A computer vision attack on the ARTiFACIAL CAPTCHA

Verfasser / Beitragende:
[Qiujie Li]
Ort, Verlag, Jahr:
2015
Enthalten in:
Multimedia Tools and Applications, 74/13(2015-07-01), 4583-4597
Format:
Artikel (online)
ID: 605447225
LEADER caa a22 4500
001 605447225
003 CHVBK
005 20210128100131.0
007 cr unu---uuuuu
008 210128e20150701xx s 000 0 eng
024 7 0 |a 10.1007/s11042-013-1823-z  |2 doi 
035 |a (NATIONALLICENCE)springer-10.1007/s11042-013-1823-z 
100 1 |a Li  |D Qiujie  |u College of Mechanical and Electronic Engineering, Nanjing Forestry University, 210037, Nanjing, China  |4 aut 
245 1 2 |a A computer vision attack on the ARTiFACIAL CAPTCHA  |h [Elektronische Daten]  |c [Qiujie Li] 
520 3 |a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a reverse Turing test that is used to differentiate bots from humans. Text CAPTCHAs have been widely used in commercial applications, but most of the text CAPTCHAs have been successfully attacked. An alternative is to develop image CAPTCHAs to replace text CAPTCHAs. ARTiFACIAL (Automated Reverse Turing test using FACIAL features) Rui and Liu (2003) is an image CAPTCHA system based on detecting human face and facial features and claimed to be attack-resistant and user-friendly. This paper proposes a compute vision attack on ARTiFACIAL. By carefully analyzing the limitations of face and facial feature detectors that ARTiFACIAL exploits, tailor-made attacking algorithm is designed instead of using general face and facial feature detectors directly. When tested with the 800 ARTiFACIAL challenges, the overall success rate of the attacking algorithm is 18.0 %, which is significantly higher than the estimate of 0.0006 % given in Rui and Liu (2003) for computer vision attacks. It takes an average time 1.47s for a PC with 3.2GHz Intel P4 and 2GB memory to pass an ARTiFACIAL test, compared with 14s for a human subject given in Rui and Liu (2003). From the successful attack, useful lessons for guiding the design of image CAPTCHAs are derived to advance the current understanding of the design of image CAPTCHAs and lead to more secure design. 
540 |a Springer Science+Business Media New York, 2013 
690 7 |a CAPTCHA  |2 nationallicence 
690 7 |a ARTiFACIAL  |2 nationallicence 
690 7 |a Attack  |2 nationallicence 
690 7 |a Computer vision  |2 nationallicence 
773 0 |t Multimedia Tools and Applications  |d Springer US; http://www.springer-ny.com  |g 74/13(2015-07-01), 4583-4597  |x 1380-7501  |q 74:13<4583  |1 2015  |2 74  |o 11042 
856 4 0 |u https://doi.org/10.1007/s11042-013-1823-z  |q text/html  |z Onlinezugriff via DOI 
898 |a BK010053  |b XK010053  |c XK010000 
900 7 |a Metadata rights reserved  |b Springer special CC-BY-NC licence  |2 nationallicence 
908 |D 1  |a research-article  |2 jats 
949 |B NATIONALLICENCE  |F NATIONALLICENCE  |b NL-springer 
950 |B NATIONALLICENCE  |P 856  |E 40  |u https://doi.org/10.1007/s11042-013-1823-z  |q text/html  |z Onlinezugriff via DOI 
950 |B NATIONALLICENCE  |P 100  |E 1-  |a Li  |D Qiujie  |u College of Mechanical and Electronic Engineering, Nanjing Forestry University, 210037, Nanjing, China  |4 aut 
950 |B NATIONALLICENCE  |P 773  |E 0-  |t Multimedia Tools and Applications  |d Springer US; http://www.springer-ny.com  |g 74/13(2015-07-01), 4583-4597  |x 1380-7501  |q 74:13<4583  |1 2015  |2 74  |o 11042