Breaking Text-Based CAPTCHAs using Average Vertical Partition

被引:0
|
作者
Liu, Xiyang [1 ]
Zhang, Yang [1 ]
Hu, Jing [1 ]
Tang, Mengyun [1 ]
Gao, Haichang [1 ]
机构
[1] Xidian Univ, Inst Software Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CAPTCHA; security; text-based; K-nearest neighbor; average vertical partition;
D O I
10.6688/J1SE.201905_35(3).0008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CAPTCHA, which stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart, has been widely used as a security mechanism to defend against automated registration, spam and malicious bot programs. There have been many successful attacks on CAPTCHAs deployed by popular websites, e.g., Google, Yahoo!, and Microsoft. However, most of these methods are ad hoc, and they have lost efficacy with the evolution of CAPTCHA. In this paper, we propose a simple but effective attack on text-based CAPTCHA that uses machine learning to solve the segmentation and recognition problems simultaneously. The method first divides a CAPTCHA image into average blocks and attempts to combine adjacent blocks to form individual characters. A modified K-Nearest Neighbor (KNN) engine is used to recognize these combinations, and using a Dynamic Programming (DP) graph search algorithm, the most likely combinations are selected as the final result. We tested our attack on the popular CAPTCHAs deployed by the top 20 Alexa ranked websites. The success rates range from 5.0% to 74.0%, illustrating the effectiveness and universality of our method. We also tested the applicability of our method on three well-known CAPTCHA schemes. Our attack casts serious doubt on the security of existing text-based CAPTCHAs; therefore, guidelines for designing better text-based CAPTCHAs are discussed at the end of this paper.
引用
收藏
页码:611 / 634
页数:24
相关论文
共 50 条
  • [1] Breaking text-based CAPTCHAs with variable word and character orientation
    Starostenko, Oleg
    Cruz-Perez, Claudia
    Uceda-Ponga, Fernando
    Alarcon-Aquino, Vicente
    [J]. PATTERN RECOGNITION, 2015, 48 (04) : 1101 - 1112
  • [2] Usability study of text-based CAPTCHAs
    Lee, Ying-Lien
    Hsu, Chih-Hsiang
    [J]. DISPLAYS, 2011, 32 (02) : 81 - 86
  • [3] Text-based CAPTCHAs over the years
    Chow, Y. W.
    Susilo, W.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS, TECHNOLOGY AND ENGINEERING 2017 (INCITE 2017), 2017, 273
  • [4] Reading the Moving Text in Animated Text-Based CAPTCHAs
    Shah, Syed Safdar Ali
    Shaikh, Riaz Ahmed
    Arain, Rafaqat Hussain
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 61 - 64
  • [5] A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs
    Deng, Xianwen
    Zhao, Ruijie
    Xue, Zhi
    Liu, Ming
    Chen, Libo
    Wang, Yijun
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 614 - 619
  • [6] A Generic Solver Combining Unsupervised Learning and Representation Learning for Breaking Text-Based Captchas
    Tian, Sheng
    Xiong, Tao
    [J]. WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 860 - 871
  • [7] Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha
    Tang, Mengyun
    Gao, Haichang
    Zhang, Yang
    Liu, Yi
    Zhang, Ping
    Wang, Ping
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2522 - 2537
  • [8] On the security of text-based 3D CAPTCHAs
    Vu Duc Nguyen
    Chow, Yang-Wai
    Susilo, Willy
    [J]. COMPUTERS & SECURITY, 2014, 45 : 84 - 99
  • [9] Detecting human attacks on text-based CAPTCHAs using the keystroke dynamic approach
    Alsuhibany, Suliman A.
    Alreshoodi, Latifah A.
    [J]. IET INFORMATION SECURITY, 2021, 15 (02) : 191 - 204
  • [10] A deep learning model for recognition of complex Text-based CAPTCHAs
    Arain, Rafaqat Hussain
    Shaikh, Riaz Ahmed
    Maitlo, Abdullah
    Kumar, Kamlesh
    Shah, Syed Safdar Ali
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (02): : 103 - 107