SlideShare a Scribd company logo
1 of 23
Slide 1




Let’s Have Quiz
Slide 2




What Computers
  Cannot Do
 Which Humans
   Can Do?
Slide 3




Can’t
Sing
        Can’t
        Calculate   Can’t
                    Teach

 A

              B
                     C
Slide 4




              Can’t
              Read
         Distorted Text




Secret Answer D
Slide 5




      This
  INABILITY
 of Computers
was seen as an
OPPORTUNITY
    to solve
 Big Problems
Slide 6




  Big Problems
       In
Practical Security
      Of
Web Applications
Slide 7




                                  Comment Spam in Blogs.
                 Free Registration Sites Attacks.
               Email Addresses From Scrapers.
                                   Dictionary Attacks.
                                    Search Engine Bots.
                                     Worms and Spam.
                                       Online Polls.
Source: http://www.captcha.net/
Slide 8




    How to Solve This?
             by
  GENERATING and GRADING
            TESTS
    that HUMANS can PASS
             but
CURRENT COMPUTER PROGRAMS
           CANNOT.
Slide 9




              Can’t
              Read
         Distorted Text




Secret Answer D
Slide 10




CA PTC HA
Completely
Automated
Public
Turing test to tell
Computers and
Humans
Apart
Slide 11




   The term CAPTCHA was coined
               in 2000
   by Luis von Ahn, Manuel Blum,
     Nicholas Hopper and John
              Langford
   of Carnegie Mellon University.
Source: http://www.captcha.net/
Slide 12




                                  Demo




Source: http://www.captcha.net/
Slide 13




                                  Demo




Source: http://www.captcha.net/
Slide 14




 How CAPTCHA
   Can Solve
Above Problems?
Slide 15




       Preventing Comment Spam in
                 Blogs.
     Only humans can enter comments
                on a blog


 Protecting Website Registration.
   To ensure that only humans
      obtain free accounts.
Source: http://www.captcha.net/
Slide 16




           Protecting Email Addresses
                 From Scrapers.
            To require users to solve a
          CAPTCHA before showing your
                  email address.

            Worms and Spam.
  "I will only accept an email if I know
  there is a human behind the other
                computer."
Source: http://www.captcha.net/
Slide 17




      Preventing Dictionary Attacks.
Prevent a computer from being able
to iterate through the entire space
   of passwords by requiring it to
 solve a CAPTCHA after a certain
   number of unsuccessful logins.

Source: http://www.captcha.net/
Slide 18




                                   Search Engine Bots.
         In order to truly guarantee that
            bots won't enter a web site



                                      Online Polls.
                       The poll ensures that only
                           humans can vote.
Source: http://www.captcha.net/
Slide 19




Want To Try Yourself?
Slide 20




                                                       You Need
1) JAR
2) Mappings in web.xml
3) JSP with HTML form
4) Validation code in ACTION
Source: http://simplecaptcha.sourceforge.net/installing.html
Slide 21




                       Resources




http://www.captcha.net/
http://simplecaptcha.sourceforge.net/
Slide 22




Questions
Slide 23




Food For Thoughts
       CAPTCHA
           and
 Artificial Intelligence



     Re CAPTCHA

More Related Content

Similar to CAPTCHA

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranningRaj Fageria
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014Ganesh Dhage
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)Abhimanyu Sood
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsTom Eston
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfGanesh Dhage
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the RyeImperva
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET Journal
 

Similar to CAPTCHA (20)

Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captchas
CaptchasCaptchas
Captchas
 
latest ppt in tranning
latest ppt in tranninglatest ppt in tranning
latest ppt in tranning
 
Captcha Seminar report 2014
Captcha Seminar report 2014Captcha Seminar report 2014
Captcha Seminar report 2014
 
CAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for YouthCAPTCHA- Newly Attractive Presentation for Youth
CAPTCHA- Newly Attractive Presentation for Youth
 
14A81A05A8
14A81A05A814A81A05A8
14A81A05A8
 
CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)CAPTCHA(Image Verification Code)
CAPTCHA(Image Verification Code)
 
Captcha1
Captcha1Captcha1
Captcha1
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Captcha report
Captcha reportCaptcha report
Captcha report
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdfCaptcha Seminar report 2014 pdf
Captcha Seminar report 2014 pdf
 
Captcha seminar report
Captcha seminar reportCaptcha seminar report
Captcha seminar report
 
Captcha
CaptchaCaptcha
Captcha
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
captcha
captcha captcha
captcha
 
Spam Wars
Spam WarsSpam Wars
Spam Wars
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 

More from Abhishek Chikane

More from Abhishek Chikane (10)

MediaWiki for ALM
MediaWiki for ALMMediaWiki for ALM
MediaWiki for ALM
 
Tracking universal immunization
Tracking universal immunizationTracking universal immunization
Tracking universal immunization
 
Web Application Architecture
Web Application ArchitectureWeb Application Architecture
Web Application Architecture
 
Authentication Server
Authentication ServerAuthentication Server
Authentication Server
 
Creating Hardware Inventory
Creating Hardware InventoryCreating Hardware Inventory
Creating Hardware Inventory
 
Porting Java App To Cloud
Porting Java App To CloudPorting Java App To Cloud
Porting Java App To Cloud
 
Cloud Computing And Salesforce
Cloud Computing And SalesforceCloud Computing And Salesforce
Cloud Computing And Salesforce
 
Changing Trends In Cloud Computing
Changing Trends In Cloud ComputingChanging Trends In Cloud Computing
Changing Trends In Cloud Computing
 
Live broadcasting
Live broadcastingLive broadcasting
Live broadcasting
 
Logger implementation
Logger implementationLogger implementation
Logger implementation
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

CAPTCHA

  • 2. Slide 2 What Computers Cannot Do Which Humans Can Do?
  • 3. Slide 3 Can’t Sing Can’t Calculate Can’t Teach A B C
  • 4. Slide 4 Can’t Read Distorted Text Secret Answer D
  • 5. Slide 5 This INABILITY of Computers was seen as an OPPORTUNITY to solve Big Problems
  • 6. Slide 6 Big Problems In Practical Security Of Web Applications
  • 7. Slide 7 Comment Spam in Blogs. Free Registration Sites Attacks. Email Addresses From Scrapers. Dictionary Attacks.  Search Engine Bots.  Worms and Spam.  Online Polls. Source: http://www.captcha.net/
  • 8. Slide 8 How to Solve This? by GENERATING and GRADING TESTS that HUMANS can PASS but CURRENT COMPUTER PROGRAMS CANNOT.
  • 9. Slide 9 Can’t Read Distorted Text Secret Answer D
  • 10. Slide 10 CA PTC HA Completely Automated Public Turing test to tell Computers and Humans Apart
  • 11. Slide 11 The term CAPTCHA was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University. Source: http://www.captcha.net/
  • 12. Slide 12 Demo Source: http://www.captcha.net/
  • 13. Slide 13 Demo Source: http://www.captcha.net/
  • 14. Slide 14 How CAPTCHA Can Solve Above Problems?
  • 15. Slide 15  Preventing Comment Spam in Blogs. Only humans can enter comments on a blog  Protecting Website Registration. To ensure that only humans obtain free accounts. Source: http://www.captcha.net/
  • 16. Slide 16 Protecting Email Addresses From Scrapers. To require users to solve a CAPTCHA before showing your email address.  Worms and Spam. "I will only accept an email if I know there is a human behind the other computer." Source: http://www.captcha.net/
  • 17. Slide 17  Preventing Dictionary Attacks. Prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. Source: http://www.captcha.net/
  • 18. Slide 18  Search Engine Bots. In order to truly guarantee that bots won't enter a web site  Online Polls. The poll ensures that only humans can vote. Source: http://www.captcha.net/
  • 19. Slide 19 Want To Try Yourself?
  • 20. Slide 20 You Need 1) JAR 2) Mappings in web.xml 3) JSP with HTML form 4) Validation code in ACTION Source: http://simplecaptcha.sourceforge.net/installing.html
  • 21. Slide 21 Resources http://www.captcha.net/ http://simplecaptcha.sourceforge.net/
  • 23. Slide 23 Food For Thoughts CAPTCHA and Artificial Intelligence Re CAPTCHA