A computational approach to edge detection
Readings in computer vision: issues, problems, principles, and paradigms
Machine Learning
Use of the Hough transformation to detect lines and curves in pictures
Communications of the ACM
Object Recognition from Local Scale-Invariant Features
ICCV '99 Proceedings of the International Conference on Computer Vision-Volume 2 - Volume 2
Robust Object Detection with Interleaved Categorization and Segmentation
International Journal of Computer Vision
Machine learning attacks against the Asirra CAPTCHA
Proceedings of the 15th ACM conference on Computer and communications security
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Decaptcha: breaking 75% of eBay audio CAPTCHAs
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
The Failure of Noise-Based Non-continuous Audio Captchas
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
SURF: speeded up robust features
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part I
Building segmentation based human-friendly human interaction proofs (HIPs)
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Development of embedded CAPTCHA elements for bot prevention in fischer random chess
International Journal of Computer Games Technology
Breaking an animated CAPTCHA scheme
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking reCAPTCHAs with unpredictable collapse: heuristic character segmentation and recognition
MCPR'12 Proceedings of the 4th Mexican conference on Pattern Recognition
For human eyes only: security and usability evaluation
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Segmentation of CAPTCHAs based on complex networks
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
All your face are belong to us: breaking Facebook's social authentication
Proceedings of the 28th Annual Computer Security Applications Conference
SeeSay and HearSay CAPTCHA for mobile interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Framework for evaluation of text captchas
Proceedings of the 22nd international conference on World Wide Web companion
An empirical study on efficiency and effectiveness of localized vs. Latin-based CAPTCHA challenges
Proceedings of the 17th Panhellenic Conference on Informatics
The robustness of hollow CAPTCHAs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
We carry out a systematic study of existing visual CAPTCHAs based on distorted characters that are augmented with anti-segmentation techniques. Applying a systematic evaluation methodology to 15 current CAPTCHA schemes from popular web sites, we find that 13 are vulnerable to automated attacks. Based on this evaluation, we identify a series of recommendations for CAPTCHA designers and attackers, and possible future directions for producing more reliable human/computer distinguishers.