Skip to main content
Erschienen in: Soft Computing 16/2023

25.01.2023 | Application of soft computing

An efficient technique for breaking of coloured Hindi CAPTCHA

verfasst von: Mohinder Kumar, M. K. Jindal, Munish Kumar

Erschienen in: Soft Computing | Ausgabe 16/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber-attacks on the internet are not a new phenomenon. Hackers are always looking for ways to breach the security of the internet. Good researchers continuously develop solutions to the problems of breaches in security. Human interaction proofs are also one of the most affordable solutions to problems. The completely automated public Turing test to tell computers and humans apart (CAPTCHA) has a wide range of applications, including website authentication, preventing bogus email registration, preventing bogus online polls, preventing bogus ticket booking, and so on. CAPTCHAs come in various formats, but text-based schemes are the most common. Unfortunately, these text-based CAPTCHAs are available in foreign languages and have a high success rate. The usability of these foreign language-based schemes for native people is also very low. These days, Hindi CAPTCHAs are available, but before using them, we must test the security of these schemes. In this study, ten different coloured CAPTCHAs are broken using the k-nearest neighbours, the support vector machine, and the random forest classifiers. The breaking rate for two-colour schemes is 90%, while the breaking rate for multi-colour schemes is 93%. The solving time for the support vector machine and the random forest classifier ranges from 0.06 s to 0.09 s and 0.1 to 0.2 s in the case of two-colour schemes. For multi-colour schemes, it ranges from 0.06 s to 0.09 s and 0.09 s to 0.2 s for the support vector machine and random forest classifier, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Algwil A, Ciresan D, Yan J and Liu B (2016) A security analysis of automated Chinese turing tests. In: Proceedings of the 32nd annual conference on computer security applications, pp. 520–532 Algwil A, Ciresan D, Yan J and Liu B (2016) A security analysis of automated Chinese turing tests. In: Proceedings of the 32nd annual conference on computer security applications, pp. 520–532
Zurück zum Zitat Alsuhibany S and Parvez M (2016) Secure Arabic handwritten CAPTCHA generation using OCR operations. In: 15th international conference on Frontiers in handwriting recognition (ICFHR), pp. 126–131 Alsuhibany S and Parvez M (2016) Secure Arabic handwritten CAPTCHA generation using OCR operations. In: 15th international conference on Frontiers in handwriting recognition (ICFHR), pp. 126–131
Zurück zum Zitat Alsuhibany S, Parvez M, Alrobah N, Almohaimeed F and Alduayji S (2017) Evaluating robustness of Arabic CAPTCHAs. In: 2nd international conference on anti-cyber crimes (ICACC), pp. 81–86 Alsuhibany S, Parvez M, Alrobah N, Almohaimeed F and Alduayji S (2017) Evaluating robustness of Arabic CAPTCHAs. In: 2nd international conference on anti-cyber crimes (ICACC), pp. 81–86
Zurück zum Zitat Bock K, Patel D, George and Dave H (2017) unCaptcha: a low resource defeat of reCaptcha’s audio challenge. In: WOOT 17-proceedings of the 11th USENIX conference on offensive technology Bock K, Patel D, George and Dave H (2017) unCaptcha: a low resource defeat of reCaptcha’s audio challenge. In: WOOT 17-proceedings of the 11th USENIX conference on offensive technology
Zurück zum Zitat Bursztein E, Martin M and Mitchell J (2011) Text based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM conference on computer and communications security, pp. 125–138 Bursztein E, Martin M and Mitchell J (2011) Text based CAPTCHA strengths and weaknesses. In: Proceedings of the 18th ACM conference on computer and communications security, pp. 125–138
Zurück zum Zitat Bursztein E, Aigrain J and Moscicki A (2014) The end is nigh: generic solving of text based CAPTCHAs. In: Proceedings of 8th USENIX workshop on offensive technologies (WOOT 14), pp. 1–15 Bursztein E, Aigrain J and Moscicki A (2014) The end is nigh: generic solving of text based CAPTCHAs. In: Proceedings of 8th USENIX workshop on offensive technologies (WOOT 14), pp. 1–15
Zurück zum Zitat Chellapilla K and Simard P (2004) Using machine learning to break visual human interaction proofs (HIPs). In: Proceedings of the advances in neural information processing systems, pp. 265–272 Chellapilla K and Simard P (2004) Using machine learning to break visual human interaction proofs (HIPs). In: Proceedings of the advances in neural information processing systems, pp. 265–272
Zurück zum Zitat Chow W and Susilo W (2011) AniCAP: an animated 3D CAPTCHA scheme based on motion parallax. In: Proceedings of 10th international conference on cryptology and network security, pp. 255–271 Chow W and Susilo W (2011) AniCAP: an animated 3D CAPTCHA scheme based on motion parallax. In: Proceedings of 10th international conference on cryptology and network security, pp. 255–271
Zurück zum Zitat Elson J, Douceur J and Howell J Saul J (2007) Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of ACM conference on computer and communications security, pp. 366–374 Elson J, Douceur J and Howell J Saul J (2007) Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of ACM conference on computer and communications security, pp. 366–374
Zurück zum Zitat Gao H, Yao D, Liu H, Liu X and Wang L (2010) A novel image based CAPTCHA using Jigsaw Puzzle. In: Proceedings of 13th international conference on computational science and engineering (CSE), pp. 351–356 Gao H, Yao D, Liu H, Liu X and Wang L (2010) A novel image based CAPTCHA using Jigsaw Puzzle. In: Proceedings of 13th international conference on computational science and engineering (CSE), pp. 351–356
Zurück zum Zitat Gao H, Wang W and Qi J (2013) The robustness of hollow CAPTCHAs. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp. 1075–1086 Gao H, Wang W and Qi J (2013) The robustness of hollow CAPTCHAs. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp. 1075–1086
Zurück zum Zitat Gao H, Yan J and Cao F (2016) A simple generic attack on text CAPTCHAs. In: Proceedings of network and distributed system security symposium (NDSS), pp. 1–14 Gao H, Yan J and Cao F (2016) A simple generic attack on text CAPTCHAs. In: Proceedings of network and distributed system security symposium (NDSS), pp. 1–14
Zurück zum Zitat Kluever Alred K and Zanibbi R (2009) Balancing usability and security in a video CAPTCHA. In: Proceedings of the 5th symposium on usable privacy and security (SOUPS), pp. 1–11 Kluever Alred K and Zanibbi R (2009) Balancing usability and security in a video CAPTCHA. In: Proceedings of the 5th symposium on usable privacy and security (SOUPS), pp. 1–11
Zurück zum Zitat Lazar J, Feng J and Brooks T (2012) The sounds right CAPTCHA: an improved approach to audio human interaction proofs for blind users. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp. 2267–2276 Lazar J, Feng J and Brooks T (2012) The sounds right CAPTCHA: an improved approach to audio human interaction proofs for blind users. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp. 2267–2276
Zurück zum Zitat Mohamed M, Gao S and Saxena N (2014) Dynamic cognitive game CAPTCHA usability and detection a of streaming-based farming. In: Proceedings of the workshop on usable security (USEC), pp. 1–10 Mohamed M, Gao S and Saxena N (2014) Dynamic cognitive game CAPTCHA usability and detection a of streaming-based farming. In: Proceedings of the workshop on usable security (USEC), pp. 1–10
Zurück zum Zitat Mori G and Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition, pp. 1–134 Mori G and Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition, pp. 1–134
Zurück zum Zitat Yan J and Ahmad A (2008) A low-cost attack on a microsoft CAPTCHA. In: Proceedings of the 15th ACM conference on computer and communications security, pp. 543–554 Yan J and Ahmad A (2008) A low-cost attack on a microsoft CAPTCHA. In: Proceedings of the 15th ACM conference on computer and communications security, pp. 543–554
Metadaten
Titel
An efficient technique for breaking of coloured Hindi CAPTCHA
verfasst von
Mohinder Kumar
M. K. Jindal
Munish Kumar
Publikationsdatum
25.01.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 16/2023
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-023-07844-3

Weitere Artikel der Ausgabe 16/2023

Soft Computing 16/2023 Zur Ausgabe

Soft computing in decision making and in modeling in economics

Renyi entropy of uncertain random variables and its application to portfolio selection

Mathematical methods in data science

Multifractal analysis of mass function

Premium Partner