Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.

Slides:



Advertisements
Similar presentations
COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
QR Code Recognition Based On Image Processing
Prénom Nom Document Analysis: Document Image Processing Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart A Computer Program that can generate and grade test that: Most Humans.
Identifying Image Spam Authorship with a Variable Bin-width Histogram-based Projective Clustering Song Gao, Chengcui Zhang, Wei Bang Chen Department of.
Introduction to Morphological Operators
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Breaking CAPTCHA By Willer Travassos. What it is CAPTCHA? CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
Breaking an Animated CAPTCHA Scheme
CAPTCHA Presented By Sayani Chandra (Roll )
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
LYU 0102 : XML for Interoperable Digital Video Library Recent years, rapid increase in the usage of multimedia information, Recent years, rapid increase.
Chinese Character Recognition for Video Presented by: Vincent Cheung Date: 25 October 1999.
CAPTCHA Prabhakar Verma “08MC30”.
Smart Traveller with Visual Translator. What is Smart Traveller? Mobile Device which is convenience for a traveller to carry Mobile Device which is convenience.
Binary Image Analysis. YOU HAVE TO READ THE BOOK! reminder.
California Car License Plate Recognition System ZhengHui Hu Advisor: Dr. Kang.
Copyright © 2012 Elsevier Inc. All rights reserved.. Chapter 9 Binary Shape Analysis.
Solve the anagram. What do these represent?. Solve the anagram. What do these represent? RING BUSSTAR.
Connecting with Computer Science 2 Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn.
VEHICLE NUMBER PLATE RECOGNITION SYSTEM. Information and constraints Character recognition using moments. Character recognition using OCR. Signature.
1 Bitmap Graphics It is represented by a dot pattern in which each dot is called a pixel. Each pixel can be in any one of the colors available and the.
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Chapter 9.  Mathematical morphology: ◦ A useful tool for extracting image components in the representation of region shape.  Boundaries, skeletons,
An efficient method of license plate location Pattern Recognition Letters 26 (2005) Journal of Electronic Imaging 11(4), (October 2002)
S EGMENTATION FOR H ANDWRITTEN D OCUMENTS Omar Alaql Fab. 20, 2014.
Edge Detection (with implementation on a GPU) And Text Recognition (if time permits) Jared Barnes Chris Jackson.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart Determines whether a user is.
Captcha Breaker 技巧很強壯的大叔隊. Workflow Outline Segmentation – Human Visual System Segmentation – Color Filling Segmentation – Distortion Estimation Optical.
Multimedia Data Introduction to Image Processing Dr Sandra I. Woolley Electronic, Electrical.
Introduction to Interactive Media Interactive Media Components: Text.
G52IVG, School of Computer Science, University of Nottingham 1 Edge Detection and Image Segmentation.
Preventing Automated Use of STMP Reservation System Using CAPTCHA.
Pixel Connectivity Pixel connectivity is a central concept of both edge- and region- based approaches to segmentation The notation of pixel connectivity.
CAPTCHA Processing CPRE 583 Fall 2010 Project CAPTCHA Processing Responsibilities Brian Washburn – Loading Image into RAM and Preprocessing and related.
Optimization of Line Segmentation Techniques for Thai Handwritten Document Olarik Surinta Mahasarakham University Thailand.
Computational Biology, Part 22 Biological Imaging II Robert F. Murphy Copyright  1996, 1999, All rights reserved.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Clustering Prof. Ramin Zabih
Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented.
Image File Formats. What is an Image File Format? Image file formats are standard way of organizing and storing of image files. Image files are composed.
Dr. István Marosi Scansoft-Recognita, Inc., Hungary SSIP 2005, Szeged Character Recognition Internals.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Image Segmentation Nitin Rane. Image Segmentation Introduction Thresholding Region Splitting Region Labeling Statistical Region Description Application.
Digital Camera and Computer Vision Laboratory Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, R.O.C.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart User is human or machine? Prevents.
Preliminary Transformations Presented By: -Mona Saudagar Under Guidance of: - Prof. S. V. Jain Multi Oriented Text Recognition In Digital Images.
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
Peter Matthews, Cliff C. Zou University of Central Florida AsiaCCS 2010.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Separating man from machine since 2000….. ?. Agenda  Definition  History  Need  Types  Constructing CAPTCHAs  Breaking CAPTCHAs  Applications 
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
SUBMITTED TO:-SUBMITTED BY:- Ms.Kavita KhannaShruty Ahuja H.O.D(CSE DEPARTMENT)02/MT/10 PDM,BAHADURGARHCE(2 ND SEM)
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
Are you Human?.
Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms
Web Programming Week 11 Old Dominion University
Ch2: Data Representation
Digital Image Processing
Dr. István Marosi Recosoft Ltd., Hungary
Fighting the WebBots A webbot is a program that visits web sites for all kinds of purposes. For example, Google webbots make copies of all web sites for.
Presented By Vibhute J.B. Class : M.Sc. (CS)
Presentation transcript:

Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad

 Introduction to CAPTCHA  Segmentation Attack ◦ Pre-Processing ◦ Vertical Segmentation ◦ Color filling segmentation ◦ Thick arc removal ◦ Locating connected characters ◦ Segmenting connected characters  Results  Conclusion  Latest Implementation

 This paper presents a simple methodical way to break CAPTCHA systems, using Character Segmentation techniques

 Completely Automated Public Turing test to tell Computers and Humans Apart  CAPTCHAs are widely used as standard security mechanism to defend against malicious bots from posting automated messages to blogs, forums, wikis etc.,  CAPTCHA server posts a challenge that humans can solve easily, but computers can’t solve easily  CAPTCHAs are usually used to ensure that the response is not generated by computers

 There are different types of CAPTCHAs: ◦ Text based ◦ Image based ◦ Audio based

 The most popular and widely used CAPTCHA scheme  Distort text images, and make them unrecognizable even for state of the art Pattern Recognition methods  Advantages: ◦ Intuitive ◦ Human friendly ◦ Easy to deploy ◦ <0.01% of success rate for automated attacks

 Computer recognition rate for individual characters are very high:  So position of the characters have to be unpredictable, and characters have to be connected: Characters under typical distortions Recognition rate 100% 98%

 Identifying the position of the characters in the right order (segmentation) is: ◦ Computationally expensive and ◦ Combinatorialy hard  Most of the current CAPTCHA implementations including MSN, Yahoo and Google, are Segmentation-Resistant  If a CAPTCHA can be segmented it can be easily broken  This paper presents a novel segmentation attack

 8 Characters in each challenge  Only Upper case letters and digits  Blue foreground and Gray background  Thick foreground arcs  Thin foreground and background arcs  Character distortion

 Identify and remove random arcs  Identify all character locations and divide it in to 8 segments, each containing one character  Steps: ◦ Pre-Processing ◦ Vertical Segmentation ◦ Color filling segmentation ◦ Thick arc removal ◦ Locating connected characters ◦ Segmenting connected characters

 Convert rich-color CAPTCHA image to black and white image, using a threshold  Fix mistakenly broken foreground pixels (T)  Original Image:  Binarized Image:  After fixing:

 Create histograms with number of foreground pixels per column  Cut the image to chunks where there are no foreground pixels in a column Histogram Chunks after segmentation Blank Column

 Detect a foreground pixel, and trace all the foreground pixels connected to it  Color this connected component(object) with a distinct color  Number of colors gives the number of objects(N) in a chunk Chunks after segmentation

 Objects could be a single character, connected character, an arc, connected arcs or a character and an arc 11 objects

 Look for objects: ◦ Far away from base line (ie above or below the characters) ◦ Small pixel count (less than 50) ◦ Doesn’t form a circle or have a closed loop(A, B, D, P, O,Q, R, 4, 6, 8, 9) ◦ If total number of objects >8, then smallest size object could be arc base line

 After thick arc removal pass the image for another vertical segmentation Chunks 7 objects

 If N<8 then there are some connected characters  Analysis shows if an object is wider than 35 pixels, then it could have more than one character  Based on number of chunks and number of objects in each chunk, we can narrow down to the chunk with connected characters

 We have 4 chunks and 7 objects  And we know there have to be 8 characters  Possibilities: a)Four chunks, each having two characters [2,2,2,2] b)One chunk has three characters and two additional chunks each having two characters [3,2,2,1] c)One chunk has four characters and another two characters [4,2,1,1] d)There are two chunks each having three characters [3,3,1,1] e)One chunk has five characters [5,1,1,1] [1, 3, 2, 2]

 Chunks 2, 3, and 4 are wider than 35 pixels  And we know chunk 1 has only one character (it has only 1 object, which is < 35 pixels) a)[2,2,2,2] b)[3,2,2,1] c)[4,2,1,1] d)[3,3,1,1] e)[5,1,1,1] This possibility matches our profile [1, >1, >1, >1]

 Since Chunk 2 is wider than other chunks, the algorithm identifies that ◦ First chunk has 1 character ◦ Second chunk has 3 characters ◦ Third chunk has 2 characters ◦ Fourth chunk has 2 characters Identified as [1, 3, 2, 2]

 Identify the width of each chunk and do an even cut, based on the number of characters it has  Passing these 8 characters to a character recognition algorithm would easily identify them We identified all 8 characters

 Segmenting Success rate: 91%  Attack Speed : 80 ms  Image Recognition Success Rate: Ideally 95%, but in our case it was less because some characters had some thin arcs left  Overall Success rate(both Segmentation and Recognition): 61%

Microsoft Style: 91% Yahoo Style: random angled connecting lines. 77% Google Style: crowding characters together 12%

 Improvements to Prevent Segmentation ◦ Variable number of characters ◦ Random width for each character ◦ Crowding characters together ◦ Adding random arcs cl or ch or d HZKA8S or HKA8S

 Microsoft Style:   Gmail Style :  Yahoo Style :