Abstract
Authentication is a commonly used technique in software applications to ensure whether the correct user is getting access to secured services or not. Due to the fast pace of data growth, there is an increasing need for security of online data. This is commonly achieved by the use of various CAPTCHAs. CAPTCHAs are an implementation of reverse Turing test. Turing test is used to distinguish between humans and computers. A fundamental property that the use of CAPTCHA necessitates is that the CAPTCHA must be easy and efficient for humans but difficult for computers. CAPTCHAs are used to protect the data from malicious bots and web crawlers. They are not only used in web sites but also used in banking transactions, cloud computing, distributed infrastructures and income tax services. In this paper, an analysis of the different categories of CAPTCHAs, the attacks against them and ideas and designs to develop more robust and user-friendly CAPTCHAs in the coming future are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pope, C. & Kaur, K.: Is it human or computer? Defending E-commerce with CAPTCHA. IT Prof. 7, 43–49 (2005). https://doi.org/10.1109/mitp.2005.37
Blum, M., Von Ahn, L., Langford, J., Hopper, N.: The CAPTCHA project. Completely automatic public turing test to tell computers and humans apart. Department of Computer Science. Carnegie-Mellon University. www.CAPTCHA.net (2000)
Baird, H., Coates, A., Fateman, R.: Pessimal print: a reverse turing test. IJDAR, 158–163 (2003). https://doi.org/10.1007/s10032-002-0089-1
Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: human-based character recognition via web security measures. Science 321, 1465–1468 (2008)
Chew, M., Baird, H.S.: Baffletext: a human interactive proof. In: Presented at the 10th Document Recognition and Retrieval Conference (SPIE) (2003)
Imsamai, M., Phimoltares, S.: 3D CAPTCHA: a next generation of the CAPTCHA. In: 2010 International Conference on Information Science and Applications (ICISA), pp. 1–14. Seoul (2010)
Elson, J., Douceur, J., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 366–374 (2007). https://doi.org/10.1145/1315245.1315291
Ai, L., Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart (automatically). Commun. ACM 47 (2002). https://doi.org/10.1145/966389.966390
Shirali-Shahreza, M.: Highlighting CAPTCHA. In: 2008 Conference on Human System Interactions, pp. 247–250 (2008)
Ogiela, M.R., Ogiela, L.: Authentication protocols using multi-level cognitive CAPTCHA. In: Barolli, L., Xhafa, F., Khan, Z., Odhabi, H. (eds.) Advances in Internet, Data and Web Technologies. EIDWT 2019. Lecture Notes on Data Engineering and Communications Technologies, vol. 29. Springer, Cham (2019)
Bigham, J.P., Cavender, A.C.: Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use. In: The SIGCHI Conference on Human Factors in Computing Systems (CHI’09), pp. 1829–1838 (2009)
Saikirthiga, Vaithyasubramanian, S.: Review on development of some strong visual CAPTCHAs and breaking of weak audio CAPTCHAs. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–4. Chennai (2016)
Kochanski, G., Lopresti, D., Shih, C.: A reverse turing test using speech. In: 7th International Conference on Spoken Language Processing, pp. 1357–1360 (2002)
Rao, K., Sri, K., Sai, G.: A novel video CAPTCHA technique to prevent BOT attacks. Proc. Comput. Sci. 85(236–240), 2016 (2016). https://doi.org/10.1016/j.procs.2016.05.220
Madhava, V.: CAPTCHA as graphical passwords (CaRP)—a novel security approach based on hard AI problems. Int. J. Adv. Eng. Glob. Technol. 3, 1006–1012 (2015)
Kulkarni, S., Fadewar, H.: In: Audio CAPTCHA Techniques: A Review: ICCII 2017 (2018). https://doi.org/10.1007/978-981-10-8228-3_33
Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., Wang, P.: Research on deep learning techniques in breaking text-based CAPTCHAs and designing image-based CAPTCHA. IEEE Trans. Inf. For. Secur. 13(10), 2522–2537 (2018)
Lorenzi, D., Vaidya, J., Uzun, E., Sural, S., Atluri, V.: Attacking image based CAPTCHAs using image recognition techniques. In: Venkatakrishnan, V., Goswami, D. (eds.) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol. 7671. Springer, Berlin, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deosatwar, S., Deshmukh, S., Deshmukh, V., Sarda, R., Kulkarni, L. (2021). An Overview of Various Types of CAPTCHA. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 195. Springer, Singapore. https://doi.org/10.1007/978-981-15-7078-0_24
Download citation
DOI: https://doi.org/10.1007/978-981-15-7078-0_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7077-3
Online ISBN: 978-981-15-7078-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)