Вы находитесь на странице: 1из 4

International Conference on Advances in Computing, Communication and Control (ICAC3’09)

THINK-AN IMAGE BASED CAPTCHA MECHANISM


(TESTIFYING HUMAN BASED ON INTELLIGENCE AND
KNOWLEDGE)
V.Srikanth C.Vishwanathan Udit Asati
School of Computing Sciences School of Computing Sciences School of Computing Sciences
VIT University VIT University, Vellore, Tamil VIT University Vellore,
Vellore,Tamil Nadu, India Nadu, India Tamil Nadu, India
srikkanth_srik@yahoo.co.in vishwanathanc@gmail.com uditasati.vit@gmail.com

N.Ch.Sriman Narayana Iyengar


School of Computing Sciences
VIT University, Vellore, TamilNadu, India
nchsniyr@gmail.com

ABSTRACT
There is a need for a CAPTCHA as a result of the abuse of
automated ‘bots’ [6]. The problem of spamming resulted as the bots
intruded into the internet [3]. However, there were many solutions
provided for stopping these bots from entering the internet. The
best and most feasible solution proposed till now has been the
CAPTCHA or the fuzzy text recognition. But the latest news that
hurt the organisations that use CAPTCHA is that the bots started Figure-1: Shows the present day CAPTCHA
recognizing these fuzzy texts. In this paper we propose a novel yet
simple idea which can serve as a replacement to CAPTCHA. There different puzzle. Since this method is very easy to generate and cost
have been several image based CAPTCHA’s proposed and as well efficient this was implemented, though there are various other
defeated [1]. But our alternative systems that were proposed as a test to tell human and
Idea THINK is in the same lines yet is fool proof. In this paper we computer apart.
suggest that a real time image is used which will portray some
The news that recently took the IT world by surprise–The
action or show some object that the user is expected to identify the
CAPTCHA [11] (Completely Automatic Public Turing Test to Tell
object and type the answer. No choices will be given to the user
Computer and Human Apart) is no longer fool proof as bots started
thereby eliminating the option of identifying the answer by
recognising the fuzzy text. Hence there is a need to replace the
probability.
existing technology to distinguish between a human and a machine.
KEY WORDS This made us to come up with THINK (Testifying Human based
CAPTCHA, real-time image, keywords, THINK, Questions, Time- On Intelligence and Knowledge). THINK is much easier and fun to
out, counter, image and Fuzzy-Text. solve for the users. The users will be confronting an image based
on which a question will be posed. The user is required to text the
1. INTRODUCTION answer i.e., type the answer. The answer is present in the database
CAPTCHA involves a fuzzy text that has to be identified by the in the form of keywords. If the users answer matches with any of
user to distinguish between human and bots [8]. An example of the keywords then it is concluded that the user is a human and
fuzzy text CAPTCHA is shown below: access is granted else access is denied.

The user is required to identify the fuzzy text shown in the image. 2. METRICS
If the user recognizes the text correctly as “tame” then it is The various metrics that need to be satisfied for a good system to
concluded that the user is human else the user is required to solve a tell human and computer apart according to [7] are:

2.1 Consistency
Permission to make digital or hard copies of all or part of this work for When presented with the same system, how reproducible is a user’s
personal or classroom use is granted without fee provided that copies are answer? The level of consistency will clearly vary across the
not made or distributed for profit or commercial advantage and that various systems and the acceptable level will vary across for the
copies bear this notice and the full citation on the first page. To copy different systems (some systems may be easy and some may be
otherwise, or republish, to post on servers or to redistribute to lists,
complicated).
requires prior specific permission and/or a fee.
ICAC3’09, January 23–24, 2009, Mumbai, Maharashtra, India.
Copyright 2009 ACM 978-1-60558-351-8…$5.00. 2.2 Entropy

421
International Conference on Advances in Computing, Communication and Control (ICAC3’09)

Entropy means whether two users will answer the same question in handful of other CAPTCHA’s:”Bongo”- a visual pattern
the same way? How hard is it to guess the answer for the user given recognition puzzle, “Eco”- a sound recognition puzzle, and ”Pix”-
a particular system? label-the-object puzzle. In “Pix”, the user is presented with blurred
images of an object, and asked a question like “What are these
2.3 Fun images of?” An implementation of Pix, known as ESP-Pix, is
A good system should not require any specialized knowledge or shown in Figure.
complicated actions, and should have a low barrier to entry.
Relatedly, it should not be too time consuming or tedious. It is an Speech CAPTCHAs, where words are said over white noise, seem
important fact that fun may also markedly affect the other to show promise [9], but getting sound to work just right in a Web
parameters. browser, e.g., can be an inconvenience at best and a major
annoyance at worst. Despite the existence of these other techniques,
2.4 Ease of generation fuzzy text CAPTCHA’s remain the most popular because of their
How easy is it to generate a question in a particular system that ease of generation and its cost efficiency. But since these fuzzy
makes the system efficient. The time taken to generate a question texts CAPTCHA’s as described earlier have been recognized by
must be very less and as well the least cost must be involved for bots they can no longer be used as they cannot solve the very
such process. Whether the questions can be automatically generated purpose of their introduction.
by the computer or it requires human intervention? Whether these
can randomly be displayed to the user? 3.3 Corpus based CAPTCHA’S
Another interesting trend is the move towards corpus-based
2.5 Implementation CAPTCHAs, like re-CAPTCHA [10]. ReCAPTCHA is a project to
Finally, how easy is it to implement? Does it require complex and digitize books by turning words that trigger OCR errors into
elaborate graphics, or can it be implemented for a text-only system? CAPTCHAs. The scheme works as follows: the user is presented
How accessible is the system? with two blurry words, one that the computer knows and one that it
does not, in a random order. The human reads both words, and
Based on the above given metrics we have come up with a system submits the answer. If the users answer to the known word is
which removes the flaws in previously proposed systems. correct, his answer to the unknown word is used as a vote for the
actual correct answer.
3. A STUDY ON EXISTING SYSTEMS
3.1 Fuzzy text recognition 4. OUR PROPOSAL-THINK
The first successful implementation of this idea was a system Instead of fuzzy text we introduce a randomly generated real time
where the user is presented with fuzzy letters, and asked to read image which shows some object or will portray some action. Eg. A
them. Andrei Broder et. Al are believed to be the first to have person eating ice cream or two players playing tennis, etc,. The
actually implemented such a system, while at AltaVista. There, it user is expected to identify the action or the object. These images
was used to foil bots trying to submit URLs into the AltaVista are always real time images. This system requires human
index. This work was soon followed by others. There, Coates et. Al intervention. That is human beings are used to shoot the real time
suggested the idea of “Pessimal Print”- text manipulated in ways images (one such image is shown in figure-3). Questions are
designed to be hard for OCR software. In [4] Luis von Ahn coined framed related to the picture by the human and as well the expected
the term CAPTCHA and proposed a similar scheme named answers ie., the keywords. The work of the computer is to
“Gimpy”. randomly throw these images with questions to the user and
compare the answers given by the users with the key words and
After it became clear that CAPTCHA’s were useful and not just a conclude whether the user is a human or a bot based on the answer.
research curiosity, they began to spring up everywhere, largely in a It is to be noted that the repetition of images will be avoided by
security context: as a way to prevent denial-of-service attacks or removing the image its question and the related keywords from the
comment spam, or as a way of slowing down brute-force attacks.

3.2 Other related approaches


In the same lines of work, [4] von Ahn et. al proposed some

Figure-2: Shows an ESP-PIX CAPTCHA Figure-3: A Sample of a real-time image used in THINK

422
International Conference on Advances in Computing, Communication and Control (ICAC3’09)

database as soon as that particular entry is used. Though these types 13) Continue till user clicks the cancel button or closes the
of systems already exists in graphical password system, in program.
graphical password system a set of options is given along with 14) Stop.
question to the user. In such cases there is a very high probability
that the automated systems may select the correct answer based on 5. SNAPSHOT OF THINK
permutations. But in this system, since the user is requested to type As shown in the snapshot (figure-4) the user is posed with an image
the answers, the work is not that easy for the automated systems and the question as shown in the figure-4. The user is required to
whereas it is very easy for six sensed humans. Though the bots are enter the answer in the text box provided and is required to press
facilitated with the help of artificial intelligence (A.I), the A.I of the the submit button to get access provided the answer given is
present day systems is not that much developed to identify an authenticated. For example shown in the snap shot the picture
action from a given real time image [2] nor it can identify a real shows a television and the question posed is relevant to it which
time object shown. Our system is illustrated by the following says “Identify the object shown in the image?”. The answer entered
example: by the user is “television” which is the correct answer and hence he
gets access into the account.
The figure shows an image that is used in our system. It shows an
image of a television. This is a real time image and the automated Since generating the “ THINK” puzzle for every single login
machines cannot guess the answer if the question for the above attempt may be too expensive for the web server, and because it
shown image is: Identify the object shown in the image? But for also represents added work that the user most likely would be
humans, it is very easy to answer this question. Considering the reluctant to deal with every time. According to [5] it can be applied
same question, identify the object shown in the image? The key on the following conditions:
words (answer) are set as television, TV, tele. If the user’s answer 1. Prompt for the username and password
contains any one of the above key words then it is identified that 2. Check to see if the client has a valid cookie
the user is a human and he is allowed to proceed further else it is 3. If user gives:
identified as an automated system and the access is denied. a. Password correct: Accept and give access directly
Consider the user’s answer is: a television then it is concluded that without the need to solve the” THINK” puzzle
the user is a human; if the answer is a tele even then the user is b. Password incorrect: Give the user a “THINK” puzzle, if
identified as human. If the answer is a monitor or if the answer is the user solves it give access else reject access and throw
irrelevant to the question then the user is identified as an automated
system and the access is denied.

4.1 Time out feature


There is an important feature called the time out feature where
there is a countdown timer which starts to count down as soon as
the question is thrown to the user by the computer. Once the time
limit expires the user has to face a new question which he is
expected to solve to get access. This feature to an extent prevents
the automated systems from answering the question as mostly these
systems are supported by knowledge based systems which takes
some time to browse through the directory and give the correct
answer. Whereas a normal human takes very less time to solve
these questions.

4.2 Algorithm used to implement THINK:


1) Initiate the required counter by 0 and objects for GUI.
2) Connect to the database.
3) Retrieve a random record consisting of image and the related
question. Figure-4: Shows the Snapshot of THINK
4) Display the image and question.
5) Start a new thread for verification of answer and keeping a new question for the user to solve to get access.
track of time.
6) Increment the counter by 1 and make the thread sleep for 1 6. HOW THINK IS SUPERIOR
sec. Our system is a modification of the other image based CAPTCHA
7) Check if user pressed any buttons. models. In the esp-pix model the user is required to select the
8) If user pressed the submit button, suspend the thread and answers and moreover the images used are not real time images and
compare the answer entered by user to one loaded from there is very high possibility and probability that these images can
database. be located in the internet whereas in case of “THINK” ie., in our
9) If answer is a substring in users answer exit displaying system we use the real time images and there is no possibility that
message of acceptance. these images can be located in the internet. If the images found in
10) If user clicks cancel button, exit from the program closing the internet or any freeware images are used then there is a good
database connection. probability that the automated system can crack the answer as it
11) If answer is wrong do nothing and display error message. gives the system an opportunity to search for the answers which is
12) If counter reaches 59 repeat step 3 and reset the counter and the reason for the failure of the image related CAPTCHA’s
go to step 6. whereas in our system that is eliminated as we use real –time

423
International Conference on Advances in Computing, Communication and Control (ICAC3’09)

images. In one other proposed solution to distinguish between the system which satisfies all the metrics. It is more secure and
users and the human, the user is expected the arrange the jumbled efficient in terms of performance when compared to the present day
images in sequence to get the original image which is not within systems or any other system proposed till date.
the scope of a common human being and hence the test has to be as
simple and efficient to make sure that it is within the scope of every 9. REFERENCES
common person and out of scope for the bots. As identified [1] A CAPTCHA Mechanism by exchanging Image Blocks by
previously choosing an answer is rather easier than giving the Wen-Hung Liao – Department of Computer Science, National
answer by own which we exploit to our convenience to come up Chengchi University, Taipei, Taiwan. Proceedings of the 18th
with a system that satisfies all the requirements to serve as a International Conference on Pattern Recognition (ICPR’06).
successful and efficient system to distinguish between a human and [2] CAPTCHA: Using Hard AI Problems for security by Luis
a computer. Von Ahn, Manuel Blum, Nicholas J. Hopper and John
Langford – Computer Science Dept., Carnegie Mellon
7. EXPERIMENTAL RESULTS University, Pittsburgh, PA 15213, USA
The THINK was implemented and tested on many users almost all
the users found that a THINK puzzle is much easier to solve than a [3] Filtering Short Message Spam of Group Sending Using
fuzzy text. Considerably it took less time to crack the THINK CAPTCHA by PeizhouHe Young Sun Wei Zheng Xiangming
puzzle than the CAPTCHA or other related challenges. The fun Wen. Beijing Univ of Posts and Telecomm. Beijing :
factor as described in the metrics becomes a major factor in Knowledge discovery and Data Mining 2008, WKDD 2008,
THINK. The THINK puzzle is fun to solve for the users as it International Workshop
requires the user to interpret a real time image and it is a refreshing [4] Luis von Ahn, Manuel Blum and John Langford. Telling
concept as the users are concerned and hence they find the THINK humans and computer apart automatically. Communications of
puzzle much easier and enjoy solving the puzzle. The table ACM 47:5660,2004.
illustrated below shows the users and the time which they took to
[5] Mark D. Lillibridge, Martin Abadi, Krishna Bharat, and
solve the puzzle. The feedback for the THINK puzzle is very good
Andrei Z. Broder. Method for selectively restricting access to
as the users found the THINK very easy to solve in terms of the
computer systems, February 27 2001. U. S. Patent No.
difficulty of the challenge and is strictly out of scope for bots as the
6,195,698.
image used is a real time image.
[6] Moni Naor. Verification of a Human in the loop or
Table-1: Shows the users and the time taken to solve THINK Identification via the Turing Test.
http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human_a
USERS TIME TAKEN bs.html.1996
IN SECONDS [7] POSH: A generalized CAPTCHA with security applications
USER 1 10 by Waseem S. Daher. Massachusetts Institute of Technology.
USER 2 11 http://creativecommons.org/licenses/by/3.0/ or Creative
Commons, 559 Nathan Abbott Way, Stanford, CA 94305.
USER 3 09
[8] Philip Brighten Godfrey. Text-Based CAPTCHA algorithms.
USER 4 10 In First Workshop on Human Interactive Proofs,
USER 5 13 UnpublishedManuscript.2002.
USER 6 11 http://www.aladdin.cs.cmu.edu/hips/events/abs/godfreyb_abst
ract.pdf.
USER 7 09
USER 8 10 [9] Shih Chilin, Greg Kochanski and Daniel Lopresti. A reverse
turing test using speech. In International Conference on
Spoken Language Processing, pages 1357-1360, Denver,
It is clearly evident from the table that the time taken to solve Colorado, 2002.
THINK is less than 20 seconds. The puzzle was tested among all
kinds of people and hence by taking the average of the time taken it [10] Luis von Ahn. Re-CAPTCHA. http:// www.recaptcha.net,
can be concluded that THINK is even time efficient. 2007.
[11] Shujun Li and Heung-Yeung Shum. Secure Human-Computer
8. CONCLUSIONS AND FUTURE WORKS Identification (Interface) Systems against Peeping Attacks:
Our future works involve matching the user’s answers with the SecHCI. Cryptology ePrint Archive, Report 2005/268, 2005.
keywords based on the meaning of the answer. This involves fuzzy http://eprint.iacr.org.
logic and if this is implemented the system will be much more user
friendly as it gives user another chance to identify the keyword
based on the clue given after the user gives at least a similar
meaning in the first round of authentication for eg., consider a
picture showing an apple if the user answers is fruit he is again
posed with a question what fruit? Thus it gives the user another
chance to get the keyword correct ie., apple. Thus we have come up
with a novel yet practical and an easily implementable solution to
distinguish between a human and an automated system. We
initially have formulated some metrics based on which a good
CAPTCHA can be evaluated and finally conclude by proposing a

424

Вам также может понравиться