Using Character Recognition and Segmentation to Tell Computer from Humans
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
Telling humans and computers apart automatically
Communications of the ACM - Information cities
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Embedded noninteractive continuous bot detection
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Assocaptcha: designing human-friendly secure captchas using word associations
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
Proceedings of the 9th workshop on Mobile computing systems and applications
Email Spam Filtering: A Systematic Review
Foundations and Trends in Information Retrieval
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What's up CAPTCHA?: a CAPTCHA based on image orientation
Proceedings of the 18th international conference on World wide web
KA-CAPTCHA: an opportunity for knowledge acquisition on the web
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
The robustness of a new CAPTCHA
Proceedings of the Third European Workshop on System Security
Towards A Universally Usable Human Interaction Proof: Evaluation of Task Completion Strategies
ACM Transactions on Accessible Computing (TACCESS)
Decaptcha: breaking 75% of eBay audio CAPTCHAs
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
Leveraging cognitive factors in securing WWW with CAPTCHA
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Attacks and design of image recognition CAPTCHAs
Proceedings of the 17th ACM conference on Computer and communications security
ECCV'10 Proceedings of the 11th European conference on Computer vision: Part I
DevilTyper: a game for CAPTCHA usability evaluation
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
An efficient and effective similarity measure to enable data mining of petroglyphs
Data Mining and Knowledge Discovery
Effects of age groups and distortion types on text-based CAPTCHA tasks
HCII'11 Proceedings of the 14th international conference on Human-computer interaction: users and applications - Volume Part IV
Accessibility of CAPTCHA methods
Proceedings of the 4th ACM workshop on Security and artificial intelligence
SEMAGE: a new image-based two-factor CAPTCHA
Proceedings of the 27th Annual Computer Security Applications Conference
Building segmentation based human-friendly human interaction proofs (HIPs)
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Using CAPTCHAs to index cultural artifacts
IDA'10 Proceedings of the 9th international conference on Advances in Intelligent Data Analysis
AniCAP: an animated 3d CAPTCHA scheme based on motion parallax
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Breaking an animated CAPTCHA scheme
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking a 3d-based CAPTCHA scheme
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey and analysis of current CAPTCHA approaches
Journal of Web Engineering
Hi-index | 0.01 |
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be economically solved by computers. HIPs are increasingly used to protect services against automatic script attacks. To be effective, a HIP must be difficult enough to discourage script attacks by raising the computation and/or development cost of breaking the HIP to an unprofitable level. At the same time, the HIP must be easy enough to solve in order to not discourage humans from using the service. Early HIP designs have successfully met these criteria [1]. However, the growing sophistication of attackers and correspondingly increasing profit incentives have rendered most of the currently deployed HIPs vulnerable to attack [2,7,12]. Yet, most companies have been reluctant to increase the difficulty of their HIPs for fear of making them too complex or unappealing to humans. The purpose of this study is to find the visual distortions that are most effective at foiling computer attacks without hindering humans. The contribution of this research is that we discovered that 1) automatically generating HIPs by varying particular distortion parameters renders HIPs that are too easy for computer hackers to break, yet humans still have difficulty recognizing them, and 2) it is possible to build segmentation-based HIPs that are extremely difficult and expensive for computers to solve, while remaining relatively easy for humans.