ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs

Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio Cesar Hernandez Castro

2011

Abstract

CAPTCHAs or HIPs are tests able to tell humans and computers apart, remotely and over an untrustworthy channel. They rely on abilities that are though to be hard for algorithms, yet easy for humans. General logic reasoning, based on common sense knowledge, is one of the areas that are still considered hard for AI. On the other hand, logic reasoning targeting very specific areas has achieved success in AI. In this article, we list current Semantic and Logic CAPTCHAs and examine how strong they are. We also discuss wether this model is suited or not for automatic challenge generation and grading.

References

  1. Achint, T. and Venu, G. (2008). Generation and performance evaluation of synthetic handwritten captchas. In Proceedings of the First International Conference on Frontiers in Handwriting Recognition, ICFHR.
  2. Achint, T. and Venu, G. (2008). Generation and performance evaluation of synthetic handwritten captchas. In Proceedings of the First International Conference on Frontiers in Handwriting Recognition, ICFHR.
  3. Ahn, L. V., Maurer, B., Mcmillen, C., Abraham, D., and Blum, M. (2008). recaptcha - human-based character recognition via web security measures.
  4. Ahn, L. V., Maurer, B., Mcmillen, C., Abraham, D., and Blum, M. (2008). recaptcha - human-based character recognition via web security measures.
  5. Athanasopoulos, E. and Antonatos, S. (2006). Enhanced captchas - using animation to tell humans and computers apart. In Leitold, H. and Markatos, E., editors, Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, pages 97-108. Springer Berlin - Heidelberg.
  6. Athanasopoulos, E. and Antonatos, S. (2006). Enhanced captchas - using animation to tell humans and computers apart. In Leitold, H. and Markatos, E., editors, Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, pages 97-108. Springer Berlin - Heidelberg.
  7. Baird, H. S. and Riopka, T. (2005). Scattertype: a reading captcha resistant to segmentation attack. In Proc., IS&T/SPIE Document Recognition and Retrieval Conf, pages 16-20.
  8. Baird, H. S. and Riopka, T. (2005). Scattertype: a reading captcha resistant to segmentation attack. In Proc., IS&T/SPIE Document Recognition and Retrieval Conf, pages 16-20.
  9. Broder, A. (2001). US Patent no. 6,195,698.
  10. Broder, A. (2001). US Patent no. 6,195,698.
  11. Chew, M. and Tygar, J. D. (2004). Image recognition captchas. In Image Recognition CAPTCHAs, pages 268-279. Springer.
  12. Chew, M. and Tygar, J. D. (2004). Image recognition captchas. In Image Recognition CAPTCHAs, pages 268-279. Springer.
  13. Datta, R., Li, J., and Wang, J. Z. (2005). Imagination: a robust image-based captcha generation system. In MULTIMEDIA 7805: Proceedings of the 13th annual ACM international conference on Multimedia, pages 331- 334, New York, NY, USA. ACM.
  14. Datta, R., Li, J., and Wang, J. Z. (2005). Imagination: a robust image-based captcha generation system. In MULTIMEDIA 7805: Proceedings of the 13th annual ACM international conference on Multimedia, pages 331- 334, New York, NY, USA. ACM.
  15. Elson, J., Douceur, J. R., Howell, J., and Saul, J. (2007). Asirra: a captcha that exploits interest-aligned manual image categorization. In CCS 7807: Proceedings of the 14th ACM conference on Computer and communications security, pages 366-374, New York, NY, USA.
  16. Elson, J., Douceur, J. R., Howell, J., and Saul, J. (2007). Asirra: a captcha that exploits interest-aligned manual image categorization. In CCS 7807: Proceedings of the 14th ACM conference on Computer and communications security, pages 366-374, New York, NY, USA.
  17. Golle, P. (2009). Machine learning attacks against the asirra captcha. In Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, ACM International Conference Proceeding Series. ACM.
  18. Golle, P. (2009). Machine learning attacks against the asirra captcha. In Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, ACM International Conference Proceeding Series. ACM.
  19. Hernandez-Castro, C. J. and Ribagorda, A. (2009a). Pitfalls in captcha design and implementation: the math captcha, a case study. Computers & Security.
  20. Hernandez-Castro, C. J. and Ribagorda, A. (2009a). Pitfalls in captcha design and implementation: the math captcha, a case study. Computers & Security.
  21. Hernandez-Castro, C. J. and Ribagorda, A. (2009b). Videocaptchas. In Proceedings of the 5th International Conference on Security and Protection of Information, Brno.
  22. Hernandez-Castro, C. J. and Ribagorda, A. (2009b). Videocaptchas. In Proceedings of the 5th International Conference on Security and Protection of Information, Brno.
  23. Hernandez-Castro, C. J., Ribagorda, A., and HernandezCastro, J. C. (2011). Do current logic and semantic captchas make sense?
  24. Hernandez-Castro, C. J., Ribagorda, A., and HernandezCastro, J. C. (2011). Do current logic and semantic captchas make sense?
  25. Hernandez-Castro, C. J., Ribagorda, A., and Saez, Y. (2009). Side-channel attack on labeling captchas. http://arxiv.org/abs/0908.1185.
  26. Hernandez-Castro, C. J., Ribagorda, A., and Saez, Y. (2009). Side-channel attack on labeling captchas. http://arxiv.org/abs/0908.1185.
  27. Hernandez-Castro, C. J., Ribagorda Garnacho, A., and Saez, Y. (2010a). Side-channel attack on the humanauth captcha. In Proceedings of the International Conference on Security and Cryptography.
  28. Hernandez-Castro, C. J., Ribagorda Garnacho, A., and Saez, Y. (2010a). Side-channel attack on the humanauth captcha. In Proceedings of the International Conference on Security and Cryptography.
  29. Hernandez-Castro, C. J., Stainton-Ellis, J. D., Ribagorda, A., and Hernandez-Castro, J. C. (2010b). Shortcomings in captcha design and implementation - captcha2, a commercial proposal. In Proceedings of the Eighth International Network Conference (INC2010).
  30. Hernandez-Castro, C. J., Stainton-Ellis, J. D., Ribagorda, A., and Hernandez-Castro, J. C. (2010b). Shortcomings in captcha design and implementation - captcha2, a commercial proposal. In Proceedings of the Eighth International Network Conference (INC2010).
  31. Hoque, M. E., Russomanno, D. J., and Yeasin, M. (2006). 2d captchas from 3d models. In Proceedings of the IEEE SoutheastCon.
  32. Hoque, M. E., Russomanno, D. J., and Yeasin, M. (2006). 2d captchas from 3d models. In Proceedings of the IEEE SoutheastCon.
  33. Knight, W. (2007). Newscientist entry on the qrbgs captcha. Retrieved on the 14th of August, 2010.
  34. Knight, W. (2007). Newscientist entry on the qrbgs captcha. Retrieved on the 14th of August, 2010.
  35. Mitra, N. J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H., and Cohen-Or, D. (2009). Emerging images. ACM Transactions on Graphics, 28(5).
  36. Mitra, N. J., Chu, H.-K., Lee, T.-Y., Wolf, L., Yeshurun, H., and Cohen-Or, D. (2009). Emerging images. ACM Transactions on Graphics, 28(5).
  37. Naor, M. (1996). Verification of a human in the loop or identification via the turing test.
  38. Naor, M. (1996). Verification of a human in the loop or identification via the turing test.
  39. Rusu, A. and Govindaraju, V. (2004). Handwritten captcha - using the difference in the abilities of humans and machines in reading handwritten words. Frontiers in Handwriting Recognition, International Workshop on, 0:226-231.
  40. Rusu, A. and Govindaraju, V. (2004). Handwritten captcha - using the difference in the abilities of humans and machines in reading handwritten words. Frontiers in Handwriting Recognition, International Workshop on, 0:226-231.
  41. Stevanovic, R., Topic, G., Skala, K., Stipcevic, M., and Rogina, B. (2008). Quantum random bit generator service for monte carlo and other stochastic simulations. In Heidelberg, S.-V. B., editor, Lecture Notes in Computer Science, volume 4818, pages 508-515.
  42. Stevanovic, R., Topic, G., Skala, K., Stipcevic, M., and Rogina, B. (2008). Quantum random bit generator service for monte carlo and other stochastic simulations. In Heidelberg, S.-V. B., editor, Lecture Notes in Computer Science, volume 4818, pages 508-515.
  43. Vaughan-Nichols, S. J. (2008). Techworld.com article on fallen captchas. Retrieved on the 14th of August, 2010.
  44. Vaughan-Nichols, S. J. (2008). Techworld.com article on fallen captchas. Retrieved on the 14th of August, 2010.
  45. von Ahn, L. and Dabbish, L. (2004). Labeling images with a computer game. In Press, A., editor, CHI 7804: Proceedings of the 2004 conference on Human factors in computing systems, pages 319-326. ACM Press.
  46. von Ahn, L. and Dabbish, L. (2004). Labeling images with a computer game. In Press, A., editor, CHI 7804: Proceedings of the 2004 conference on Human factors in computing systems, pages 319-326. ACM Press.
  47. Warner, O. (2009). Kittenauth. http://www.thepcspy.com/ kittenauth.
  48. Warner, O. (2009). Kittenauth. http://www.thepcspy.com/ kittenauth.
  49. Wilkins, J. (2010). Strong captcha guidelines. bitland.net/captcha.pdf.
  50. Wilkins, J. (2010). Strong captcha guidelines. bitland.net/captcha.pdf.
  51. Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., and Cai, K. (2010). Attacks and design of image recognition captchas. In Proceedings of the 17th ACM conference on Computer and communications security, CCS 7810, pages 187-200, New York, NY, USA. ACM.
  52. Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., and Cai, K. (2010). Attacks and design of image recognition captchas. In Proceedings of the 17th ACM conference on Computer and communications security, CCS 7810, pages 187-200, New York, NY, USA. ACM.
Download


Paper Citation


in Harvard Style

Javier Hernández-Castro C., Ribagorda A. and Cesar Hernandez Castro J. (2011). ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 157-167. DOI: 10.5220/0003517001570167


in Harvard Style

Javier Hernández-Castro C., Ribagorda A. and Cesar Hernandez Castro J. (2011). ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 157-167. DOI: 10.5220/0003517001570167


in Bibtex Style

@conference{secrypt11,
author={Carlos Javier Hernández-Castro and Arturo Ribagorda and Julio Cesar Hernandez Castro},
title={ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={157-167},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003517001570167},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Carlos Javier Hernández-Castro and Arturo Ribagorda and Julio Cesar Hernandez Castro},
title={ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={157-167},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003517001570167},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
SN - 978-989-8425-71-3
AU - Javier Hernández-Castro C.
AU - Ribagorda A.
AU - Cesar Hernandez Castro J.
PY - 2011
SP - 157
EP - 167
DO - 10.5220/0003517001570167


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
SN - 978-989-8425-71-3
AU - Javier Hernández-Castro C.
AU - Ribagorda A.
AU - Cesar Hernandez Castro J.
PY - 2011
SP - 157
EP - 167
DO - 10.5220/0003517001570167