skip to main content
research-article
Open Access

SenCAPTCHA: A Mobile-First CAPTCHA Using Orientation Sensors

Authors Info & Claims
Published:15 June 2020Publication History
Skip Abstract Section

Abstract

CAPTCHAs are used to distinguish between human- and computer-generated (i.e., bot) online traffic. As there is an ever-increasing amount of online traffic from mobile devices, it is necessary to design CAPTCHAs that work well on mobile devices. In this paper, we present SenCAPTCHA, a mobile-first CAPTCHA that leverages the device's orientation sensors. SenCAPTCHA works by showing users an image of an animal and asking them to tilt their device to guide a red ball into the center of that animal's eye. SenCAPTCHA is especially useful for devices with small screen sizes (e.g., smartphones, smartwatches). In this paper, we describe the design of SenCAPTCHA and demonstrate that it is resilient to various machine learning based attacks. We also report on two usability studies of SenCAPTCHA involving a total of 472 participants; our results show that SenCAPTCHA is viewed as an "enjoyable" CAPTCHA and that it is preferred by over half of the participants to other existing CAPTCHA systems.

Skip Supplemental Material Section

Supplemental Material

References

  1. Henry S Baird, Michael A Moll, and Sui-Yu Wang. 2005. ScatterType: a legible but hard-to-segment CAPTCHA. In Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on. IEEE, 935--939.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M.M. Bongard. 1970. Pattern Recognition. Spartan Books, Rochelle Park, NJ.Google ScholarGoogle Scholar
  3. Darko Brodić, Alessia Amelio, and Radmila Janković. 2018. Exploring the influence of CAPTCHA types to the users response time by statistical analysis. Multimedia Tools and Applications 77, 10 (2018), 12293--12329.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. John Brooke. 2013. SUS: a retrospective. Journal of usability studies 8, 2 (2013), 29--40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194 (1996), 4--7.Google ScholarGoogle Scholar
  6. Elie Bursztein. 2012. How we broke the NuCaptcha video scheme and what we proposed to fix it. See https://www.elie.net/blog/security/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it/, Accessed March (2012).Google ScholarGoogle Scholar
  7. Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, and John C Mitchell. 2014. The End is Nigh: Generic Solving of Text-based CAPTCHAs. In WOOT.Google ScholarGoogle Scholar
  8. Tsz-Yan Chan. 2003. Using a test-to-speech synthesizer to generate a reverse Turing test. In Tools with Artificial Intelligence, 2003. Proceedings. 15th IEEE International Conference on. IEEE, 226--232.Google ScholarGoogle ScholarCross RefCross Ref
  9. Monica Chew and J Doug Tygar. 2004. Image recognition captchas. In International Conference on Information Security. Springer, 268--279.Google ScholarGoogle ScholarCross RefCross Ref
  10. Sarika Choudhary, Ritika Saroha, Yatan Dahiya, and Sachin Choudhary. 2013. understanding CAPTCHA: Text and Audio Based Captcha with its Applications. International Journal of Advanced Research in Computer Science and Software Engineering 3, 6 (2013).Google ScholarGoogle Scholar
  11. Mauro Conti, Claudio Guarisco, and Riccardo Spolaor. 2016. CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery. In International Conference on Applied Cryptography and Network Security. Springer, 611--628.Google ScholarGoogle ScholarCross RefCross Ref
  12. Ritendra Datta, Jia Li, and James Z Wang. 2005. IMAGINATION: a robust image-based CAPTCHA generation system. In Proceedings of the 13th annual ACM international conference on Multimedia. ACM, 331--334.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jeremy Elson, John R Douceur, Jon Howell, and Jared Saul. 2007. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In ACM Conference on Computer and Communications Security, Vol. 7. Citeseer, 366--374.Google ScholarGoogle Scholar
  14. Haichang Gao, Honggang Liu, Dan Yao, Xiyang Liu, and Uwe Aickelin. 2010. An audio CAPTCHA to distinguish humans from computers. In Electronic Commerce and Security (ISECS), 2010 Third International Symposium on. IEEE, 265--269.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Haichang Gao, Dan Yao, Honggang Liu, Xiyang Liu, and Liming Wang. 2010. A novel image based CAPTCHA using jigsaw puzzle. In Computational Science and Engineering (CSE), 2010 IEEE 13th International Conference on. IEEE, 351--356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Barney G Glaser. 1965. The constant comparative method of qualitative analysis. Social problems 12, 4 (1965), 436--445.Google ScholarGoogle Scholar
  17. Philippe Golle. 2008. Machine learning attacks against the Asirra CAPTCHA. In Proceedings of the 15th ACM conference on Computer and communications security. ACM, 535--542.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ian J Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, and Vinay Shet. 2013. Multi-digit number recognition from street view imagery using deep convolutional neural networks. arXiv preprint arXiv.1312.6082 (2013).Google ScholarGoogle Scholar
  19. Rich Gossweiler, Maryam Kamvar, and Shumeet Baluja. 2009. What's up CAPTCHA?: a CAPTCHA based on image orientation. In Proceedings of the 18th international conference on World wide web. ACM, 841--850.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jonathan Holman, Jonathan Lazar, Jinjuan Heidi Feng, and John D'Arcy. 2007. Developing usable CAPTCHAs for blind users. In Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility. ACM, 245--246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chen-Chiung Hsieh and Zong-Yu Wu. 2013. Anti-SIFT images based CAPTCHA using versatile characters. In Information Science and Applications (ICISA), 2013 International Conference on. IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  22. Google Inc. 2018. Google reCAPTCHA. https://www.google.com/recaptcha/intro/Google ScholarGoogle Scholar
  23. Leap Marketing Technologies Inc. 2010. Video-Based Captchas Now Available for Sites and Blogs. See www.prnewswire.com/news-releases/video-based-captchas-now-available-for-sites-and-blogs-97471319.html (2010).Google ScholarGoogle Scholar
  24. Imperva Incapsula. 2016. Bot Traffic Report. https://www.incapsula.com/blog/bot-traffic-report-2016.htmlGoogle ScholarGoogle Scholar
  25. Ramanpreet Kaur and Pooja Choudhary. 2015. A Novel CAPTCHA Design Approach using Boolean Algebra. In 2015 5th International Conference on IT Convergence and Security (ICITCS). Citeseer, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  26. Kurt Alfred Kluever and Richard Zanibbi. 2009. Balancing usability and security in a video CAPTCHA. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Greg Kochanski, Daniel P Lopresti, and Chilin Shih. 2002. A reverse turing test using speech. In INTERSPEECH.Google ScholarGoogle Scholar
  28. Martin Koestinger, Paul Wohlhart, Peter M Roth, and Horst Bischof. 2011. Annotated facial landmarks in the wild: A large-scale, real-world database for facial landmark localization. In Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on. IEEE, 2144--2151.Google ScholarGoogle ScholarCross RefCross Ref
  29. Jonathan Lazar, Jinjuan Feng, Tim Brooks, Genna Melamed, Brian Wentz, Jon Holman, Abiodun Olalere, and Nnanna Ekedebe. 2012. The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2267--2276.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. James R Lewis. 1991. Psychometric evaluation of an after-scenario questionnaire for computer usability studies: the ASQ. ACM Sigchi Bulletin 23, 1 (1991), 78--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mark D Lillibridge, Martin Abadi, Krishna Bharat, and Andrei Z Broder. 2001. Method for selectively restricting access to computer systems. US Patent 6,195,698.Google ScholarGoogle Scholar
  32. David G Lowe. 2004. Distinctive image features from scale-invariant keypoints. International journal of computer vision 60, 2 (2004), 91--110.Google ScholarGoogle Scholar
  33. Nicholas J. Hopper Luis von Ahn, Manuel Blum and John Langford. 2000. The CAPTCHA Web Page. http://www.captcha.netGoogle ScholarGoogle Scholar
  34. Peter Matthews, Andrew Mantel, and Cliff C Zou. 2010. Scene tagging: image-based CAPTCHA using image composition and object relationships. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 345--350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. D Mujumdar and S Polisetti. 2011. A platform to monetize usable & secure CAPTCHAs for desktop and mobile devices (PICATCHA). Retrieved Dec 20 (2011), 2014.Google ScholarGoogle Scholar
  36. Drew Phillips. 2019. Securimage. https://www.phpcaptcha.orgGoogle ScholarGoogle Scholar
  37. Lawrence R Rabiner and Biing-Hwang Juang. 1993. Fundamentals of speech recognition. (1993).Google ScholarGoogle Scholar
  38. Maheen Rashid, Xiuye Gu, and Yong Jae Lee. 2017. Interspecies Knowledge Transfer for Facial Keypoint Detection. arXiv preprint arXiv:1704.04023 (2017).Google ScholarGoogle Scholar
  39. Gerardo Reynaga, Sonia Chiasson, and Paul C van Oorschot. 2015. Exploring the usability of captchas on smartphones: Comparisons and recommendations. In NDSS Workshop on Usable Security USEC.Google ScholarGoogle ScholarCross RefCross Ref
  40. Scott Ruoti, Brent Roberts, and Kent Seamons. 2015. Authentication melee: A usability analysis of seven web authentication systems. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 916--926.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Hiroaki Sakoe and Seibi Chiba. 1978. Dynamic programming algorithm optimization for spoken word recognition. IEEE transactions on acoustics, speech, and signal processing 26, 1 (1978), 43--49.Google ScholarGoogle Scholar
  42. Jeff Sauro and James R Lewis. 2016. Quantifying the user experience: Practical statistics for user research. Morgan Kaufmann.Google ScholarGoogle Scholar
  43. Suphannee Sivakorn, Iasonas Polakis, and Angelos D Keromytis. 2016. I am robot:(deep) learning to break semantic image captchas. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 388--403.Google ScholarGoogle Scholar
  44. Suphannee Sivakorn, Jason Polakis, and Angelos D Keromytis. 2016. I'm not a human: Breaking the Google reCAPTCHA. Black Hat (2016).Google ScholarGoogle Scholar
  45. Oleg Starostenko, Claudia Cruz-Perez, Fernando Uceda-Ponga, and Vicente Alarcon-Aquino. 2015. Breaking text-based CAPTCHAs with variable word and character orientation. Pattern Recognition 48, 4 (2015), 1101--1112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Pranal C Tayade and Mahip M Bartere. 2015. Comprehensive study on performance analysis of various CAPTCHA systems. International Journal of Current Engineering and Technology 5, 1 (2015).Google ScholarGoogle Scholar
  47. Thomas S Tullis and Jacqueline N Stetson. 2004. A comparison of questionnaires for assessing website usability. In Usability professional association conference, Vol. 1. Minneapolis, USA.Google ScholarGoogle Scholar
  48. Luis Von Ahn. 2008. Human computation. In 2008 IEEE 24th international conference on data engineering. IEEE, 1--2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Luis Von Ahn, Manuel Blum, and John Langford. 2004. Telling humans and computers apart automatically. Commun. ACM 47, 2 (2004), 56--60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Luis Von Ahn, Benjamin Maurer, Colin McMillen, David Abraham, and Manuel Blum. 2008. recaptcha: Human-based character recognition via web security measures. Science 321, 5895 (2008), 1465--1468.Google ScholarGoogle Scholar
  51. Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, and Paul C van Oorschot. 2012. Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. In USENIX security symposium. 49--64.Google ScholarGoogle Scholar
  52. Heng Yang, Renqiao Zhang, and Peter Robinson. 2016. Human and sheep facial landmarks localisation by triplet interpolated features. In Applications of Computer Vision (WACV), 2016 IEEE Winter Conference on. IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. SenCAPTCHA: A Mobile-First CAPTCHA Using Orientation Sensors

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
          Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 2
          June 2020
          771 pages
          EISSN:2474-9567
          DOI:10.1145/3406789
          Issue’s Table of Contents

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 June 2020
          Published in imwut Volume 4, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader