Survey of Text CAPTCHA Techniques and Attacks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2015 by IJETT Journal
Volume-22 Number-6
Year of Publication : 2015
Authors : Simran Sharma, Nidhi Seth
DOI :  10.14445/22315381/IJETT-V22P251


Simran Sharma, Nidhi Seth"Survey of Text CAPTCHA Techniques and Attacks", International Journal of Engineering Trends and Technology (IJETT), V22(6),240-245 April 2015. ISSN:2231-5381. published by seventh sense research group

CAPTCHA is a challenge-response test most often placed within web forms to determine whether the user is human. The purpose of CAPTCHA is to block automated scripts that post spam content everywhere they can. This paper presents a survey of Optical Character Recognition applications and further focuses on three important applications of Optical Character Recognition, CAPTCHAS. There is a constant need to improve current CAPTCHAs and to develop new CAPTCHAs in order to safely secure against developing programs which can create thousands of e-mail accounts used for malicious purposes, stuff online polls with ballots, and develop worms and viruses contained in emails.


[1]. Motoyama, Marti, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. "Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context." In USENIX Security Symposium, vol. 10, pp. 4-1. 2010.
[2]. Von Ahn, Luis, Manuel Blum, Nicholas J. Hopper, and John Langford. "CAPTCHA: Using hard AI problems for security." In Advances in Cryptology—EUROCRYPT 2003, pp. 294-311. Springer Berlin Heidelberg, 2003.
[3]. Doan, anhai, raghuramakrishnan, and alon y. Halevy. "crowdsourcing systems on the world-wide web." communications of the acm 54, no. 4 (2011): 86-96.
[4]. Mori, Shunji, Hirobumi Nishida, and Hiromitsu Yamada. Optical character recognition. John Wiley & Sons, Inc., 1999.
[5]. Smith, Ray. "An Overview of the Tesseract OCR Engine." In ICDAR, vol. 7, pp. 629-633. 2007.
[6]. Tamang, Tsheten, and PattarasineeBhattarakosol. "Uncover impact factors of text-based CAPTCHA identification." In Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, pp. 556-560. IEEE, 2012.
[7]. Kuo-Feng Hwang, Cian-Cih Huang, and Geeng-Neng You. "A Spelling based CAPTCHA system by using click." In Biometrics and Security Technologies (ISBAST), 2012 International Symposium on, pp. 1-8. IEEE, 2012.
[8]. Saxena, Ashutosh, Nitin Singh Chauhan, K. R. Sravan, AparajithSrinivasanVangal, and David Palacios Rodrguez. "A new scheme for mobile based CAPTCHA service on Cloud." In Cloud Computing in Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1-6. IEEE, 2012.
[9]. D`Souza, Darryl, Phani C. Polina, and Roman V. Yampolskiy. "Avatar captcha: Telling computers and humans apart via face classification." In Electro/Information Technology (EIT), 2012 IEEE International Conference on, pp. 1-6. IEEE, 2012.
[10]. Kiran Jain Azad, "CAPTCHA: Attacks and weaknesses against OCR Technology." Global Journal of Computer Science and Technology 13, no. 3 (2013).
[11]. Achint Thomas, KunalPunera, Lyndon Kennedy, Belle Tseng, and Yi Chang. "Framework for evaluation of text captchas." In Proceedings of the 22nd international conference on World Wide Web companion, pp. 159-160. International World Wide Web Conferences Steering Committee, 2013.
[12]. Ye, Quan-Bin, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, and Kuo- Ping Wu. "DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks." In Technologies and Applications of Artificial Intelligence (TAAI), 2013 Conference on, pp. 158-163. IEEE, 2013.
[13]. Men, Tao, Deming Wang, Yan Sun, and Mingrong Wang. "A novel dynamic CAPTCHA based on inverted colors." In Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd International Symposium on, pp. 796-799. IEEE, 2013.
[14]. YunhangShen, RongrongJi, Donglin Cao, and Min Wang. "Hacking Chinese Touclick CAPTCHA by Multi-Scale Corner Structure Model with Fast Pattern Matching." In Proceedings of the ACM International Conference on Multimedia, pp. 853-856. ACM, 2014.
[15]. Max Jaderberg, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. "Synthetic data and artificial neural networks for natural scene text recognition." arXiv preprint arXiv:1406.2227 (2014).
[16]. Min Wang, Tianhui Zhang, Wenrong Jiang, and Hao Song. "The recognition of CAPTCHA." Journal of Computer and Communications 2, no. 02 (2014): 14.
[17]. HaichangGao, Wei Wang, Ye Fan, Jiao Qi, and Xiyang Liu. "The Robustness of ?Connecting Characters Together? CAPTCHAs." Journal of Information Science and Engineering 30, no. 2 (2014): 347-369.
[18]. AriyanZarei, "Improve CAPTCHA`s Security Using Gaussian Blur Filter." arXiv preprint arXiv:1410.4441 (2014).
[19]. Zhu, B., Jeff Yan, GuanboBao, M. Mao, and NingXu. "Captcha as Graphical Passwords–A New Security Primitive Based on Hard AI Problems." (2014): 1-1.
[20]. Carlos Javier Hernández-Castro, David F. Barrero, and María D. RMoreno. "A Machine Learning Attack against the Civil Rights CAPTCHA." In Intelligent Distributed Computing VIII, pp. 239-248. Springer International Publishing, 2015.
[21]. Miss. Desai Sucheta ,Miss.AnushkaPawar, Miss.RenusheTejasvita, Mr.Naik L. S. ?Survey on Dos Attack detecton: Location guard and Captcha." In Rajendra Mane College of Engineering & Technology, Ambav, Devrukh. In International Journal of Engineering Trends and Technology (IJETT) – Volume22 Number 4- April2015.

HIP, Challenge Response, CAPTCHAS, OCR, Security.