SlideShare una empresa de Scribd logo
1 de 17
SECURITY ANALYSIS BY
RECOGNITION OF CAPTCHA
CAPTCHAS
HOW DOES IT WORK?
CAPTCHA works on a simple principal: Only solvable by
Humans. CAPTCHA works on the principle that
computers cannot process the image character, while
a human can easily read the CAPTCHA text. Hence it
became quite a successful scheme where a user
would have to enter the characters in order to
proceed to any website.
While there exist many types of CAPTCHA, the most
common one is the text based CAPTCHA where the
random combination of characters of varying length
is distorted into an image which, assumingly, cannot
be processed and solved by a computer script but
only read and understood by the Human senses.
Once the Human enters the CAPTCHA characters, it is
matched at the backend with the already known
solution and if it is 100% perfect, the user can
proceed to do the tasks. Cracking the CAPTCHA has
been a challenge to AI Research community, and till
date there has been so system that has been
developed that was able to achieve a 100% accuracy
and efficiency rate.
CAPTCHAs has applications for
practical security like
• Preventing Comment Spam in Blogs: Comment spamming to
increase the index in the search engine. These bots spam the
comments in blog with index words that will increase the blog’s
index higher on search engine. CAPTCHA ensures that this does not
happen.
• Protecting Website Registration: Everyone uses emails! Sever
websites have signups. It is humans who are supposed to sign up,
however with Registration bots several such email services and sign
up websites realized that it had millions of accounts overnight, all
fake generated by the bots.
• Protecting Email Addresses From Scrapers: Spammers crawl the
Web in search of email addresses posted in clear text. CAPTCHAs
provide an effective mechanism to hide your email address from
Web scrapers. The idea is to require users to solve a CAPTCHA
before showing your email address.
• Preventing Dictionary Attacks: A way to hack someone’s email or
registration account is try millions of combinations in the password
box along with the right userid. A CAPTCHA prevents this by
showing up after a number of ‘miss’ trials of logging in. Since a bot
cannot solve the CAPTCHA, more trials are not possible and it
doesn’t account the account in any way.
• Search Engine Bots: It is sometimes desirable to keep web pages
unindexed to prevent others from finding them easily. There is an
html tag to prevent search engine bots from reading web pages.
The tag, however, doesn't guarantee that bots won't read a web
page; it only serves to say "no bots, please." Search engine bots,
since they usually belong to large companies, respect web pages
that don't want to allow them in. However, in order to truly
guarantee that bots won't enter a web site, CAPTCHAs are needed.
GOALS TO ACHIEVE
• Web interface for the CAPTCHA system: Given a web page, we
construct a plug-in so that when you click a button, the CAPTCHA
will be captured, passed to a recognizer, get the result back, and fill
in the CAPTCHA text box. The result is checked to see if the
CAPTCHA is correctly filled. If yes, we record the CAPTCHA and the
answer in a database, for future research. Also, the recognition rate
is calculated for analysis.
• Segmentation Engine: The JCAPTCHA is segmented here
implemented on differed modes of segmentation. The
segmentation algorithms are based on invariants observed on
hundreds of JCAPTCHA.
• Recognition Engine: Build a recognition engine for the JCAPTCHA
segmented characters to identify the best answer possible.
A BRIEF FLOW:
• A CAPTCHA recognition framework consists of
3 main features:
• The front end plug-in that is used to detect
the CAPTCHA on the webpage.
• The segmentation engine which segments the
characters of the CAPTCHA.
• The recognizer which is responsible to identify
the segmented character.
The diagram below demonstrates the
framework for CAPTCHA recognition:
JCAPTCHA Recognizer Engine
• The Recognizer Engine forms the core of the JCAP
1. Collecting files and removing artifacts
We observed that the JCAPTCHA image file saved by
the plugin had a 2-pixel blue border. This border
was not in the original image and was an artifact
created when the plugin software iMacros selected
the image to take a screen shot. This border is
cropped off the image, and the new image is saved
in the Recognizer folder.
2. Segmentation
• There are three modes of segmentation that is
configurable by the user.
1.Fast Pixel Array mode
2.Slow Pixel Array mode
3.Connected Components mode
3. Recognition
• As introduced in the theory our approach to
Character Recognition is based on template
matching. Although, the implementation of the OCR
is based very much on explanation given in the
theory, I’d like to walk you through the flow of the
code talking about some of the challenges I
experienced building each function.
Screenshots
1. Image extraction using imacros
2. Extracted CAPTCHA in the specified folder
3. Pre-processed images
4. Segmentation
THANK YOU!

Más contenido relacionado

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Último (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Destacado

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Major Project- Security analysis by recognition of captcha

  • 3. HOW DOES IT WORK? CAPTCHA works on a simple principal: Only solvable by Humans. CAPTCHA works on the principle that computers cannot process the image character, while a human can easily read the CAPTCHA text. Hence it became quite a successful scheme where a user would have to enter the characters in order to proceed to any website.
  • 4. While there exist many types of CAPTCHA, the most common one is the text based CAPTCHA where the random combination of characters of varying length is distorted into an image which, assumingly, cannot be processed and solved by a computer script but only read and understood by the Human senses. Once the Human enters the CAPTCHA characters, it is matched at the backend with the already known solution and if it is 100% perfect, the user can proceed to do the tasks. Cracking the CAPTCHA has been a challenge to AI Research community, and till date there has been so system that has been developed that was able to achieve a 100% accuracy and efficiency rate.
  • 5. CAPTCHAs has applications for practical security like • Preventing Comment Spam in Blogs: Comment spamming to increase the index in the search engine. These bots spam the comments in blog with index words that will increase the blog’s index higher on search engine. CAPTCHA ensures that this does not happen. • Protecting Website Registration: Everyone uses emails! Sever websites have signups. It is humans who are supposed to sign up, however with Registration bots several such email services and sign up websites realized that it had millions of accounts overnight, all fake generated by the bots. • Protecting Email Addresses From Scrapers: Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address.
  • 6. • Preventing Dictionary Attacks: A way to hack someone’s email or registration account is try millions of combinations in the password box along with the right userid. A CAPTCHA prevents this by showing up after a number of ‘miss’ trials of logging in. Since a bot cannot solve the CAPTCHA, more trials are not possible and it doesn’t account the account in any way. • Search Engine Bots: It is sometimes desirable to keep web pages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed.
  • 7.
  • 8. GOALS TO ACHIEVE • Web interface for the CAPTCHA system: Given a web page, we construct a plug-in so that when you click a button, the CAPTCHA will be captured, passed to a recognizer, get the result back, and fill in the CAPTCHA text box. The result is checked to see if the CAPTCHA is correctly filled. If yes, we record the CAPTCHA and the answer in a database, for future research. Also, the recognition rate is calculated for analysis. • Segmentation Engine: The JCAPTCHA is segmented here implemented on differed modes of segmentation. The segmentation algorithms are based on invariants observed on hundreds of JCAPTCHA. • Recognition Engine: Build a recognition engine for the JCAPTCHA segmented characters to identify the best answer possible.
  • 9.
  • 10. A BRIEF FLOW: • A CAPTCHA recognition framework consists of 3 main features: • The front end plug-in that is used to detect the CAPTCHA on the webpage. • The segmentation engine which segments the characters of the CAPTCHA. • The recognizer which is responsible to identify the segmented character.
  • 11. The diagram below demonstrates the framework for CAPTCHA recognition:
  • 12. JCAPTCHA Recognizer Engine • The Recognizer Engine forms the core of the JCAP 1. Collecting files and removing artifacts We observed that the JCAPTCHA image file saved by the plugin had a 2-pixel blue border. This border was not in the original image and was an artifact created when the plugin software iMacros selected the image to take a screen shot. This border is cropped off the image, and the new image is saved in the Recognizer folder.
  • 13. 2. Segmentation • There are three modes of segmentation that is configurable by the user. 1.Fast Pixel Array mode 2.Slow Pixel Array mode 3.Connected Components mode 3. Recognition • As introduced in the theory our approach to Character Recognition is based on template matching. Although, the implementation of the OCR is based very much on explanation given in the theory, I’d like to walk you through the flow of the code talking about some of the challenges I experienced building each function.
  • 15. 2. Extracted CAPTCHA in the specified folder 3. Pre-processed images