Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented.

Slides:



Advertisements
Similar presentations
COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
Advertisements

CAPTCHA: Using Hard AI Problems for Security 12 Jun 2007 Ohad Barak (a.k.a. jo) Luis Von Ahn, EuroCrypt 2003.
Pattern Recognition Research Lab D. Lopresti & H. S. Baird Henry S. Baird Michael A. Moll Sui-Yu Wang A Highly Legible CAPTCHA that Resists Segmentation.
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart A Computer Program that can generate and grade test that: Most Humans.
Pattern Recognition Research Lab D. Lopresti & H. S. Baird Henry S. Baird Terry Riopka Jon Bentley (Avaya Labs) Michael A. Moll Sui-Yu Wang Protecting.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Breaking CAPTCHA By Willer Travassos. What it is CAPTCHA? CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
Breaking an Animated CAPTCHA Scheme
Effective Image Database Search via Dimensionality Reduction Anders Bjorholm Dahl and Henrik Aanæs IEEE Computer Society Conference on Computer Vision.
CAPTCHA Presented By Sayani Chandra (Roll )
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
CAPTCHA Presentation by Annette Tsui, Section 2. What is CAPTCHA? zCAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart.
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
Telling Humans and Computers Apart (Automatically) Or How Lazy Cryptographers do AI Luis von Ahn The Aladdin Center Carnegie Mellon University.
CAPTCHA Prabhakar Verma “08MC30”.
1 CAPTCHA Challenges for Massively Multiplayer Online Games 2010 International Conference on Cyberworlds Authors: Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou.
Computer Vision Group University of California Berkeley Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA Greg Mori and Jitendra Malik.
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
Presenting by, Prashanth B R 1AR08CS035 Dept.Of CSE. AIeMS-Bidadi. Sketch4Match – Content-based Image Retrieval System Using Sketches Under the Guidance.
CAPTCHA CAPTCHA is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart“. A CAPTCHA is a chal- lenge-response.
Matthias Neubauer CAPTCHA What humans can do, But computers can not.
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
Recognizing some of the modern CAPTCHAs Dmitry Nikulin LCME, Saint-Petersburg, 2011.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Analyzing CAPTCHAs May 1, 2009 Kyle Anderson Michelle Krause Matthew Turner.
Category Discovery from the Web slide credit Fei-Fei et. al.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart Determines whether a user is.
Captcha Breaker 技巧很強壯的大叔隊. Workflow Outline Segmentation – Human Visual System Segmentation – Color Filling Segmentation – Distortion Estimation Optical.
IMAGINATION: A Robust Image-based CAPTCHA Generation System Ritendra Datta, Jia Li, and James Z. Wang The Pennsylvania State University – University Park.
Deformable Part Model Presenter : Liu Changyu Advisor : Prof. Alex Hauptmann Interest : Multimedia Analysis April 11 st, 2013.
MSRI workshop, January 2005 Object Recognition Collected databases of objects on uniform background (no occlusions, no clutter) Mostly focus on viewpoint.
Online Signature Verification Based on Dynamic Regression Signature Verification 11/06/2003.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
Mentor Prof. Amitabha Mukerjee Deepak Pathak Kaustubh Tapi 10346
Learning Hierarchical Features for Scene Labeling
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart User is human or machine? Prevents.
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
Peter Matthews, Cliff C. Zou University of Central Florida AsiaCCS 2010.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Separating man from machine since 2000….. ?. Agenda  Definition  History  Need  Types  Constructing CAPTCHAs  Breaking CAPTCHAs  Applications 
Finding Clusters within a Class to Improve Classification Accuracy Literature Survey Yong Jae Lee 3/6/08.
Presented By Dr. Paul Cottrell Company: Reykjavik.
1 Convolutional neural networks Abin - Roozgard. 2  Introduction  Drawbacks of previous neural networks  Convolutional neural networks  LeNet 5 
Thomas Grandell April 8 th, 2016 This work is licensed under the Creative Commons Attribution 4.0 International.
CAPTCHA What humans can do, But computers can not.
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
SUBMITTED TO:-SUBMITTED BY:- Ms.Kavita KhannaShruty Ahuja H.O.D(CSE DEPARTMENT)02/MT/10 PDM,BAHADURGARHCE(2 ND SEM)
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
Face Recognition based on 2D-PCA and CNN
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
THE ESP GAME, AND OTHER STUFF
렌즈왜곡 관련 논문 - 기반 논문: R.Y. Tsai, An Efficient and Accurate Camera Calibration Technique for 3D Machine Vision. Proceedings of IEEE Conference on Computer.
Eick: Introduction Machine Learning
Are you Human?.
Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms
References [1] - Y. LeCun, L. Bottou, Y. Bengio and P. Haffner, Gradient-Based Learning Applied to Document Recognition, Proceedings of the IEEE, 86(11): ,
Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan.
Finding Clusters within a Class to Improve Classification Accuracy
Outline Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no.
Program Usability Based on the Perception of Bugs as Features
Jia-Bin Huang Virginia Tech ECE 6554 Advanced Computer Vision
A novel probabilistic language-based CAPTCHA system
Convolutional neural networks Abin - Roozgard.
Christoph F. Eick: A Gentle Introduction to Machine Learning
Presented By Vibhute J.B. Class : M.Sc. (CS)
Image Processing and Multi-domain Translation
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick.
Presentation transcript:

Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented by Shaohua Xie March 22, 2005

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

Introduction HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be economically solved by computers. An example character based HIP

Introduction HIPs are increasingly used to protect services against automatic script attacks. Mailblocks HIP samples.

Introduction MSN HIP samples. Register.com HIP samples.

Introduction EZ-Gimpy HIP samples.

Introduction YAHOO! HIP samples. Ticketmaster HIP samples.

Introduction Google HIP samples.

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

Definitions  Plain text => Global Warp  Plain text => Local Warp =>

Definitions  Translated Text Level 10  Rotated Text Level 25 Level 40 Level 15 Level 30 Level 45

Definitions  Scaled Text Level 20 Level 35 Level 50

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

User Study I  HIPs that only varied on one parameter of distortion are presented to users.  Accuracy: the percentage of characters correctly recognized.  For the parameter levels tested on plain, translated, rotated or scaled text HIPs, users were at 99% correct or higher.

User Study I  Global Warp Text Level 180Level 270Level 360

User Study I  Local Warp Text Level 30Level 55Level 80

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

User Study II  Unidimensional HIPs has been systematically broken, with a success rate of 5% or greater at a rate of 300 attempts per second [2,12].  Arcs and baselines are added to make HIPs very hard for computers to break.

User Study II  Thin Arcs that intersect plus baseline #Arcs: 0#Arcs: 18#Arcs: 36

User Study II  Thick Arcs that intersect plus baseline

User Study II  Thick Arcs that don’t intersect plus baseline #Arcs: 0#Arcs: 18#Arcs: 36

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

Conclusion  Most one-dimensional HIPs are easy for users to solve.  However, there is a significant decrease in human HIP solution accuracy with the increase of the global or local warping levels.  Accuracy was also quite high across all levels of HIP recognition with thin arcs in the foreground.  Adding intersecting thick arcs caused significant performance decrements, but non-intersecting thick arcs did not.

OUTLINE  Introduction  Definitions  User Study I  User Study II  Conclusion  References

References 1.Simard PY, Szeliski R, Benaloh J, Couvreur J, and Calinov I (2003), “Using Character Recognition and Segmentation to Tell Computers from Humans,”International Conference on Document Analysis and Recognition (ICDAR), IEEE Computer Society, pp , Chellapilla K., and Simard P., “Using Machine Learning to Break Visual Human Interaction Proofs (HIPs),” Advances in Neural Information Processing Systems 17, Neural Information Processing Systems (NIPS’2004), MIT Press. 3.Turing AM (1950), “Computing Machinery and Intelligence,” Mind, vol. 59, no. 236, pp Von Ahn L, Blum M, and Langford J. (2004) “Telling Computers and Humans Apart (Automatically) or How Lazy Cryptographers do AI.” Comm. of the ACM,47(2): First Workshop on Human Interactive Proofs, Palo Alto, CA, January Von Ahn L, Blum M, and Langford J, The Captcha Project.

References 7.Mori G, Malik J (2003), “Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA,” Proceedings of the Computer Vision and Pattern Recognition (CVPR) Conference, IEEE Computer Society, vol.1, pages:I I-141, June 18-20, Chew, M. and Baird, H. S. (2003), “BaffleText: a Human Interactive Proof,” Proc., 10th IS&T/SPIE Document Recognition & Retrieval Conf., Santa Clara, CA, Jan Simard, P.,Y., Steinkraus, D., Platt, J. (2003) “Best Practice for Convolutional Neural Networks Applied to Visual Document Analysis,” International Conference on Document Analysis and Recognition (ICDAR), IEEE Computer Society, Los Alamitos, pp , Selfridge, O.G. (1959). Pandemonium: A paradigm for learning. In Symposium in the mechanization of thought process (pp ). London: HM Stationery Office. 11.Pelli, D. G., Burns, C. W., Farrell, B., & Moore, D. C, “Identifying letters.” (accepted) Vision Research. 12.Goodman J. and Rounthwaite R., “Stopping Outgoing Spam,” Proc. of the 5th ACM conf. on Electronic commerce, New York, NY