Certain investigation on Captcha design based on splitting, rotating and grid’s usage in the images against OCR

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :M.Raja, A.Bharanidharan

MLA

M.Raja, A.Bharanidharan "Certain investigation on Captcha design based on splitting, rotating and grid’s usage in the images against OCR"International Journal of Computer Trends and Technology (IJCTT),V4(4):523-525 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Network security consists of the provisions and policies adopted by a network administrator. Network security prevents and monitors unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A CAPTCHA is a program that generates and grades tests that are human solvable, but beyond the capabilities of current computer programs. This technology is now almost a standard security mechanism for addressing undesirable or malicious Internet bot programs and has found widespread application on numerous commercial web sites including Google, Yahoo, and Microsoft’s MSN. It is widely accepted that a good CAPTCHA must be both robust and usable. The problem in existing system is that the CPU memory required to randomly generate CAPTCHA images is somewhat significant, and if CAPTCHA forms are being used on a lot of websites simultaneously this can reduce the performance of the web server. In order to provide effective CAPTCHA, A method used in CAPTCHA is implementing the images of words. This method is based on the weak points of Optical Character Recognition (OCR) programs. OCRs can recognize the high quality texts using the common formats and standards. It will be more secure to add noisy backgrounds, colors and increasing the level of distortion against character recognition programs. It is difficult for them to read low-quality text and the manuscripts.

 

References-
[1] L von Ahn, M Blum, J Langford. “Telling Humans and Computer Apart Automatically”, CACM, V47, No2, 2004.
[2] K Chellapilla, K Larson, P Simard, M Czerwinski, “Designing human friendly human interaction proofs”, ACM CHI’05, 2005.
[3] K Chellapilla, K Larson, P Simard, M Czerwinski, “Building Segmentation Based Human-friendly Human Interaction Proofs”, 2nd Int’l Workshop on Human Interaction Proofs, 2005.
[4] K Chellapilla, K Larson, P Simard, M Czerwinski, “Computers beat humans atsingle character recognition in reading-based Human Interaction Proofs”, 2ndConference on Email and Anti-Spam, 2005.
[5] HS Baird, MA Moll, SY Wang. “A highly legible captcha that resists segmentationattacks”.2nd Int’l Workshop on Human Interaction Proofs, 2005.
[6] LW MacDonald. “Using Colour Effectively in Computer Graphics”. IEEEComputer Graphics and Applications, July/August 1999.
[7] W3C Working Group, “Inaccessibility of CAPTCHA - Alternatives to VisualTuring Tests on the Web”, Nov, 2005.
[8] J Yan, AE Ahmad. “Breaking Visual CAPTCHAs with Naïve Pattern RecognitionAlgorithms”, ACSAC’07. pp 279-291.
[9] J Yan, AE Ahmad. “A Low-cost Attack on a Microsoft CAPTCHA”, 15th ACMCCS’08. pp. 543-554.

Keywords — Captchas, Colour, Robustness, Usability, Internet security.