. Designing human-friendly human interaction proofs (HIPs). In Proceedings of the 8th Conference on Electronic Commerce, pp.266-275, 2005.
[26] Yan, J., & El Ahmad, A. S. A low-cost attack on a Microsoft CAPTCHA. In Proceedings of the 18th ACM conference on Computer and communications security, pp.103-114, 2012.
[27] Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. The end is nigh: Generic solving of text-based CAPTCHAs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.541-552, 2014.
[28] He, K., Gkioxari, G., Dollár, P., & Girshick, R. Mask R-CNN. In Proceedings of the IEEE international conference on computer vision, pp.2961-2969, 2017.
[29] Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.779-788, 2016.
[30] Lin, T. Y., Dollár, P., Girshick, R., He, K., Hariharan, B., & Belongie, S. Feature pyramid networks for object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.2117-2125, 2017.
[31] Szegedy, C., Ioffe, S., Vanhoucke, V., & Alemi, A. A. Inception-v4, inception-resnet and the impact of residual connections on learning. In Proceedings of the AAAI conference on artificial intelligence,Vol.4, pp.12, 2017.