Association rule mining for the usability of the CAPTCHA interfaces: a new study of multimedia systems

Regular Paper
  • 30 Downloads

Abstract

This paper presents an analysis of the CAPTCHA interfaces in terms of their usability to Internet users. The usability is represented by the time needed to the users for finding a solution to the CAPTCHA, which is called response time. Specifically, the analysis is focused on four examples of text and image-based CAPTCHA. The aim is to study the cognitive factors influencing the Internet users in finding a solution to these four CAPTCHA types. Accordingly, an experiment is conducted on 100 Internet users, characterized by demographic factors, such as age, gender, Internet experience, and education level. Each user is asked to solve the four CAPTCHA types, and the response time for each of them is registered. Collected data including demographic factors and response time is subjected to association rule mining, using the FP-Growth algorithm for extracting the association rules. They show the dependence of the response time on the co-occurrence of the demographic factors. Also, an additional statistical analysis is performed using the nonparametric one-way Kruskal Wallis’ test. Experiments comparing the proposed method with the earlier studies of the CAPTCHA usability show the novelty of the method for the understanding of usability of CAPTCHA interfaces, which is based on the cognitive factors that influence the response time.

Keywords

CAPTCHA Multimedia interface Association rule mining Human–computer interaction Usability 

Mathematics Subject Classification

68Q10 91E10 97K40 97K80 97N80 97R40 97R99 

Notes

Acknowledgements

The authors are fully grateful to the anonymous users for publicly providing its data, and to Mr. Lucio Amelio, student of the Faculty of Medicine and Surgery, University of Bologna, Italy, for the helpful discussions about the biological effects of the human factors. This work was partially supported by the Grant of the Ministry of Education, Science and Technological Development of the Republic Serbia, as a part of the Project TR33037.

Compliance with ethical standards

Conflicts of interest

Author Darko Brodić declares that he has no conflict of interest. Author Alessia Amelio declares that she has no conflict of interest.

Ethical approval

This article does not contain any hazardous study involving human participants.

References

  1. 1.
    Ahn, L.V., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard ai problems for security. In: Proceedings of the 22nd International conference on theory and applications of cryptographic techniques, EUROCRYPT’03. LNCS, vol. 2656, 4–8 May 2003, Warsaw, Poland. Springer, Berlin, Heidelberg, pp. 294–311 (2003)Google Scholar
  2. 2.
    Turing, A.M.: Computers & thought. chap. Computing Machinery and Intelligence. MIT Press, Cambridge, pp. 11–35 (1995).Google Scholar
  3. 3.
    von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56–60 (2004)CrossRefGoogle Scholar
  4. 4.
    Baecher, P., Fischlin, M., Gordon, L., Langenberg, R., Lützow, M., Schröder, D.: Captchas: the good, the bad, and the ugly. In: Freiling, F.C. (ed.) Sicherheit 2010. Lecture Notes in Informatics, vol. 170, 5–7 October 2010, Berlin, Germany, pp. 353–365 (2010)Google Scholar
  5. 5.
    Nielsen, J.: Usability 101: Introduction to usability. http://www.useit.com/alertbox/20030825.html (2003)
  6. 6.
    Group, W.W.: Inaccessibility of captcha—alternatives to visual turing tests on the web. http://www.w3.org/TR/turingtest/ (2005)
  7. 7.
    Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (hips). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’05. ACM, New York, pp. 711–720 (2005)Google Scholar
  8. 8.
    Yan, J., El Ahmad, A.S.: Usability of captchas or usability issues in captcha design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS ’08. ACM, New York, pp. 44–52 (2008)Google Scholar
  9. 9.
    Ho, C.J., Wu, C.C., Chen, K.T., Lei, C.L.: Deviltyper: A game for captcha usability evaluation. ACM Comput. Entertain. 9, 3 (2011)Google Scholar
  10. 10.
    Reynaga, G., Chiasson, S., van Oorschot, P.C.: Exploring the usability of captchas on smartphones: comparisons and recommendations. In: NDSS workshop on usable security (USEC), 8–11 February 2015, San Diego, California, USA, Internet Society (2015)Google Scholar
  11. 11.
    Sachdeva, N., Saxena, N., Kumaraguru, P.: On the viability of captchas for use in telephony systems: a usability field study. In: Tripathi, S., Joshi, A. (eds.) 11th Asia Pacific Conference on Computer Human Interaction, APCHI ’13. ACM, Bangalore, pp. 178–182 (2013).  https://doi.org/10.1145/2525194.2525265
  12. 12.
    Lee, Y.L., Hsu, C.H.: Usability study of text-based {CAPTCHAs}. Displays 32(2), 81–86 (2011)CrossRefGoogle Scholar
  13. 13.
    Brodić, D., Amelio, A., Draganov, I.R.: Response Time Analysis of Text-Based CAPTCHA by Association Rules. Springer International Publishing, New York, pp. 78–88 (2016)Google Scholar
  14. 14.
    Brodić, D., Amelio, A.: Analysis of the Human-Computer Interaction on the Example of Image-Based CAPTCHA by Association Rule Mining. Springer International Publishing, New York, pp. 38–51 (2017)Google Scholar
  15. 15.
    Bursztein, E., Martin, M., Mitchell, J.: Text-based captcha strengths and weaknesses. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ’11. ACM, New York, pp. 125–138 (2011)Google Scholar
  16. 16.
    Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: Generic solving of text-based captchas. In: Bratus, S., Lindner, F.F.X. (eds.) 8th USENIX Workshop on Offensive Technologies, WOOT ’14. USENIX Association, San Diego, pp. 1–15 (2014)Google Scholar
  17. 17.
    Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X., Li, J.: A simple generic attack on text captchas. In: 23nd Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego, pp. 1–14 (2016)Google Scholar
  18. 18.
    Yan, J., Ahmad, A.S.E.: Captcha security: A case study. IEEE Secur. Priv. 7(4), 22–28 (2009)CrossRefGoogle Scholar
  19. 19.
    Kalsoom, S., Ziauddin, S., Abbasi, A.R.: An image-based captcha scheme exploiting human appearance characteristics. TIIS 6, 734–750 (2012)Google Scholar
  20. 20.
    Kim, J., Yang, J., Wohn, K.: Agecaptcha: an image-based captcha that annotates images of human faces with their age groups. KSII Trans. Internet Inf. Syst. (TIIS) 8(3), 1071–1092 (2014)Google Scholar
  21. 21.
    Bigham, J.P., Cavender, A.C.: Evaluating existing audio captchas and an interface optimized for non-visual use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’09. ACM, New York, pp. 1829–1838 (2009)Google Scholar
  22. 22.
    Tam, J., Simsa, J., Huggins-Daines, D., von Ahn, L., Blum, M.: Improving audio captchas. In: 4th Symposium on usable privacy and security (SOUPS), 23–25 July 2008, Pittsburgh, PA, USA (2008)Google Scholar
  23. 23.
    Tam, J., Simsa, J., Hyde, S., von Ahn, L.: Breaking audio captchas. In: Koller, D., Schuurmans, D., Bengio, Y., Bottou, L. (eds.) Proceedings of the 21st international conference on neural information processing systems (NIPS), 8–10 December 2008, Vancouver, British Columbia, Canada, pp. 1625–1632 (2008)Google Scholar
  24. 24.
    Bursztein, E., Beauxis, R., Paskov, H.S., Perito, D., Fabry, C., Mitchell, J.C.: The failure of noise-based non-continuous audio captchas. In: IEEE symposium on security and privacy, 22–25 May 2011, Oakland, California, USA. IEEE Computer Society, pp. 19–31 (2011)Google Scholar
  25. 25.
    Nayeem, M.T., Akand, M.R., Sakib, N., Kabir, W.U.: Human cognition in automated truing test design. Int. J. Softw. Sci. Comput. Intell. 6(4), 1–19 (2014)CrossRefGoogle Scholar
  26. 26.
    YouTube: Nucaptcha in action. https://www.youtube.com/watch?v=8g7kjOkGCYE (2011)
  27. 27.
    CAPTCHA, V.: Security and usability challenges of moving-object captchas: Decoding codewords in motion. http://www.cs.unc.edu/~yix/VideoCaptcha/ (2012)
  28. 28.
    Nguyen, V.D., Chow, Y.W., Susilo, W.: On the security of text-based 3d CAPTCHAs. Comput. Secur. 45, 84–99 (2014)CrossRefGoogle Scholar
  29. 29.
    Imsamai, M., Phimoltares, S.: 3d captcha: a next generation of the captcha. In: 2010 International conference on information science and applications (ICISA), 21–23 April 2010, Seoul, South Korea. IEEE Computer Society, pp. 1–8 (2010)Google Scholar
  30. 30.
    Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a captcha based on line drawings of 3d models. In: Proceedings of the 19th international conference on world wide web (WWW), 26–30 April 2010, Raleigh, North Carolina, USA, ACM, New York, pp. 821–830 (2010)Google Scholar
  31. 31.
    Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on management of data (SIGMOD), 25–29 May 1993, Washington, D.C., USA. ACM, New York, pp. 207–216 (1993)Google Scholar
  32. 32.
    Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Addison-Wesley Longman Publishing Co. Inc., Boston (2005)Google Scholar
  33. 33.
    Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD ’00. ACM, New York, pp. 1–12 (2000)Google Scholar
  34. 34.
    Zhao, Q., Bhowmick, S.S.: Association Rule Mining: A Survey. Technical Report, CAIS, No. 2003116, Nanyang Technological University, Singapore (2003)Google Scholar
  35. 35.
    Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook. Springer-Verlag New York Inc, Secaucus (2005)CrossRefMATHGoogle Scholar
  36. 36.
    Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer Series in Statistics. Springer New York Inc., New York (2001)Google Scholar
  37. 37.
    MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proc. of the fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1. University of California Press, California, pp. 281–297 (1967)Google Scholar
  38. 38.
    Bradley, P.S., Mangasarian, O.L., Street, W.N.: Clustering via concave minimization. In: Mozer, M.C., Jordan, M.I., Petsche, T. (eds.) Advances in Neural Information Processing Systems, vol. 9. The MIT Press, Cambridge, pp. 368–374 (1997)Google Scholar
  39. 39.
  40. 40.
    Shapiro, S.S., Wilk, M.B.: An analysis of variance test for normality (complete samples). Biometrika 52(3–4), 591–611 (1965)MathSciNetCrossRefMATHGoogle Scholar
  41. 41.
    Kruskal, W.H., Wallis, W.A.: Use of ranks in one-criterion variance analysis. J. Am. Stat. Assoc. 47(260), 583–621 (1952)CrossRefMATHGoogle Scholar
  42. 42.
    Field, A.: Discovering Statistics Using SPSS. ISM (London, England). SAGE Publications, Thousand Oaks (2009)Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Technical Faculty in BorUniversity of BelgradeBorSerbia
  2. 2.DIMESUniversity of CalabriaRendeItaly

Personalised recommendations