skip to main content
10.1145/1572532.1572551acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Balancing usability and security in a video CAPTCHA

Published:15 July 2009Publication History

ABSTRACT

We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person that uploaded the video. They are graded using a video's tags, as well as tags from related videos. In a user study involving 184 participants, we were able to increase the human success rate on our video CAPTCHA from roughly 70% to 90%, while keeping the success rate of a tag frequency-based attack fixed at around 13%. Through a different parameterization of the challenge generation and grading algorithms, we were able to reduce the success rate of the same attack to 2%, while still increasing the human success rate from 70% to 75%. The usability and security of our video CAPTCHA appears to be comparable to existing CAPTCHAs, and a majority of participants (60%) indicated that they found the video CAPTCHAs more enjoyable than traditional CAPTCHAs in which distorted text must be transcribed.

References

  1. H. S. Baird and K. Popat. Human Interactive Proofs and Document Image Analysis. In Proc. IAPR DAS 2002, ACM Press (2002), 507--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon. I Tube, You Tube, Everybody Tubes: Analyzing the World's Largest User Generated Content Video System. In Proc. IMC 2007, ACM Press (2007), 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. Chellapilla, K. Larson, P. Y. Simard, and M. Czerwinski. Building Segmentation Based Human-friendly Human Interaction Proofs (HIPs). In Proc. HIP 2005, LNCS (2005), 1--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Chew and H. S. Baird. Baffletext: A Human Interactive Proof. In Proc. DRR 2003, IST/SPIE (2003), 305--316.Google ScholarGoogle Scholar
  5. M. Chew and J. D. Tygar. Image Recognition CAPTCHAs. In Proc. ISC 2004, LNCS (2004), 268--279.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Douceur, J. Elson, J. Howell, and J. Saul. Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization. In Proc. CCS 2007, ACM Press (2007), 366--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Geisler and S. Burns. Tagging Video: Conventions and Strategies of the YouTube Community. In Proc. JCDL 2007, ACM/IEEE (2007), 480--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. B. Godfrey Text-based CAPTCHA algorithms. In Proc. HIP 2002.Google ScholarGoogle Scholar
  9. P. Golle. Machine Learning Attacks Against the ASIRRA CAPTCHA. In Proc. CCS 2008, ACM Press (2008), 535--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. A. Goodman. Snowball sampling. The Annals of Mathematical Statistics 32, 1 (1961), 148--170.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. Gossweiler, M. Kamvar and S. Baluja. What's Up CAPTCHA? A CAPTCHA Based on Image Orientation. In Proc. WWW 2009, ACM Press (2009), 841--850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. J. Halvey and M. T. Keane. Analysis of Online Video Search and Sharing. In Proc. Hypertext 2007, ACM Press (2007), 217--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. W. Hart. To Decode Short Cryptograms. Communications of the ACM 37, 9 (1994), 102--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Kerckhoffs. La Cryptographie Militaire. Journal des Sciences Militaires 9, (1883), 161--191.Google ScholarGoogle Scholar
  15. K. A. Kluever. Evaluating the Usability and Security of a Video CAPTCHA. Master's thesis, Rochester Institute of Technology, 2008.Google ScholarGoogle Scholar
  16. G. Kochanski, D. P. Lopresti and C. Shih. Using a Text-to-Speech Synthesizer to Generate a Reverse Turing Test. In Proc. ICTAI 2003, IEEE Press (2003), 226--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. V. I. Levenshtein. Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet Physics Doklady 10, (1966), 707--710.Google ScholarGoogle Scholar
  18. J. B. Lovins. Development of a Stemming Algorithm. Mechanical Translation and Computational Linguistics 11, (1968), 22--31.Google ScholarGoogle Scholar
  19. M. Naor. Verification of a human in the loop or Identification via the Turing Test. Unpublished manuscript, (1996).Google ScholarGoogle Scholar
  20. J. C. Paolillo. Structure and Network in the YouTube Core. In Proc. HICSS 2008, IEEE Press (2008), 156--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. F. Porter. An Algorithm for Suffix Stripping. Program 14, 3 (1980), 130--137.Google ScholarGoogle ScholarCross RefCross Ref
  22. Y. Rui and Z. Liu. ARTiFACIAL: Automated Reverse Turing test using FACIAL features. Multimedia Systems Journal 9, 6 (2004), 493--502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Rusu. Exploiting the Gap in Human and Machine Abilities in Handwriting Recognition for Web Security Applications. PhD thesis, University of New York at Buffalo, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. M. Turing. Computing Machinery and Intelligence. Mind 59, 236 (1950), 433--460.Google ScholarGoogle Scholar
  25. C. van Rijsbergen. Information Retrieval, Second edition. Butterworth-Heinemann Ltd, London, UK, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. von Ahn, M. Blum, and J. Langford. Telling Humans and Computers Apart Automatically. Communications of the ACM 47, 2 (2004), 56--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. L. von Ahn and L. Dabbish. Labeling Images with a Computer Game. In Proc. CHI 2004, ACM Press (2004), 319--326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Yan and A. S. E. Ahmad. A Low-cost Attack on a Microsoft CAPTCHA. In Proc. CCS 2008, ACM Press (2008), 543--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Yan and A. S. E. Ahmad. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proc. SOUPS 2008, ACM Press (2008), 44--52. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Balancing usability and security in a video CAPTCHA

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader