captcha2

7
iv ACKNOWLEDGEMENT I would like to express my sincere gratitude and appreciation to everyone who made this seminar report possible. Most of all, I would like to thank my Seminar Supervisor, Mr. Amit Kumar Jaiswal, Assistant Professor, Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad and Ms. Sumita Verma, Lecturer, Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad, for their guidance in the seminar. With their knowledge and experience, they guided me to successfully achieve my seminar objective. I sincerely extend my thanks to, Dr. G. P. Govil, (Prof.) and Dr. Sudhir Dawra, (Associate Prof. & Head) Department of Computer Science and Engineering, Ideal Institute of Technology Ghaziabad, Uttar Pradesh for their encouragement and support. I express my sincere thanks to all my friends, my well-wishers and classmates for their support and help during the seminar report.

Upload: abhimanyu-sood

Post on 18-Jun-2015

309 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: CAPTCHA2

iv

ACKNOWLEDGEMENT

I would like to express my sincere gratitude and appreciation to everyone who

made this seminar report possible. Most of all, I would like to thank my Seminar

Supervisor, Mr. Amit Kumar Jaiswal, Assistant Professor, Department of Computer

Science and Engineering, Ideal Institute of Technology Ghaziabad and Ms. Sumita

Verma, Lecturer, Department of Computer Science and Engineering, Ideal Institute

of Technology Ghaziabad, for their guidance in the seminar. With their knowledge

and experience, they guided me to successfully achieve my seminar objective.

I sincerely extend my thanks to, Dr. G. P. Govil, (Prof.) and Dr. Sudhir

Dawra, (Associate Prof. & Head) Department of Computer Science and Engineering,

Ideal Institute of Technology Ghaziabad, Uttar Pradesh for their encouragement and

support.

I express my sincere thanks to all my friends, my well-wishers and classmates

for their support and help during the seminar report.

ABHIMANYU SOOD Roll No. 0902810002 B. Tech. (CSE) 3rd Year (A)

Page 2: CAPTCHA2

iv

ABSTRACT

We introduce captcha, an automated test that humans can pass, but current

computer programs cannot pass: any program that has high success over a captcha can

be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several

novel constructions of captchas. Since captchas have many applications in practical

security, our approach introduces a new class of hard problems that can be exploited

for security purposes. Much like research in cryptography has had a positive impact

on algorithms for factoring and discrete log, we hope that the use of hard AI problems

for security purposes allows us to advance the field of Artificial Intelligence. We

introduce two families of AI problems that can be used to construct captchas and we

show that solutions to such problems can be used for steganographic communication.

Captchas based on these AI problem families, then, imply a win-win situation: either

the problems remain unsolved and there is a way to differentiate humans from

computers, or the problems are solved and there is a way to communicate covertly on

some channels.

Page 3: CAPTCHA2

iv

CONTENTS

Certificate

Acknowledgement -------------------------------------------------------------- i

Abstract ------------------------------------------------------------------------- ii

Content ------------------------------------------------------------------------- iii

List of Figures------------------------------------------------------------------ iv

1. INTRODUCTION --------------------------------------------------------------------- 1

2. TYPES OF CAPTCHAS ------------------------------------------------------------- 5

3. APPLICATION ----------------------------------------------------------------------- 12

4. CONSTRUCTING CAPTCHA ----------------------------------------------------- 15

5. BREAKING OF CAPTCHA -------------------------------------------------------- 24

6. ISSUES WITH CAPTCHA --------------------------------------------------------- 30

Conclusion ------------------------------------------------------------------- 33

Reference --------------------------------------------------------------------- 34

Page 4: CAPTCHA2

iv

List of Figures

1. Fig 2.1 Gimpy CAPTCHA ------------------------------------------------------------ 6

2. Fig 2.2 Yahoo’s Ez – Gimpy CAPTCHA ------------------------------------------- 6

3. Fig 2.3 BaffleText examples ---------------------------------------------------------- 7

4. Fig 2.4 MSN Passport CAPTCHA --------------------------------------------------- 7

5. Fig 2.5 Bongo CAPTCHA ------------------------------------------------------------ 8

6. Fig 2.6 First line shows --------------------------------------------------------------- 11

7. Fig 5.1 Breaking CAPTCHAs ------------------------------------------------------- 27

8. Fig 6.1 Usability issues in text based CAPTCHAs ------------------------------- 30