Advertisement

Image Recognition CAPTCHAs

  • Monica Chew
  • J. D. Tygar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3225)

Abstract

CAPTCHAs are tests that distinguish humans from software robots in an online environment [3,14,7]. We propose and implement three CAPTCHAs based on naming images, distinguishing images, and identifying an anomalous image out of a set. Novel contributions include proposals for two new CAPTCHAs, the first user study on image recognition CAPTCHAs, and a new metric for evaluating CAPTCHAs.

Keywords

Similarity Score User Study Anomaly Detection Pass Rate Human User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Barnard, K., Duygulu, P., Forsyth, D., de Freitas, N., Blei, D., Jordan, M.: Matching words and pictures. Special Issue on Text and Images, Journal of Machine Learning Research 3, 1107–1135 (2002)Google Scholar
  2. 2.
    Barnard, K., Forsyth, D.: Learning the semantics of words and pictures. In: International Conference on Computer Vision, vol. 2, pp. 408–415 (2001)Google Scholar
  3. 3.
    Blum, M., von Ahn, L.A., Langford, J., Hopper, N.: The CAPTCHA Project (November 2000), http://www.captcha.net
  4. 4.
    Chew, M., Baird, H.: Baffletext: A human interactive proof. In: Document Recognition and Retrieval X (2003)Google Scholar
  5. 5.
    Chew, M., Tygar, J.D.: Image recognition captchas. Technical Report UCB//CSD-04-1333, UC Berkeley (2004)Google Scholar
  6. 6.
    Goodrum, A.: Image information retrieval: An overview of current research. Informing Science 3(2), 63–66 (2000)Google Scholar
  7. 7.
    Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Kehoe, C., Pitkow, J., Sutton, K., Aggarwal, G., Rogers, J.D.: Gvu’s 10th world wide web user survey (1999), http://www.gvu.gatech.edu/usersurveys/survey-1998-10/
  9. 9.
    McDonald, S., Tait, J.: Search strategies in content-based image retrieval. In: Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, pp. 80–87. ACM Press, New York (2003)CrossRefGoogle Scholar
  10. 10.
    Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Rangarajan, A., Figueiredo, M.A.T., Zerubia, J. (eds.) EMMCVPR 2003. LNCS, vol. 2683, Springer, Heidelberg (2003)Google Scholar
  11. 11.
    Oliver, J.J.: Decision graphs - an extension of decision trees. In: Proceedings of the Fourth International Workshop on Artificial Intelligence and Statistics, pp. 343–350 (1993)Google Scholar
  12. 12.
    Pdictionary.: The internet picture dictionary (2004), http://www.pdictionary.com
  13. 13.
    Turing, A.: Computing machinery and intelligence. Mind ,433–460 (1950)Google Scholar
  14. 14.
    von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Monica Chew
    • 1
  • J. D. Tygar
    • 1
  1. 1.UC Berkeley 

Personalised recommendations