skip to main content
10.1145/1408664.1408671acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Usability of CAPTCHAs or usability issues in CAPTCHA design

Published:23 July 2008Publication History

ABSTRACT

CAPTCHA is now almost a standard security technology, and has found widespread application in commercial websites. Usability and robustness are two fundamental issues with CAPTCHA, and they often interconnect with each other. This paper discusses usability issues that should be considered and addressed in the design of CAPTCHAs. Some of these issues are intuitive, but some others have subtle implications for robustness (or security). A simple but novel framework for examining CAPTCHA usability is also proposed.

References

  1. L von Ahn, M Blum and J Langford. "Telling Humans and Computer Apart Automatically", CACM, V47, No2, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Luis von Ahn, Personal Communications, Oct 2007.Google ScholarGoogle Scholar
  3. HS Baird, MA Moll and SY Wang. "A highly legible captcha that resists segmentation attacks". Proc. of Second Int'l Workshop on Human Interactive Proofs (HIP'05), ed. by HS Baird and DP Lopresti, Springer-Verlag. LNCS 3517, Bethlehem, PA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K Chellapilla, K Larson, P Simard and M Czerwinski, "Designing human friendly human interaction proofs", ACM CHI'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K Chellapilla, K Larson, P Simard and M Czerwinski, "Building Segmentation Based Human-friendly Human Interaction Proofs", 2nd Int'l Workshop on Human Interaction Proofs, Springer-Verlag, LNCS 3517, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M Chew and HS Baird. "BaffleText: a human interactive proof". Proc. of 10th IS&T/SPIE Document Recognition & Retrieval Conference, 2003.Google ScholarGoogle Scholar
  7. AL Coates, H S Baird and RJ Fateman. "PessimalPrint: A Reverse Turing Test", Int'l. J. on Document Analysis & Recognition, Vol. 5, pp. 158--163, 2003.Google ScholarGoogle Scholar
  8. Lindsay W. MacDonald. "Using Colour Effectively in Computer Graphics". IEEE Computer Graphics and Applications, July/August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T Converse, "CAPTCHA generation as a web service", Proc. of Second Int'l Workshop on Human Interactive Proofs (HIP'05), ed. by HS Baird and DP Lopresti, Springer-Verlag. LNCS 3517, Bethlehem, PA, USA, 2005. pp. 82--96 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dan Goodin, "Facebook takes the Captcha rap". The Register, Dec 13, 2007. Available at http://www.theregister.co.uk/2007/12/13/facebook_captcha _goes_wrong/Google ScholarGoogle Scholar
  11. Paul Festa. "Spam-bot tests flunk the blind", CNET News.com, July 2, 2003. Available at http://www.news.com/2100-1032-1022814.html.Google ScholarGoogle Scholar
  12. Greg Mori and Jitendra Malik. "Recognising Objects in Adversarial Clutter: Breaking a Visual CAPTCHA", IEEE Conference on Computer Vision and Pattern Recognition (CVPR'03), Vol 1, June 2003, pp. 134--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jakob Nielsen. Usability 101: Introduction to Usability, 2003. Available at http://www.useit.com/alertbox/20030825.html.Google ScholarGoogle Scholar
  14. W3C Working Group, "Inaccessibility of CAPTCHA - Alternatives to Visual Turing Tests on the Web", Nov, 2005. Available at http://www.w3.org/TR/turingtest/.Google ScholarGoogle Scholar
  15. J Yan and A S El Ahmad. "Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms", in Proc. of the 23rd Annual Computer Security Applications Conference (ACSAC'07). FL, USA, Dec 2007. IEEE computer society. pp 279--291.Google ScholarGoogle Scholar
  16. J Yan and A S El Ahmad. "A Low-cost Attack on a Microsoft CAPTCHA", School of Computing Science Technical Report, Newcastle University, England. Feb, 2008.Google ScholarGoogle Scholar
  17. BotBlock. http://www.chimetv.com/tv/products/botblock.shtml. Accessed in Feb, 2008.Google ScholarGoogle Scholar
  18. http://recaptcha.net/Google ScholarGoogle Scholar
  19. http://www.cryptographp.comGoogle ScholarGoogle Scholar
  20. FreeCap. http://www.puremango.co.uk/cm_php_captcha_script_113.phpGoogle ScholarGoogle Scholar
  21. Diablo 2 event, http://newd2event.net/index.php?id=hacks/redvex/HotPlug_PluginGoogle ScholarGoogle Scholar
  22. The "Shout it out" audio CAPTCHA, http://www.nswardh.com/shout/. Accessed in Feb, 2008.Google ScholarGoogle Scholar
  23. R Chow, P Gollé, M Jakobsson, X Wang, L Wang. "Making CAPTCHAs clickable". Ninth Workshop on Mobile Computing Systems and Applications (HotMobile 2008). 2008 February 25--26; Napa, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Ritendra Datta, Jia Li and James Z. Wang, "IMAGINATION: A Robust Image-based CAPTCHA Generation System", Proceedings of the ACM Multimedia Conference, pp. 331--334, Singapore, ACM, November 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J Elson, JR Douceur, J Howell and J Saul. "Asirra: a CAPTCHA that exploits interest-aligned manual image categorization". Proceedings of the 14th ACM conference on Computer and communications security (CCS), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M Hoque, D Russomanno, M Yeasin. "2D Captchas from 3D Models", IEEE SoutheastCon 2006 Memphis, TN, April 2006.Google ScholarGoogle Scholar
  27. J Yan and A S El Ahmad. "Is cheap labour behind the scene? - Low-cost automated attacks on Yahoo CAPTCHAs", School of Computing Science Technical Report, Newcastle University, England. Apr, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Usability of CAPTCHAs or usability issues in CAPTCHA design

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security
        July 2008
        145 pages
        ISBN:9781605582764
        DOI:10.1145/1408664

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 July 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate15of49submissions,31%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader