Skip to main content

Security and Understanding Techniques for Visual CAPTCHA Interpretation

  • Conference paper
  • First Online:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2017)

Abstract

This paper attempts to present a new idea of data understanding and security processes for visual CAPTCHA recognition and interpretation. The proposition is dedicated to using visual CAPTCHA application including understanding processes, semantic analysis and recognition, to information security aspects. A new CAPTCHA scheme dedicated to authentication procedures with distortion algorithms will also be presented. In our solution we propose various shape and size distortions as well as new type of added noise. Paper in particular will present new directions of CAPTCHA applications, especially for understanding, security and support data management processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Building segmentation based human friendly human interaction proofs (HIPs). In: The 2nd International Workshop on Human Interactive Proofs (2005)

    Google Scholar 

  2. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)

    Google Scholar 

  3. Iyobe, M., Ishida, T., Miyakawa, A., Uchida, N., Sugita, K., Shibata, Y.: Development of a mobile virtual traditional crafting presentation system using augmented reality technology. Int. J. Space Based Situat. Comput. 6, 239–251 (2014). doi:10.1504/IJSSC.2016.082769

    Article  Google Scholar 

  4. Nishino, H., Goto, R., Fukakusa, Y., Lin, J., Kagawa, T., Yoshida, K., Utsumiya, K., Hirooka, J., Osada, T., Nagatomo, N., Aoki, E.: A touch screen interface design with tactile feedback for practical applications. Int. J. Space Based Situat. Comput. 3, 18–21 (2013). doi:10.1504/IJSSC.2013.051974

    Article  Google Scholar 

  5. Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008, Fourth International Conference on Natural Computation, Proceedings. Jian, Peoples Republic China, October 18–20, vol. 6. pp. 245–247 (2008)

    Google Scholar 

  6. Ogiela, L.: Towards cognitive economy. Soft. Comput. 18(9), 1675–1683 (2014)

    Article  Google Scholar 

  7. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, September 10–12, pp. 257–261 (2014)

    Google Scholar 

  8. Ogiela, L., Ogiela, M.R.: Management Information Systems. Lecture Notes in Electrical Engineering, vol. 331, pp. 449–456 (2015)

    Google Scholar 

  9. Ogiela, M.R., Ogiela, U.: Grammar Encoding in DNA-Like Secret Sharing Infrastructure. Lecture Notes in Computer Science, vol. 6059, pp. 175–182 (2010)

    Google Scholar 

  10. Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, London (2014)

    Book  MATH  Google Scholar 

  11. Ogiela, U., Takizawa, M., Ogiela, L.: Security of Selected Secret Sharing Schemes, in Innovative Mobile and Internet Services in Ubiquitous Computing. Advances in Intelligent Systems and Computing, vol. 612, Springer International Publishing AG (2018). doi:10.1007/978-3-319-61542-4_37

  12. Roshanbin, N.: Interweaving Unicode, Color, and Human Interactions to Enhance CAPTCHA Security. Software Engineering and Intelligent Systems Department of Electrical and Computer Engineering University of Alberta Narges Roshanbin (2014)

    Google Scholar 

  13. Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)

    MATH  Google Scholar 

  14. Zhou, E., Niibori, M., Okamoto, S., Kamada, M., Yonekura, T.: IslayTouch: an educational visual programming environment for tablet devices. Int. J. Space Based Situat. Comput. 6, 183–197 (2016). doi:10.1504/IJSSC.2016.080285

    Article  Google Scholar 

Download references

Acknowledgments

This work has been supported by the AGH University of Science and Technology Research Grant No. 11.11.200.307.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lidia Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krzyworzeka, N., Ogiela, L. (2018). Security and Understanding Techniques for Visual CAPTCHA Interpretation. In: Xhafa, F., Caballé, S., Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-69835-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69835-9_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69834-2

  • Online ISBN: 978-3-319-69835-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics