[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1896300.1896305guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Distortion estimation techniques in solving visual CAPTCHAs

Published: 27 June 2004 Publication History

Abstract

This paper describes two distortion estimation techniques for object recognition that solve EZ-Gimpy and Gimpy-r, two of the visual CAPTCHAs ("Completely Automated Public Turing test to tell Computers and Humans Apart") with high degrees of success. A CAPTCHA is a program that generates and grades tests that most humans can pass but current computer programs cannot pass. We have developed a correlation algorithm that correctly identifies the word in an EZ-Gimpy challenge image 99% of the time and a direct distortion estimation algorithm that correctly identifies the four letters in a Gimpy-r challenge image 78% of the time.

References

[1]
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. The CAPTCHA Web Page: http://www.captcha.net. 2000.
[2]
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. Advances in Cryptology: Eurocrypt 2003, May 2003.
[3]
S. Madhvanath and V. Govindaraju. The role of holistic paradigms in handwritten word recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(2):149-164, February 2001.
[4]
G. Mori and J. Malik. Recognizing objects in adversarial clutter - breaking a visual captcha. Proceedings of the Conference on Computer Vision and Pattern Recognition, vol. 1, Madison, USA, pp. 134-141, June 2003.
[5]
R. Plamondon and S. N. Srihari. On-line and off-line handwriting recognition: A comprehensive survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(1):63-84, January 2000.
[6]
F.W.M. Stentiford and R.G. Mortimer. Some New Heuristics for Thinning Binary Handprinted Characters for OCR. IEEE Transactions on Systems, Man, and Cybernetics, 13(1):81-84, January/February 1983.
[7]
A. Thayananthan, B. Stenger, P. H. S. Torr, and R. Cipolla. Shape Context and Chamfer Matching in Cluttered Scenes. Proceedings of the Conference on Computer Vision and Pattern Recognition, vol. 1, Madison, USA, pp. 127-133, June 2003.

Cited By

View all
  • (2016)A security analysis of automated chinese turing testsProceedings of the 32nd Annual Conference on Computer Security Applications10.1145/2991079.2991083(520-532)Online publication date: 5-Dec-2016
  • (2016)Development of two novel face-recognition CAPTCHAsComputers and Security10.1016/j.cose.2016.03.00760:C(95-116)Online publication date: 1-Jul-2016
  • (2015)Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition techniqueSecurity and Communication Networks10.5555/2914422.29144788:18(3995-4012)Online publication date: 1-Dec-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CVPR'04: Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
June 2004
1041 pages

Sponsors

  • IEEE-CS\DATC: IEEE Computer Society

Publisher

IEEE Computer Society

United States

Publication History

Published: 27 June 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)A security analysis of automated chinese turing testsProceedings of the 32nd Annual Conference on Computer Security Applications10.1145/2991079.2991083(520-532)Online publication date: 5-Dec-2016
  • (2016)Development of two novel face-recognition CAPTCHAsComputers and Security10.1016/j.cose.2016.03.00760:C(95-116)Online publication date: 1-Jul-2016
  • (2015)Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition techniqueSecurity and Communication Networks10.5555/2914422.29144788:18(3995-4012)Online publication date: 1-Dec-2015
  • (2015)HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accentProceedings of the 9th International Conference on Ubiquitous Information Management and Communication10.1145/2701126.2701217(1-8)Online publication date: 8-Jan-2015
  • (2014)Hacking Chinese Touclick CAPTCHA by Multi-Scale Corner Structure Model with Fast Pattern MatchingProceedings of the 22nd ACM international conference on Multimedia10.1145/2647868.2655017(853-856)Online publication date: 3-Nov-2014
  • (2013)The robustness of hollow CAPTCHAsProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516732(1075-1086)Online publication date: 4-Nov-2013
  • (2011)A new CAPTCHA interface design for mobile devicesProceedings of the Twelfth Australasian User Interface Conference - Volume 11710.5555/2460616.2460617(3-8)Online publication date: 17-Jan-2011
  • (2011)Breaking a 3d-based CAPTCHA schemeProceedings of the 14th international conference on Information Security and Cryptology10.1007/978-3-642-31912-9_26(391-405)Online publication date: 30-Nov-2011
  • (2011)A novel architecture for the generation of picture based CAPTCHAProceedings of the 2011 international conference on Advanced Computing, Networking and Security10.1007/978-3-642-29280-4_66(568-574)Online publication date: 16-Dec-2011
  • (2010)Attacking image recognition CAPTCHASProceedings of the 7th international conference on Trust, privacy and security in digital business10.5555/1894888.1894892(13-25)Online publication date: 30-Aug-2010
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media