Skip to main content
Top
Published in: Multimedia Systems 6/2018

21-03-2018 | Regular Paper

Association rule mining for the usability of the CAPTCHA interfaces: a new study of multimedia systems

Authors: Darko Brodić, Alessia Amelio

Published in: Multimedia Systems | Issue 6/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents an analysis of the CAPTCHA interfaces in terms of their usability to Internet users. The usability is represented by the time needed to the users for finding a solution to the CAPTCHA, which is called response time. Specifically, the analysis is focused on four examples of text and image-based CAPTCHA. The aim is to study the cognitive factors influencing the Internet users in finding a solution to these four CAPTCHA types. Accordingly, an experiment is conducted on 100 Internet users, characterized by demographic factors, such as age, gender, Internet experience, and education level. Each user is asked to solve the four CAPTCHA types, and the response time for each of them is registered. Collected data including demographic factors and response time is subjected to association rule mining, using the FP-Growth algorithm for extracting the association rules. They show the dependence of the response time on the co-occurrence of the demographic factors. Also, an additional statistical analysis is performed using the nonparametric one-way Kruskal Wallis’ test. Experiments comparing the proposed method with the earlier studies of the CAPTCHA usability show the novelty of the method for the understanding of usability of CAPTCHA interfaces, which is based on the cognitive factors that influence the response time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ahn, L.V., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard ai problems for security. In: Proceedings of the 22nd International conference on theory and applications of cryptographic techniques, EUROCRYPT’03. LNCS, vol. 2656, 4–8 May 2003, Warsaw, Poland. Springer, Berlin, Heidelberg, pp. 294–311 (2003) Ahn, L.V., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard ai problems for security. In: Proceedings of the 22nd International conference on theory and applications of cryptographic techniques, EUROCRYPT’03. LNCS, vol. 2656, 4–8 May 2003, Warsaw, Poland. Springer, Berlin, Heidelberg, pp. 294–311 (2003)
2.
go back to reference Turing, A.M.: Computers & thought. chap. Computing Machinery and Intelligence. MIT Press, Cambridge, pp. 11–35 (1995). Turing, A.M.: Computers & thought. chap. Computing Machinery and Intelligence. MIT Press, Cambridge, pp. 11–35 (1995).
3.
go back to reference von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56–60 (2004)CrossRef von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56–60 (2004)CrossRef
4.
go back to reference Baecher, P., Fischlin, M., Gordon, L., Langenberg, R., Lützow, M., Schröder, D.: Captchas: the good, the bad, and the ugly. In: Freiling, F.C. (ed.) Sicherheit 2010. Lecture Notes in Informatics, vol. 170, 5–7 October 2010, Berlin, Germany, pp. 353–365 (2010) Baecher, P., Fischlin, M., Gordon, L., Langenberg, R., Lützow, M., Schröder, D.: Captchas: the good, the bad, and the ugly. In: Freiling, F.C. (ed.) Sicherheit 2010. Lecture Notes in Informatics, vol. 170, 5–7 October 2010, Berlin, Germany, pp. 353–365 (2010)
7.
go back to reference Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (hips). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’05. ACM, New York, pp. 711–720 (2005) Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (hips). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’05. ACM, New York, pp. 711–720 (2005)
8.
go back to reference Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS ’08. ACM, New York, pp. 44–52 (2008) Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS ’08. ACM, New York, pp. 44–52 (2008)
9.
go back to reference Ho, C.J., Wu, C.C., Chen, K.T., Lei, C.L.: Deviltyper: A game for captcha usability evaluation. ACM Comput. Entertain. 9, 3 (2011)CrossRef Ho, C.J., Wu, C.C., Chen, K.T., Lei, C.L.: Deviltyper: A game for captcha usability evaluation. ACM Comput. Entertain. 9, 3 (2011)CrossRef
10.
go back to reference Reynaga, G., Chiasson, S., van Oorschot, P.C.: Exploring the usability of captchas on smartphones: comparisons and recommendations. In: NDSS workshop on usable security (USEC), 8–11 February 2015, San Diego, California, USA, Internet Society (2015) Reynaga, G., Chiasson, S., van Oorschot, P.C.: Exploring the usability of captchas on smartphones: comparisons and recommendations. In: NDSS workshop on usable security (USEC), 8–11 February 2015, San Diego, California, USA, Internet Society (2015)
11.
go back to reference Sachdeva, N., Saxena, N., Kumaraguru, P.: On the viability of captchas for use in telephony systems: a usability field study. In: Tripathi, S., Joshi, A. (eds.) 11th Asia Pacific Conference on Computer Human Interaction, APCHI ’13. ACM, Bangalore, pp. 178–182 (2013). https://doi.org/10.1145/2525194.2525265 Sachdeva, N., Saxena, N., Kumaraguru, P.: On the viability of captchas for use in telephony systems: a usability field study. In: Tripathi, S., Joshi, A. (eds.) 11th Asia Pacific Conference on Computer Human Interaction, APCHI ’13. ACM, Bangalore, pp. 178–182 (2013). https://​doi.​org/​10.​1145/​2525194.​2525265
12.
go back to reference Lee, Y.L., Hsu, C.H.: Usability study of text-based {CAPTCHAs}. Displays 32(2), 81–86 (2011)CrossRef Lee, Y.L., Hsu, C.H.: Usability study of text-based {CAPTCHAs}. Displays 32(2), 81–86 (2011)CrossRef
13.
go back to reference Brodić, D., Amelio, A., Draganov, I.R.: Response Time Analysis of Text-Based CAPTCHA by Association Rules. Springer International Publishing, New York, pp. 78–88 (2016)CrossRef Brodić, D., Amelio, A., Draganov, I.R.: Response Time Analysis of Text-Based CAPTCHA by Association Rules. Springer International Publishing, New York, pp. 78–88 (2016)CrossRef
14.
go back to reference Brodić, D., Amelio, A.: Analysis of the Human-Computer Interaction on the Example of Image-Based CAPTCHA by Association Rule Mining. Springer International Publishing, New York, pp. 38–51 (2017)CrossRef Brodić, D., Amelio, A.: Analysis of the Human-Computer Interaction on the Example of Image-Based CAPTCHA by Association Rule Mining. Springer International Publishing, New York, pp. 38–51 (2017)CrossRef
15.
go back to reference Bursztein, E., Martin, M., Mitchell, J.: Text-based captcha strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11. ACM, New York, pp. 125–138 (2011) Bursztein, E., Martin, M., Mitchell, J.: Text-based captcha strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11. ACM, New York, pp. 125–138 (2011)
16.
go back to reference Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: Generic solving of text-based captchas. In: Bratus, S., Lindner, F.F.X. (eds.) 8th USENIX Workshop on Offensive Technologies, WOOT ’14. USENIX Association, San Diego, pp. 1–15 (2014) Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: Generic solving of text-based captchas. In: Bratus, S., Lindner, F.F.X. (eds.) 8th USENIX Workshop on Offensive Technologies, WOOT ’14. USENIX Association, San Diego, pp. 1–15 (2014)
17.
go back to reference Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X., Li, J.: A simple generic attack on text captchas. In: 23nd Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego, pp. 1–14 (2016) Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X., Li, J.: A simple generic attack on text captchas. In: 23nd Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego, pp. 1–14 (2016)
18.
go back to reference Yan, J., Ahmad, A.S.E.: Captcha security: A case study. IEEE Secur. Priv. 7(4), 22–28 (2009)CrossRef Yan, J., Ahmad, A.S.E.: Captcha security: A case study. IEEE Secur. Priv. 7(4), 22–28 (2009)CrossRef
19.
go back to reference Kalsoom, S., Ziauddin, S., Abbasi, A.R.: An image-based captcha scheme exploiting human appearance characteristics. TIIS 6, 734–750 (2012) Kalsoom, S., Ziauddin, S., Abbasi, A.R.: An image-based captcha scheme exploiting human appearance characteristics. TIIS 6, 734–750 (2012)
20.
go back to reference Kim, J., Yang, J., Wohn, K.: Agecaptcha: an image-based captcha that annotates images of human faces with their age groups. KSII Trans. Internet Inf. Syst. (TIIS) 8(3), 1071–1092 (2014) Kim, J., Yang, J., Wohn, K.: Agecaptcha: an image-based captcha that annotates images of human faces with their age groups. KSII Trans. Internet Inf. Syst. (TIIS) 8(3), 1071–1092 (2014)
21.
go back to reference Bigham, J.P., Cavender, A.C.: Evaluating existing audio captchas and an interface optimized for non-visual use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’09. ACM, New York, pp. 1829–1838 (2009) Bigham, J.P., Cavender, A.C.: Evaluating existing audio captchas and an interface optimized for non-visual use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’09. ACM, New York, pp. 1829–1838 (2009)
22.
go back to reference Tam, J., Simsa, J., Huggins-Daines, D., von Ahn, L., Blum, M.: Improving audio captchas. In: 4th Symposium on usable privacy and security (SOUPS), 23–25 July 2008, Pittsburgh, PA, USA (2008) Tam, J., Simsa, J., Huggins-Daines, D., von Ahn, L., Blum, M.: Improving audio captchas. In: 4th Symposium on usable privacy and security (SOUPS), 23–25 July 2008, Pittsburgh, PA, USA (2008)
23.
go back to reference Tam, J., Simsa, J., Hyde, S., von Ahn, L.: Breaking audio captchas. In: Koller, D., Schuurmans, D., Bengio, Y., Bottou, L. (eds.) Proceedings of the 21st international conference on neural information processing systems (NIPS), 8–10 December 2008, Vancouver, British Columbia, Canada, pp. 1625–1632 (2008) Tam, J., Simsa, J., Hyde, S., von Ahn, L.: Breaking audio captchas. In: Koller, D., Schuurmans, D., Bengio, Y., Bottou, L. (eds.) Proceedings of the 21st international conference on neural information processing systems (NIPS), 8–10 December 2008, Vancouver, British Columbia, Canada, pp. 1625–1632 (2008)
24.
go back to reference Bursztein, E., Beauxis, R., Paskov, H.S., Perito, D., Fabry, C., Mitchell, J.C.: The failure of noise-based non-continuous audio captchas. In: IEEE symposium on security and privacy, 22–25 May 2011, Oakland, California, USA. IEEE Computer Society, pp. 19–31 (2011) Bursztein, E., Beauxis, R., Paskov, H.S., Perito, D., Fabry, C., Mitchell, J.C.: The failure of noise-based non-continuous audio captchas. In: IEEE symposium on security and privacy, 22–25 May 2011, Oakland, California, USA. IEEE Computer Society, pp. 19–31 (2011)
25.
go back to reference Nayeem, M.T., Akand, M.R., Sakib, N., Kabir, W.U.: Human cognition in automated truing test design. Int. J. Softw. Sci. Comput. Intell. 6(4), 1–19 (2014)CrossRef Nayeem, M.T., Akand, M.R., Sakib, N., Kabir, W.U.: Human cognition in automated truing test design. Int. J. Softw. Sci. Comput. Intell. 6(4), 1–19 (2014)CrossRef
28.
go back to reference Nguyen, V.D., Chow, Y.W., Susilo, W.: On the security of text-based 3d CAPTCHAs. Comput. Secur. 45, 84–99 (2014)CrossRef Nguyen, V.D., Chow, Y.W., Susilo, W.: On the security of text-based 3d CAPTCHAs. Comput. Secur. 45, 84–99 (2014)CrossRef
29.
go back to reference Imsamai, M., Phimoltares, S.: 3d captcha: a next generation of the captcha. In: 2010 International conference on information science and applications (ICISA), 21–23 April 2010, Seoul, South Korea. IEEE Computer Society, pp. 1–8 (2010) Imsamai, M., Phimoltares, S.: 3d captcha: a next generation of the captcha. In: 2010 International conference on information science and applications (ICISA), 21–23 April 2010, Seoul, South Korea. IEEE Computer Society, pp. 1–8 (2010)
30.
go back to reference Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a captcha based on line drawings of 3d models. In: Proceedings of the 19th international conference on world wide web (WWW), 26–30 April 2010, Raleigh, North Carolina, USA, ACM, New York, pp. 821–830 (2010) Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a captcha based on line drawings of 3d models. In: Proceedings of the 19th international conference on world wide web (WWW), 26–30 April 2010, Raleigh, North Carolina, USA, ACM, New York, pp. 821–830 (2010)
31.
go back to reference Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on management of data (SIGMOD), 25–29 May 1993, Washington, D.C., USA. ACM, New York, pp. 207–216 (1993) Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on management of data (SIGMOD), 25–29 May 1993, Washington, D.C., USA. ACM, New York, pp. 207–216 (1993)
32.
go back to reference Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley Longman Publishing Co. Inc., Boston (2005) Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley Longman Publishing Co. Inc., Boston (2005)
33.
go back to reference Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD ’00. ACM, New York, pp. 1–12 (2000) Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD ’00. ACM, New York, pp. 1–12 (2000)
34.
go back to reference Zhao, Q., Bhowmick, S.S.: Association Rule Mining: A Survey. Technical Report, CAIS, No. 2003116, Nanyang Technological University, Singapore (2003) Zhao, Q., Bhowmick, S.S.: Association Rule Mining: A Survey. Technical Report, CAIS, No. 2003116, Nanyang Technological University, Singapore (2003)
35.
go back to reference Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook. Springer-Verlag New York Inc, Secaucus (2005)CrossRef Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook. Springer-Verlag New York Inc, Secaucus (2005)CrossRef
36.
go back to reference Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer Series in Statistics. Springer New York Inc., New York (2001)CrossRef Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer Series in Statistics. Springer New York Inc., New York (2001)CrossRef
37.
go back to reference MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proc. of the fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1. University of California Press, California, pp. 281–297 (1967) MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proc. of the fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1. University of California Press, California, pp. 281–297 (1967)
38.
go back to reference Bradley, P.S., Mangasarian, O.L., Street, W.N.: Clustering via concave minimization. In: Mozer, M.C., Jordan, M.I., Petsche, T. (eds.) Advances in Neural Information Processing Systems, vol. 9. The MIT Press, Cambridge, pp. 368–374 (1997) Bradley, P.S., Mangasarian, O.L., Street, W.N.: Clustering via concave minimization. In: Mozer, M.C., Jordan, M.I., Petsche, T. (eds.) Advances in Neural Information Processing Systems, vol. 9. The MIT Press, Cambridge, pp. 368–374 (1997)
40.
go back to reference Shapiro, S.S., Wilk, M.B.: An analysis of variance test for normality (complete samples). Biometrika 52(3–4), 591–611 (1965)MathSciNetCrossRef Shapiro, S.S., Wilk, M.B.: An analysis of variance test for normality (complete samples). Biometrika 52(3–4), 591–611 (1965)MathSciNetCrossRef
41.
go back to reference Kruskal, W.H., Wallis, W.A.: Use of ranks in one-criterion variance analysis. J. Am. Stat. Assoc. 47(260), 583–621 (1952)CrossRef Kruskal, W.H., Wallis, W.A.: Use of ranks in one-criterion variance analysis. J. Am. Stat. Assoc. 47(260), 583–621 (1952)CrossRef
42.
go back to reference Field, A.: Discovering Statistics Using SPSS. ISM (London, England). SAGE Publications, Thousand Oaks (2009) Field, A.: Discovering Statistics Using SPSS. ISM (London, England). SAGE Publications, Thousand Oaks (2009)
Metadata
Title
Association rule mining for the usability of the CAPTCHA interfaces: a new study of multimedia systems
Authors
Darko Brodić
Alessia Amelio
Publication date
21-03-2018
Publisher
Springer Berlin Heidelberg
Published in
Multimedia Systems / Issue 6/2018
Print ISSN: 0942-4962
Electronic ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-018-0589-6

Other articles of this Issue 6/2018

Multimedia Systems 6/2018 Go to the issue