Recognizing some of the modern CAPTCHAs Dmitry Nikulin LCME, Saint-Petersburg, 2011.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

QR Code Recognition Based On Image Processing
Prénom Nom Document Analysis: Document Image Processing Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart A Computer Program that can generate and grade test that: Most Humans.
An Adaptive Image Enhancement Algorithm for Face Detection By Lizuo Jin, Shin’ichi Satoh, and Masao Sakauchi. ECE 738 In Young Chung.
Computer Vision Detecting the existence, pose and position of known objects within an image Michael Horne, Philip Sterne (Supervisor)
Vision Based Control Motion Matt Baker Kevin VanDyke.
DIGITAL IMAGE PROCESSING
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Breaking an Animated CAPTCHA Scheme
Chapter 1: Introduction to Pattern Recognition
CAPTCHA Presented By Sayani Chandra (Roll )
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
Document Classification Comparison Evangel Sarwar, Josh Woolever, Rebecca Zimmerman.
Fitting a Model to Data Reading: 15.1,
Genetically optimized face image CAPTCHA
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
Ashish Uthama EOS 513 Term Paper Presentation Ashish Uthama Biomedical Signal and Image Computing Lab Department of Electrical.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Facial Recognition CSE 391 Kris Lord.
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean Hall 5409 T-R 10:30am – 11:50am.
METU Informatics Institute Min720 Pattern Classification with Bio-Medical Applications Lecture Notes by Neşe Yalabık Spring 2011.
September 10, 2012Introduction to Artificial Intelligence Lecture 2: Perception & Action 1 Boundary-following Robot Rules 1  2  3  4  5.
GmImgProc Alexandra Olteanu SCPD Alexandru Ştefănescu SCPD.
ENDA MOLLOY, ELECTRONIC ENG. FINAL PRESENTATION, 31/03/09. Automated Image Analysis Techniques for Screening of Mammography Images.
An Accessible CAPTCHA Chad Killingsworth Web Projects Coordinator.
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Analyzing CAPTCHAs May 1, 2009 Kyle Anderson Michelle Krause Matthew Turner.
Perception Introduction Pattern Recognition Image Formation
S EGMENTATION FOR H ANDWRITTEN D OCUMENTS Omar Alaql Fab. 20, 2014.
Problem description and pipeline
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 SUPPORT VECTOR MACHINES İsmail GÜNEŞ. 2 What is SVM? A new generation learning system. A new generation learning system. Based on recent advances in.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart Determines whether a user is.
Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition IEEE Transaction on Information Forensics and Security Zhifeng Li,
Monitoring of background events in 2010 run Giuseppe Zito 06/11/2015 PFG/MIG Topical meeting on beam background.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
CS654: Digital Image Analysis Lecture 25: Hough Transform Slide credits: Guillermo Sapiro, Mubarak Shah, Derek Hoiem.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Presented By Lingzhou Lu & Ziliang Jiao. Domain ● Optical Character Recogntion (OCR) ● Upper-case letters only.
CSC321 Introduction to Neural Networks and Machine Learning Lecture 3: Learning in multi-layer networks Geoffrey Hinton.
Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Type of Vehicle Recognition Using Template Matching Method Electrical Engineering Department Petra Christian University Surabaya - Indonesia Thiang, Andre.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart User is human or machine? Prevents.
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Separating man from machine since 2000….. ?. Agenda  Definition  History  Need  Types  Constructing CAPTCHAs  Breaking CAPTCHAs  Applications 
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Images were sourced from the following web sites: Slide 2:commons.wikimedia.org/wiki/File:BorromeanRing...commons.wikimedia.org/wiki/File:BorromeanRing...
Optical Character Recognition
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
Internet Econ: Google/Facebook POV
My Tiny Ping-Pong Helper
Are you Human?.
Web Programming Week 11 Old Dominion University
Pattern Recognition Sergios Theodoridis Konstantinos Koutroumbas
Final Year Project Presentation --- Magic Paint Face
By: Kevin Yu Ph.D. in Computer Engineering
CS122B: Projects in Databases and Web Applications Spring 2017
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Analyzing CAPTCHAs.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Presented By Vibhute J.B. Class : M.Sc. (CS)
Presentation transcript:

Recognizing some of the modern CAPTCHAs Dmitry Nikulin LCME, Saint-Petersburg, 2011

Examples

Stands for Completely Automated Public Turing test to tell Computers and Humans Apart

Turing test Introduced by the mathematician Alan Turing in 1950 Aimed to distinguish between a machine and a human The classic version is carried out by a human Loebner Prize has not been won yet

Reverse Turing Test Carried out by a computer A widespread example is CAPTCHA - Checks for human presence - Protects against spam and automated registrations - Uses human ability to recognize distorted text (Google reCAPTCHA)

Requirements for a CAPTCHA Simple for a human Difficult for a machine Does not require large computational resources Let us call a CAPTCHA efficient if a machine can successfully bypass it in no more than 1% of attempts.

Study the efficience of the widespread CAPTCHAs CAPTCHAs from the largest Russian mobile network operators web sites were chosen Objectives

Reasons of choice Operators have enough money to hire a programmer of any qualification Operators need to minimize the amount of spam in order to safeguard their reputation

Recognition method overview Preprocessing Segmentation Recognition In the following slides details on these stages will be given.

Preprocessing Clearing the noise Removing distortions © Beeline© MTS

Segmentation Extracting characters Post-processing characters

Recognition Classification of characters with a pre-trained neural network

Example Let us consider the following type of CAPTCHA: © Megafon

Analyzing the problem Characters lie on a 3D wireframe The wireframe is rotated and moved The brightness is inconsistent Seems to be quite bad :(

Ideas of the solution Ignore the three-dimensionality and use classic methods The characters are generally darker than the background and can be separated by brightness The upper side of the wireframe is clearly seen – this can be used for the reverse rotation

Estimating the rotation angle

Removing the background

Removing tiny holes

Segmentation

Statistics Total number of images – 100 Recognized successfully – 69 Recognition error – 31 Average error – 0.3 сharacters

Other types of CAPTCHAs Preprocessing varies greatly Segmentation is quite similar Almost identical recognition Conclusion — the more transformations are applied to the original image, the more general methods can be used.

Neural network segmentation In Beeline's CAPTCHA, the classic method did not show satisfactory results A new method which combines the segmentation and recognition was developed

Example © Beeline

Conclusion Only preprocessing varies significantly All considered types of CAPTCHAs proved to be inefficient reverse Turing tests

Questions?